Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.5.205

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment  

Jeong, Yoon-Su (Dept. of Information Communication & Engineeringe, Baeseok University)
Lee, Sang-Ho (Dept. of Software, Chungbuk National University)
Publication Information
Journal of Digital Convergence / v.13, no.5, 2015 , pp. 205-211 More about this Journal
Abstract
Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.
Keywords
Mobile Office; Smartphone; Personal Information; State Information; pairwise comparison;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Y. Lee, T. H. Park, J. I. Lin, "A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office", Journal of Korea Institute of Information Security & Cryptology, Vol. 21, No. 5, pp. 109-127, Oct. 2011.
2 H. Tian, D. Liu, J. Lin, Y. Jin, "What Drives Mobile Office Service? A Revised Technology Acceptance Model Based on the Characteristics of Wireless Mobile Office Technology", 2010 International Conference of Information Science and Management Engineering, Vol. 1, pp. 166-170, Aug. 2011.
3 G. Li, Y. Jiang, A. Hu, "Study on Application of TNC Technology in Mobile Office", 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 799-803, Nov. 2010.
4 Y. Zhiyu, Z. Linwei, L. Wenna, "Study on Security Strategy of Wireless Mobile Office System ", 2009. ETCS '09. First International Workshop on Education Technology and Computer Science, pp. 495-498, Mar. 2009.
5 Y. Jiang, G. Li, A. Hu, "Mobile Office Security Technology for WLAN ", 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 795-798, Nov. 2010.
6 T. Wang, J. Zhang, L. Li, J. Jin, "Design and realization of the traffic police mobile office system based on Android ", 2011 19th International Conference on Geoinformatics, pp. 1-5, Jun. 2011.
7 C. Martin, H. J. Bohme, H. -M. Gross, "Conception and realization of a multi-sensory interactive mobile office guide ", 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 6, pp. 5368-5373, Oct. 2004.
8 Z. Ahmed, H. Jamal, R. Mehboob, S. Khan, M. Shahbaz, "Secure cognitive mobile hotspot ", IEEE Transactions on Consumer Electronics, Vol. 56, No.2, pp. 606-612, 2012.   DOI
9 J. Anderson, D. W. Gerbing, "Structure Equation Modeling in Practive: A Review and Recommended Two-step Approach". Psychological Bulletin, vol. 103, No.3, pp. 411-423. 1998.   DOI
10 F. D. Davis, R. P. Bagozzi, P. R. Warshaw, "User acceptance of computer technology: A comparison of two theoretical models", Management Science, Vol. 35, No. 8, pp.982-1003, 1989.   DOI   ScienceOn
11 D.K.W.Chiu, S.C.Cheung, E. Kafeza, and H.F.Leung. "A Three-Tier View Methodology for adapting M-services", IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol. 33, No. 6, pp. 725-741,2003.
12 J Jing, A S Helal. "Client-server computing in Mobile Environments ", ACM Computing survey, Vol. 31, No. 2, pp.117-157, 1993.
13 K.van Hee, N.Sidorova. T. "Inheritance of workflows: an approach to tackling problems related to change. Theoretical computer science", Vol. 270, No.1-2, pp.125-203, 2002.   DOI   ScienceOn
14 K. Mathieson, E. Peacock, W. ChinW, "Extending the technology acceeptance model: the influence of perceived user resources", DATABASE, Vol. 32, No. 3, pp. 86-112, 2001.
15 Yankee Group. "Mobile workers number almost 50 million", Business Communications Review,2005, Vol. 35, No. 8 pp. 8-12, 2005.