Published: February 1, 2012
Citation: Computer (IEEE Computer) vol. 45, no. 2, (February 2012) pp. 82-84
Author(s)
A. Stavrou, Jeffrey Voas, Tom Karygiannis, Stephen Quirolgico
Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. Indeed, these new hand-held devices are capable of carrying significant amount of both personal and professional data including documents thus extending the operations that we can perform from desktop to small-factor devices. Unfortunately, this reliance on hand-held devices has made them an attractive target for applications and new mobile application markets have spawn for the different types of devices.
Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. Indeed, these new hand-held devices are capable of...
See full abstract
Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. Indeed, these new hand-held devices are capable of carrying significant amount of both personal and professional data including documents thus extending the operations that we can perform from desktop to small-factor devices. Unfortunately, this reliance on hand-held devices has made them an attractive target for applications and new mobile application markets have spawn for the different types of devices.
Hide full abstract
Keywords
smartphones; security; Android
Control Families
None selected