Faculty of Computing
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202
Browse
2 results
Search Results
Publication Embargo Privacy & Security in Mobile Devices, Social Network Services as Related to Business(IEEE, 2018-06-14) Harshanath, S. M. BuddhikaMobile computing has made it extra easy to maintain contacts either away from home or office. These mobile computing devices are mostly meant to increase productivity in the place of work. Yet, the benefits can easily come along with a good amount of risks too. Business operations require human resources and systems and we cannot do without them in our business operations. Therefore, it is time for professionals engaged in security tasks to consider challenges to information security before considering awareness programs for workers to treat information security as a highly valuable attribute. These awareness raising programs could create attitudinal changes towards risk management with regular use of mobile devices. But, of course, rules and regulations require time to come into effect. Self-awareness brought in with attitudinal changes, takes no time. Nowadays, with the IoT (Internet of Things) it is possible to monitor use of mobile devices, moving around buildings and automobiles. This, in turn, demands robust security systems.Publication Embargo Detection and Protection Related to Data Sharing Technologies(IEEE, 2018-10-28) Harshanath, S. M. BuddhikaDigital transformation enables development and the testing of available applications for customer use, done in a smart way. It is also clear that the vast amounts of available data related to business cannot be easily handled in a day without the use of these mobile resources. Yet, privacy and security factors affect the release of more data for publishing or for exchanging purposes. Open data is ruled out due to insufficient available data for research as related to mobile devices where, there is a need for real data sets for testing purposes. The Internet of Things demands stronger security mechanisms to keep attacks at bay over buildings and automobiles. However, it must not be ignored that rules and regulations require considerable time to come into effect whereas, self-control imposed by a user made aware of the risks, takes little or no time at all.
