Browse > Article
http://dx.doi.org/10.9717/kmms.2015.18.2.178

A Study on countermeasure for privacy in mobile office  

Park, Yongjoon (Information & Communications Technology Research Institute)
Lee, Yunjung (Dept. of Computer Science and Statistics, Jeju National University)
Publication Information
Abstract
The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.
Keywords
BYOD; Information Security; Mobile Office; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 PbD, BYOD: (Bring Your Own Device) Is Your Organization Ready?, 2013.
2 N. Moon, S. Yong, J. Oh, and T. Cho, “A Study on Privacy for the Services in Digital Convergence,” Journal of Korea Multimedia Society, Vol. 10, No. 4, pp. 24-32, 2006.
3 NIA, Personal Information Protection Level Guide, 2013.
4 7 Foundational Principles, http://www.privacybydesign.ca (accessed Jan., 30, 2015.)
5 J. Shim, D. Mittleman, R. Welke, A. French, and J. Guo, “Bring Your Own Device (BYOD): Current Status, Issues, and Future Directions,” Proceeding of the Nineteenth Americas Conference on Information Systems, pp. 1-20, 2013.
6 N. Fernando, S. Loke, and W. Rahayu, "Mobile Cloud Computing: A Survey," Future Generation Computer Systems, Vol. 29, No. 1, pp. 84-106, 2013.   DOI   ScienceOn
7 H. Dinh, C. Lee, D. Niyato, and P. Wang, "A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches," Wireless Communications and Mobile Computing, Vol. 13, No. 18, pp. 1587-1611, 2013.   DOI
8 R. Ballagas, M. Rohs, J. Sheridan, and J. Borchers, “Byod: Bring Your Own Device,” Proceeding of the Workshop on Ubiquitous Display Environments at International Conference on Ubiquitous Computing, pp. 6-13, 2004.
9 A. Scarfo, “New Security Perspectives around BYOD,” Proceeding of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 446-451, 2012.
10 S. Park and J. Lee, “Propulsion Systems and Practices for Smart Work,” Information & Communications Magazine, The Korean Institute of Communications and Information Sciences, Vol. 29, No. 12, pp. 3-9, 2012.
11 Gartner, Gartner Identifies the Top 10 Strategic Technology Trends for 2015, http://www.gartner.com/newsroom/id/2867917 (accessed Dec., 10, 2014)
12 KISA, Information Security Guide for Mobile Office, 2013.
13 KISA, Information Manual for Introduction and Operation of Secure Mobile Office, 2012.
14 Wikipedia, Network Access Control, http://en.wikipedia.org/wiki/Network_Access_Control (accessed Dec., 13, 2014)
15 L. Orans and M. Nicolett, “Gartner’s Network Access Control Model,“ Gartner IT Security Summit, 2005.
16 K. Rhee, W. Jeon, and D. Won, “Security Requirements of a Mobile Device Management System”, International Journal of Security and Its Applications, Vol. 6, No. 2, pp. 353-358, 2012.
17 The Kyunghyang Shinmun, POSCO, Outsourcing Employees 'Cyber Inspectors' Controversy, 2013.
18 MSIP, Wireless Communication Services Statistics, 2014.