@book{14b1b1ad81a547689d0052d8d9318e8b,
title = "Information security threats and solutions in the mobile world: The service developer's perspective",
abstract = "This study examines the major information security threats relating to mobile services and solutions to these threats from the service developer's perspective. Research methods employed include interviews with enterprises, literature searches, expert opinions and extensive rounds of commentary. The fact that information security threats also concern mobile services and should be given serious consideration is the most important finding of the study. However, this does not mean information security issues would pose an obstacle to the development or introduction of mobile services. All information security issues need to be addressed at the very outset of the service development process. Methods and technological solutions that may also be utilized in mobile services have already been developed. Sets of instructions safeguarding e.g. the security of actions and processes are less readily available. The major information security threats facing developers of mobile services include the complexity of technological solutions, the illegal copying of content and programs, threats posed by the Internet, the different levels of various players in the service development process, and threats involving the identification of service users and servers and the confidentiality of information. Mobile services also involve other threats; however, since their significance to the service developer greatly depends on the nature of the service under development, it is difficult to assess the risks arising therefrom on a general level. The study describes alternative solutions to information security threats observed. Nevertheless, information security issues need to be examined individually for each service to be developed, as there are no universal solutions for information security. The service development process is addressed separately in the study and the significance of information security is expanded upon at each stage of the process from idea generation to service termination.",
keywords = "information security, threats, wireless telecommunication, mobile services, mobile networks, mobile devices, authentication, Identification, privacy",
author = "Pasi Ahonen and Juhani Eronen and Jarkko Holappa and Jorma Kajava and Tiina Kaksonen and Kati Karjalainen and Kaarina Karppinen and Mikko Rapeli and Juha R{\"o}ning and Anni Sademies and Reijo Savola and Ilkka Uusitalo and Timo Wiander",
note = "Project code: E5SU00589 ",
year = "2005",
language = "English",
isbn = "951-38-6737-4",
series = "VTT Tiedotteita - Meddelanden - Research Notes",
publisher = "VTT Technical Research Centre of Finland",
number = "2308",
address = "Finland",
}