Annotated Bibliography The impact of Mobile Devices on Cyber Security

AnnotatedBibliography: The impact of Mobile Devices on Cyber Security

AnnotatedBibliography: The impact of Mobile Devices on Cyber Security

Amrin,N. (2015). TheImpact of Cyber Security on SMEs.Enschede: University of Twente.

Thisresearch study looks at the effects of cybercrime in Small and MediumEnterprises. These SMEs are said to be neglected in the war againstthese crimes causing the problem to be more profound in the sector.There is a comparison between European SMEs and Australian ones wherethe European enterprises seem to fall behind. The study objectivesare founded on the fact that most small and medium sized business donot report incidences of crime, to avoid damaging their reputations.Although the methodology applied can be used to perform another studyof the same caliber, the research utilizes a small sample size whichrenders the results inconclusive regarding the cybercrime issues. Dueto this fact, the source is only necessary when pursuing anadvancement on the same topic, but it may not be sufficientlyrelevant to support a substantial literature review except forsupplementation purposes.

Borrett,L. (2011, June 8). Bewareof Malicious QR Codes.Retrieved from Technology and Games:

Inthis paper, the author places concern on a particular point wherecyber criminals can get past the security of the mobile phones toachieve their objectives. The manipulation of the Quick Responsetechnology is a significant avenue to the beginning of cybercrime andother security related issues. Unlike other resources, this documentspecifically illuminates a single channel that is associated with ITsecurity while providing solutions to the same. The clear insightbehind it contributes significantly to the fact that, one of the mostappropriate ways of preventing the crime is through avoiding unknownQR codes. Furthermore, the proof is substantiated by examples ofmalicious codes present in the internet and websites.

ConnexionHelthcare. (2013). CyberSecurity and Mobile Medical Devices: Protecting and Securing PatientMedical Information.Cambridge: Connexion Healthcare.

Thiswhite paper illustrates the available means which can be used toaddress cybercrime issues in the Healthcare sector. Mobile deviceusage in the public health field is increasing rapidly, and thistranslates to a proportional increase in the risk ofcybercrime-related problems. The article elaborates the various meansthat can be utilized to address this type of wrongdoing, especiallythe roles and responsibilities of employees in securing of privatedata and information. The relevance of the article is founded on theapplication of various resources to come up with recommendations thatare viable. Interestingly, the document advocates for the use ofInformation Technology in health while ensuring that security moduleshave been put in place. Therefore, a critical material can be usedfor literature review purposes.

CTIA- The Wireless Association. (2012). Today’sMobile Cybersecurity.Retrieved from CTIA:

Inthis work, the corporate authors observed the trends that relate toan increase in Information Technology threats. Based on theirfindings, they came up with a strategy that will ensure a reductionin the number of cases in the future. The blueprint looks at thevarious methods in which the threats begin from mobile phones totablets and personal computers. It then follows by offering the meansto facilitate that hackers do not continue exploiting the loopholesleft behind, more so during the use of these gadgets at home or inthe workplace. The most remarkable aspect of this article is theprovision of long-term solutions based on their findings.

DimensionalResearch. (2013). TheImpact of Mobile Devices on Information Security: a Survey of ITProfessionals.Dimensional Research

Thisis a report on a global survey of IT professionals conducted in asample of five countries, including the USA, Canada, Japan, Germanyand the United Kingdom. The primary purpose of the article is topresent the impact of mobile devices on the security of corporates.The study describes the increasing numbers of mobile devicesconnected to company networks and customer information securityconcerns. The significant feature of this report includes thearticulation of a sample selection of professionals who provided thecharacteristic information regarding safety issues. In addition, thedetailed findings are presented using numbers and graphs, togetherwith the countries selected, translating to information that isconsidered accurate. This article is a relevant resource for use dueto the collaborations encompassed throughout the study alongside theprofessional way of presentation.

ExcelsiorCollege. (2015, May 29). Mobiledevices pose major cybersecurity threats.Retrieved from National Cybersecurity College:

Thedevelopment of Information Technology has risen to the extent thatworkers use mobile phones and tablets without recognizing the dangersassociated with them. The article focuses on the studies done fromConsumer reports, portraying the negligence that leads to loss ofdata and theft of smartphones. The paper also provides statisticscompiled from other studies and reports. This source is veryinformative and serves its purpose by projecting even the futureexpectations and outcomes of cybercrime. On top of that, it alsodescribes other sources and research, which focus on the effect ofusing technology gadgets for work. It is, therefore, a criticalsource due to its specificity.

