We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Annotated Bibliography on Information Technology

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

Annotated Bibliography on Information Technology Mobile Security in the Future Adesina, A. O. , Agbele, K. K. , Februarie, R. , Abidoye, A. P. , & Nyongesa, H. O. (2011). Ensuring the security and privacy of information in mobile health-care communication systems. South African Journal of Science, 107(9), 26-32. This research article examines the security concerns of using mobile technology systems in health care institution. Various methods of ensuring privacy and security of patient’s electronic medical information are addressed.

This high quality article is relevant for present day mobile security issues.

Don't use plagiarized sources. Get Your Custom Essay on
Annotated Bibliography on Information Technology
Just from $13,9/Page
Get custom paper

The authors utilize a host of credible references in the health care and information technology fields. Ben-Asher, N. , Kirschnick, N. , Sieger, H. , Meyer, J. , Ben-Oved, A. , & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10. 1145/2037373. 2037442

This academic collection is the evaluation of a survey of mobile users’ perception of security needs.

This paper addresses the current security methods and reveals their inadequate nature. Finally, this article proposes a two-level security method for mobile user authentication. Highly relevant for examining users’ lack of knowledge concerning mobile security. Bose, A. , Hu, X. , Shin, K. G. , & Park, T. (2008). Behavioral detection of malware on mobile handsets. Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA.

225-238. doi: 10. 1145/1378600. 1378626 This is a highly technical paper that proposes software to identify mobile threats. Using observations of mobile viruses and worms the authors provide a method of detection with an accuracy rate of more than 96%. Proposed software can be a solution to growing mobile security concerns. Chu, H. -C. , Deng, D. -J. , & Chao, H. -C. (2011). Potential cyberterrorism via a multimedia smart phone based on a web 2. 0 application via ubiquitous wi- fi access points and the corresponding digital forensics.

Multimedia Systems, 17(4), 341-349. doi: 10. 1007/s00530-010-0216-7 This case study compares desktop PCs to mobile devices in terms of cyberterrorism. The authors make the conclusion that cybercrimes can be deployed using modern day cellphone through web 2. 0 applications. This study solidifies mobile security concerns. Dagon, D. , Martin, T. , & Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! Pervasive Computing, IEEE, 3(4), 11-15. This article warns about the impending launch of viruses on mobile phones.

The advent of Internet-enabled mobiles has increased the threats of mobile viruses exponentially. Examining the types of attacks and the impacts on the users. Even though published before it’s time, this article is still very relevant for modern concerns. Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14. This article takes account of the security concerns in the early 2000s and states that it’s a reality. Provides a “long-range outlook” to mobile technology makers in designing future mobile devices. Concepts can be used in future security frameworks.

Masse, D. (2012). $389 M mobile application security market set to explode as threats increase. Microwave Journal, 55(11), 56-56. Small excerpt of the growing market of mobile security application. Focuses on the creating of a new market and types of mobile security. Users will be able to purchase anti-virus software for mobile devices. Will viruses become more popular on mobile devices because of this new market? The mobile infections threat. (2009). Spectrum, IEEE, 46(5), 12-12. This is a short article with images that simulates a major virus outbreak on a mobile device.

Compare the virus to flu and SARS, showing the possibility of a wide spread epidemic via a picture message. This provides a visual depiction of the reality of cybercrime. Oberheide, J. , Veeraraghavan, K. , Cooke, E. , Flinn, J. , & Jahanian, F. (2008). Virtualized in-cloud security services for mobile devices. Proceedings of the First Workshop on Virtualization in Mobile Computing, Breckenridge, Colorado. 31-35. doi: 10. 1145/1622103. 1629656 This document argues that mobile devices are currently facing the same threats as desktop computers.

Cloud computing can be used as a anti-virus system for mobile devices. Reducing the processes and power consumption of mobile devices. Wang, Y. , Streff, K. , & Raman, S. (2012). Smartphone security challenges. Computer, 45(12), 52-58. This article provides a comprehensive analysis of the current shape of the mobile market and increased security concerns. It informs users of methods to ensure security as well as signs of an ongoing attack. This is useful in development of a user awareness campaign concerning mobile security concerns.

Cite this Annotated Bibliography on Information Technology

Annotated Bibliography on Information Technology. (2016, Sep 03). Retrieved from https://graduateway.com/annotated-bibliography-on-information-technology/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page