{"title":"移动设备安全威胁的系统映射","authors":"Anselmo Lacerda, R. D. de Queiroz, M. Barbosa","doi":"10.1109/ITECHA.2015.7317411","DOIUrl":null,"url":null,"abstract":"The increase in the use of mobile devices and the large amount of sensitive information that they store make them valuable targets for cybercriminals. In this work, we use the systematic mapping methodology to identify what are the main security incidents targeting mobile devices and what are their main causes. Finally, this research aims to propose some guidelines to avoid or minimize the extent of the damages provoked by these incidents.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A systematic mapping on security threats in mobile devices\",\"authors\":\"Anselmo Lacerda, R. D. de Queiroz, M. Barbosa\",\"doi\":\"10.1109/ITECHA.2015.7317411\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increase in the use of mobile devices and the large amount of sensitive information that they store make them valuable targets for cybercriminals. In this work, we use the systematic mapping methodology to identify what are the main security incidents targeting mobile devices and what are their main causes. Finally, this research aims to propose some guidelines to avoid or minimize the extent of the damages provoked by these incidents.\",\"PeriodicalId\":161782,\"journal\":{\"name\":\"2015 Internet Technologies and Applications (ITA)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Internet Technologies and Applications (ITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITECHA.2015.7317411\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Internet Technologies and Applications (ITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITECHA.2015.7317411","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A systematic mapping on security threats in mobile devices
The increase in the use of mobile devices and the large amount of sensitive information that they store make them valuable targets for cybercriminals. In this work, we use the systematic mapping methodology to identify what are the main security incidents targeting mobile devices and what are their main causes. Finally, this research aims to propose some guidelines to avoid or minimize the extent of the damages provoked by these incidents.