Goldfarb,J. (2016, June 29). TheIncreasing Importance of Security Analytics.Retrieved from Security Week:

TheImportance of security analysis is elucidated here, and this isattributed to the effect that hackers constantly change theirmethods, motives and tools to do their dirty work. This occurrencemeans that the security protocols and procedures have to evolve bythe changing ways of hacking. This editorial is vital in itspresentation as to why and how care should be observed. The importantthing about this paper is that it addresses contemporary issues inits undertaking and can be extremely useful for literature review dueto its content which is up to date.

Keravalla,Z. (2015, August 24). Mobiledevices pose biggest cybersecurity threat to the enterprise, reportsays.Retrieved from Network World – Cisco Subnet:

Theauthor is the founder and principal of ZK Research and he providesinformation concerning the effects of cyber security on mobile phonesto various enterprises. The article puts on the table the expertiseassociated with the findings of a previous report provided byCheckpoint Software. It also explains the importance of vendorsperforming their studies and disseminating the results to others. Themost distinctive feature of this source is that it is written from acyber-security researcher and analyst’s perspective. A discussionis provided concerning another firm’s findings. Although thewriting is clear, the fact that it is founded on a single resourcemakes it not to be the best for literature review purposes. Theinformation is also based on a personal perspective and experience.

Marko,K. (2011). RiseOf Android Botnets.New York: Information Week.:

Almostsimilar to the article by Borrett (2011), this report is centered ona particular single channel of a security threat by reviewingliterature from several sources on the same topic, which improves thequality of the story and provides evidence concerning the malware andhow they are used to break security protocols. Distinct from otherarticles, this report provides a list of software applications thatcan be utilized by mobile phone users, and an additional analysis ofseveral operating system security measures. Information has beenobtained from security studies, therefore, an authentic source.However, it does not provide any literature or practically supportedevidence that the solutions and applications are practical tools toimprove the safety.

PonemonInstitute. (2012). TheImpact of Cybercrime on Business.Traverse: Ponemon Institute.

Thisis a report of a study conducted by Ponemon Institute, withsponsorship from a company known as checkpoint software technologies.It provides an analysis of the different levels of cybercrime invarious countries, the high number of cyber-attacks, hackers’behavior and incentives, the cost implications of the practice, theimpact and the few measures implemented to combat and preventcybercrime. The article is not unique to a single topic but ratherdescribes the areas mentioned above in detail, with relevantsupporting data presented in a way that can be easily interpretedbased on the various countries in the sample. The report is in-depthand provides even the smallest details of the study making it aconfidential source of literature, where one can summarize theinformation and appreciate the methodology and outcomes or findings.

Swift,P. (2015, July 9). CyberSecurity Threat.Retrieved from CYBER SECURITY THREAT WITHIN US DEPARTMENT OF DEFENSE:

Inthis paper, the author examines a study that was done by the U.S.Government. The risk of encounters with cyber security problems isassociated with the insider threats brought about by the use ofdevices within the government, which may lead to leaking ofinformation in a way that is not considered as the right channel. Thesource also describes the intensity of security that the governmentmust put in place to prevent both internal and external securitybreaches. In the end, it provides a summary solution of theseproblems. The characteristic feature of the article is its ability toprovide concrete evidence from authentic sources in a summarized way,hence its convenience as a perfect resource for a literature review.

US-ComputerEmergency Response Team. (2010, April 15). CyberThreats to Mobile Devices.Retrieved from US-CERT:

Thisarticle is a technical information paper that looks into the use ofmobile phones and the possibility of being exploited by criminals.Published by the United States Government, it has been tailored toreach out to the public outlining the various ways in which thesedevices can be affected. The paper further explains and describes indetail the effects of mobile malware and concludes by outlining themeasures to prevent such occurrences. The source is accurate. Itgives out data from several reliable sources, including researchstudies, and compiles them into one document. Also, the descriptioncan be well understood and applied by the readers, making it a usefulsource of information and real-life application of the recommendedactions to minimize security issues.