Annotated Bibliography on Information Technology

Topics: Personal digital assistant, Computer, Mobile phone Pages: 3 (781 words) Published: April 30, 2013
Annotated Bibliography on Information Technology
Mobile Security in the Future

Adesina, A. O., Agbele, K. K., Februarie, R., Abidoye, A. P., & Nyongesa, H. O. (2011). Ensuring the security and privacy of information in mobile health-care communication systems. South African Journal of Science, 107(9), 26-32.

This research article examines the security concerns of using mobile technology systems in health care institution. Various methods of ensuring privacy and security of patient’s electronic medical information are addressed. This high quality article is relevant for present day mobile security issues. The authors utilize a host of credible references in the health care and information technology fields.

Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442

This academic collection is the evaluation of a survey of mobile users’ perception of security needs. This paper addresses the current security methods and reveals their inadequate nature. Finally, this article proposes a two-level security method for mobile user authentication. Highly relevant for examining users’ lack of knowledge concerning mobile security. Bose, A., Hu, X., Shin, K. G., & Park, T. (2008). Behavioral detection of malware on mobile handsets. Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA. 225-238. doi: 10.1145/1378600.1378626

This is a highly technical paper that proposes software to identify mobile threats. Using observations of mobile viruses and worms the authors provide a method of detection with an accuracy rate of more than 96%. Proposed software can be a solution to growing mobile security concerns. Chu, H. -C.,...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on Information Technology
  • Annotated Bibliography Essay
  • Annotated Bibliography: The Future of Education Technology Essay
  • Ethics in Information Technology Essay
  • information technology system Essay
  • Annotated Bibliography Essay
  • Annotated Bibliography Essay
  • Essay about Annotated Bibliography

Become a StudyMode Member

Sign Up - It's Free