Dong‐Her Shih, Binshan Lin, Hsiu‐Sen Chiang and Ming‐Hung Shih
The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the…
Abstract
Purpose
The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the intrusion of mobile phone viruses.
Design/methodology/approach
This paper surveys chronicle, securities, risks and countermeasure of mobile phone viruses.
Findings
This paper investigates infection routes, threats, damage, and spreading ways of mobile phone viruses and provides available countermeasures. It also provides useful tips about mobile viruses, indicating what to do and how to do it.
Research limitations/implications
This research may not be exhaustive about mobile viruses.
Practical implications
A very useful source of information and impartial advice for end‐users or organizations who are planning to protect their mobile phones and their own privacy.
Originality/value
This paper is the first to survey the risk of mobile phones and it discusses how organizations or individuals can protect mobile phones from the intrusion of viruses and how to develop their own mobile virus security plan.
Details
Keywords
Dong‐Her Shih and Hsiu‐Sen Chiang
An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus spreads…
Abstract
An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus spreads itself to others. Today's society has seen a dramatic increase in the use of e‐mails. As a result, organizations must take even more precautions to guard against the introduction of e‐mail viruses into their systems. This paper discusses how organizations can protect their e‐mails from the intrusion of e‐mail virus and how to develop their own e‐mail virus security plan.
Details
Keywords
Dong‐Her Shih, Po‐Ling Sun and Binshan Lin
To provide the secure web services framework in an environment designed to integrate RFID system into the EPCglobal Network.
Abstract
Purpose
To provide the secure web services framework in an environment designed to integrate RFID system into the EPCglobal Network.
Design/methodology/approach
Utilizing web services helps maximize the value of information generated from RFID systems and, taking advantage of web services security (WSS) technology, to provide an XML‐based abstraction layer for established security technologies that delivers confidentiality, integrity, authentication, authorization, and non‐repudiation in EPCglobal Network.
Findings
This paper inspects four cases of trust relationships in one‐to‐one and one‐to‐many teamwork models that exemplify how the proposed WSS specifications being used in industry‐wide EPCglobal Network are envisioned. For each of these cases the different security strategies were proposed. Also a comparative view is given, of discussed security strategies which businesses may wish to consult.
Originality/value
This first proposed secure framework integrating web services and WSS technology to industry‐wide EPCglobal Network will provide business an integration and collaboration capabilities, which make it easier for trading partners to electronically share real‐time RFID data and conduct transactions in an accurate, complete, highly controlled, and secure environment.
Details
Keywords
Shih Dong‐Her, Chiang Hsiu‐Sen, Chan Chun‐Yuan and Binshan Lin
New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail…
Abstract
New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail attachments. In this paper, Bayesian probabilistic network is examined to detect new malicious e‐mail viruses through anomaly detection. Experimental results show a better malicious e‐mail detection using Bayesian probabilistic networks. Managerial implications on how companies can protect their e‐mails and develop their own e‐mail security plan are addressed as well.