posted by user: Cutter || 4784 views || tracked by 7 users: [display]

CITJ Mobile Security 2014 : Cutter IT Journal Call for Papers on Mobile Security

FacebookTwitterLinkedInGoogle

Link: http://blog.cutter.com/2014/09/23/call-for-papers-mobile-security-managing-the-madness/
 
When N/A
Where N/A
Submission Deadline Oct 27, 2014
Final Version Due Nov 27, 2014
Categories    mobile   security   enterprise
 

Call For Papers

Mobile devices are rapidly over taking PC usage providing employees the convenience of using their mobile devices to perform their jobs wherever and whenever they see fit. This has given rise to a whole new set of challenges as business data and systems can be accessed anywhere/anytime. The benefits of BYOD are vast, as are the risks.

An upcoming issue of Cutter IT Journal seeks insight on the steps that can be taken to manage and mitigate the major risks at both the organizational and individual level.

ARTICLE IDEAS DUE 27 OCTOBER. FINAL ARTICLES DUE 24 NOVEMBER, 2014.

Topics may include, but are not limited to, the following:

* Is mobile security any different than regular security in a PC or Internet context?
* What are some threats that are unique to mobile, like baseband OS attacks?
* What is the more vulnerable attack point — the device or the cloud services that support them?
* What are the best practices for building a secure mobile application?
* What have we learned from recent privacy breaches that can inform our own mobile security “hygiene?”
* In the era of BYOD, how does enterprise IT deal with mobile security?

For more information:
http://blog.cutter.com/2014/09/23/call-for-papers-mobile-security-managing-the-madness/

Related Resources

Migrating Minds 4 (1), 2026   Migrating Minds. Journal of Cultural Cosmopolitanism -- Call for papers for Vol. 4, Issue 1, Spring 2026
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IJIBM 2025   IJIBM 2025 : Call For Papers - International Journal of Information, Business and Management
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
OP 2025   Call for Papers - Kant's Concept of Spontaneity and Its Legacy in Later Theories of Subjectivity
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
EX CHORDIS_Call for Papers 2025   Call for Papers: Ex Chordis. A Bowed Strings Journal [ISSN 3034-8781], Issue IV/2025
SECRYPT 2025   22nd International Conference on Security and Cryptography
Carpathian culture and heritage 2025   Call for Papers: The cultures and heritage of the communities along the Carpathian Arc
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications