To read this content please select one of the options below:

An exploration of wireless computing risks: Development of a risk taxonomy

Bouchaib Bahli (Department of Decision Sciences and MIS, John Molson School of Business, Concordia University, Montréal, Canada)
Younes Benslimane (Department of Mathematics and Statistics, York University, Toronto, Canada)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 July 2004



Wireless computing, as a way of providing mobile services, has been growing steadily during the past few years. While wireless communications offer organizations and users many benefits such as portability, flexibility, increased productivity, and lower installation costs; on the other hand, risks inherent and exacerbated by wireless connectivity are widely reported, wherein networks are open to intruders who may cause unwanted consequences to an organization's information resources. Hence, understanding these risks will help protect against unforeseen threats, delays and costs. This paper aims at the development of a taxonomy for wireless computing risks. Six levels are identified including risks associated with the users, mobile devices, wireless networks, wireless applications, the Internet and the corporate gateway. The findings show that there is a need for systematic studies on wireless risk assessment and management. The implications of these findings for both researchers and practitioners are discussed.



Bahli, B. and Benslimane, Y. (2004), "An exploration of wireless computing risks: Development of a risk taxonomy", Information Management & Computer Security, Vol. 12 No. 3, pp. 245-254.



Emerald Group Publishing Limited

Copyright © 2004, Emerald Group Publishing Limited

Related articles