| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Search the digital library catalog Help

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 5 / 5
First pagePrevious page1Next pageLast page
1.
Unlimited access to information systems with mobile devices : information security perspective
Igor Bernik, Blaž Markelj, 2011, review article

Abstract: Purpose: Mobile devices have become an indispensible part of modern communications; they enable easy access to the Internet and also remote manipulation of data stored in corporate information systems. The number of mobile device users is on the rise, but most of them don’t comprehend completely the less obvious functions of these devices. Users also have almost no control over background computer programs, because they run without their knowledge and volition. From the standpoint of information security, a lack of awareness of the risks can seriously compromise the integrity of corporate networks and information systems. The weakest links are users, but also the technology itself. To ensure the functioning and security of information systems, corporations and individual users should learn about protective mechanisms. It is also important that users adhere to implemented (internal) safety regulations. Design/Methods/Approach: We used descriptive and comparative methods, and made an overview of published literature, as well as processes pertaining to the use of mobile devices and related security issues. We compared general elements of information security in regard to the use of mobile devices. Findings: At present mobile devices are more and more frequently used to access information systems. The majority of users are concerned almost exclusively with the question, how to get uninterrupted remote access to data, but far less with security issues. This paper presents some guidelines for achieving and maintaining information security. Research limitations/implications: It has been noted, that this is a time of turbulent development and evolution in the field of mobile devices, and also related security issues, so best practices haven’t been defined yet. Corporations and other organizations have just recently begun defining guidelines to eliminate security breaches through mobile devices, therefore a comparison of their implemented solutions is practically impossible. VS_ Practical implications: We propose guidelines, which can be used to: minimize information security risks posed by mobile devices; evaluate the current state of information security; and implement protective measures against cyber threats encountered by corporations and individual users of mobile devices. Originality/Value: Information security is a relatively new field because mobile devices and remote access to the Internet and data have just recently come into wider use. At the same time security issues and protective measures have stayed largely overlooked. Security threats are many, so it is impervious that users learn more about them and adopt some necessary security measures.
Keywords: information security, blended threats, mobile devices, corporate information systems, business integrity
Published in DKUM: 12.05.2020; Views: 1346; Downloads: 67
.pdf Full text (884,10 KB)
This document has many files! More...

2.
Advances in cybersecurity 2017
2017, scientific monograph

Abstract: Understanding the cyberspace and awareness of its effects impacts the lives of all individuals. Thus, the knowledge of cybersecurity in both organizations and private operations is essential. Research on various aspects of cybersecurity is crucial for achieving adequate levels of cybersecurity. The content of this scientific monograph provides answers to various topical questions from the organizational, individual, sociological, technical and legal aspects of security in the cyberspace. The papers in the monograph combine the findings of researchers from different subareas of cybersecurity, show the effects of adequate levels of cybersecurity on the operations of organizations and individuals, and present the latest methods to defend against threats in the cyberspace from technical, organizational and security aspects.
Keywords: cybersecurity, cyber resilience, mobile security, digital privacy, IoT security
Published in DKUM: 08.12.2017; Views: 1933; Downloads: 361
.pdf Full text (3,56 MB)
This document has many files! More...

3.
Mobile devices and effective information security
Blaž Markelj, Igor Bernik, 2013, original scientific article

Abstract: Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc.) all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.
Keywords: information security, blended threats, mobile devices, awareness
Published in DKUM: 06.07.2017; Views: 1688; Downloads: 402
.pdf Full text (237,86 KB)
This document has many files! More...

4.
Criminal responsibility of students regarding using mobile devices and violating the principles of information security
Blaž Markelj, Sabina Zgaga Markelj, 2014, original scientific article

Abstract: The combination of information security and criminal law in the case of usage of smart mobile phones among the students is a very relevant and current topic. Namely, the number of smart mobile phones’ users is rising daily, including among the student population, due to the need for perpetual communication and constant access to information. However, the lack of knowledge about recommendations on information security and safe use of smart mobile phone together with their disregard could lead to criminal responsibility of the users of smart mobile phones, including students. The purpose of this paper is therefore to represent the potential consequences of criminal responsibility and how to avoid it. The knowledge on safe use of smart mobile phones, their software, but also threats and safety solutions is very low among students, as the survey shows. Due to the loss, conveyance or disclosure of protected data, criminal responsibility of a user could therefore be relevant. In certain cases the juvenile criminal justice system is partly still relevant due to the students’ age, whereas in every case the students' culpability should be assessed precisely. This assessment namely distinguishes the cases, when the student is a perpetrator of a criminal act from the cases, when the student is only a victim of a criminal act due to his improper use of smart mobile phones.
Keywords: mobile devices, information security, criminal responsibility, criminal act
Published in DKUM: 06.07.2017; Views: 1307; Downloads: 346
.pdf Full text (246,69 KB)
This document has many files! More...

5.
User experience with security elements in internet and mobile banking
Aleksandra Svilar, Jože Zupančič, 2016, original scientific article

Abstract: Background/Purpose: Maintaining a balance between security and a positive user experience in mobile and Internet banking is becoming increasingly difficult for the providers of banking services. The goal of our research is to analyse user opinions about the current situation: how users perceive security and how the authentication methods they are using affect user experience. Methodology: Data were collected using an online survey among the users of 15 banks operating in Slovenia, and statistical methods were applied to analyse them. Results of the users’ study were evaluated and commented by a limited number of interviewed banking security experts. Results: The results indicate that the use of mobile banking in Slovenia is relatively low, as only 30 percent of respondents use mobile banking along with Internet banking. Slovenian users perceive security to be the most important factor in mobile and online banking, closely followed by reliability. We also verified whether the users knew which authentication methods they were using: 69% of respondents selected the correct authentication method. The opinion of 88% of respondents was that authentication methods do not limit them when using mobile and Internet banking. Results of the study of user’s opinions did not surprise the experts, although experts’ views about the balance between security and usability diverged considerably. Conclusion: Our results indicate that, in Slovenia, users of the Internet and mobile banking services regard security to be the most important element in mobile or Internet banking and find user experience less important while they absolutely do want products that are easy to use.
Keywords: internet banking, mobile banking, security, user experience
Published in DKUM: 04.04.2017; Views: 2071; Downloads: 448
.pdf Full text (637,90 KB)
This document has many files! More...

Search done in 0.11 sec.
Back to top
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica