Search results

1 – 4 of 4
Article
Publication date: 25 April 2008

Dong‐Her Shih, Binshan Lin, Hsiu‐Sen Chiang and Ming‐Hung Shih

The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the…

4286

Abstract

Purpose

The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the intrusion of mobile phone viruses.

Design/methodology/approach

This paper surveys chronicle, securities, risks and countermeasure of mobile phone viruses.

Findings

This paper investigates infection routes, threats, damage, and spreading ways of mobile phone viruses and provides available countermeasures. It also provides useful tips about mobile viruses, indicating what to do and how to do it.

Research limitations/implications

This research may not be exhaustive about mobile viruses.

Practical implications

A very useful source of information and impartial advice for end‐users or organizations who are planning to protect their mobile phones and their own privacy.

Originality/value

This paper is the first to survey the risk of mobile phones and it discusses how organizations or individuals can protect mobile phones from the intrusion of viruses and how to develop their own mobile virus security plan.

Details

Industrial Management & Data Systems, vol. 108 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 October 2004

Dong‐Her Shih and Hsiu‐Sen Chiang

An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus spreads…

1612

Abstract

An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus spreads itself to others. Today's society has seen a dramatic increase in the use of e‐mails. As a result, organizations must take even more precautions to guard against the introduction of e‐mail viruses into their systems. This paper discusses how organizations can protect their e‐mails from the intrusion of e‐mail virus and how to develop their own e‐mail virus security plan.

Details

Online Information Review, vol. 28 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 September 2005

Dong‐Her Shih, Po‐Ling Sun and Binshan Lin

To provide the secure web services framework in an environment designed to integrate RFID system into the EPCglobal Network.

2222

Abstract

Purpose

To provide the secure web services framework in an environment designed to integrate RFID system into the EPCglobal Network.

Design/methodology/approach

Utilizing web services helps maximize the value of information generated from RFID systems and, taking advantage of web services security (WSS) technology, to provide an XML‐based abstraction layer for established security technologies that delivers confidentiality, integrity, authentication, authorization, and non‐repudiation in EPCglobal Network.

Findings

This paper inspects four cases of trust relationships in one‐to‐one and one‐to‐many teamwork models that exemplify how the proposed WSS specifications being used in industry‐wide EPCglobal Network are envisioned. For each of these cases the different security strategies were proposed. Also a comparative view is given, of discussed security strategies which businesses may wish to consult.

Originality/value

This first proposed secure framework integrating web services and WSS technology to industry‐wide EPCglobal Network will provide business an integration and collaboration capabilities, which make it easier for trading partners to electronically share real‐time RFID data and conduct transactions in an accurate, complete, highly controlled, and secure environment.

Details

Industrial Management & Data Systems, vol. 105 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 September 2004

Shih Dong‐Her, Chiang Hsiu‐Sen, Chan Chun‐Yuan and Binshan Lin

New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail…

2211

Abstract

New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail attachments. In this paper, Bayesian probabilistic network is examined to detect new malicious e‐mail viruses through anomaly detection. Experimental results show a better malicious e‐mail detection using Bayesian probabilistic networks. Managerial implications on how companies can protect their e‐mails and develop their own e‐mail security plan are addressed as well.

Details

Industrial Management & Data Systems, vol. 104 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Access

Year

All dates (4)

Content type

1 – 4 of 4