How is the Way of Promoting Keitai Security for Business?
-
- Shoda Yoichi
- Mobile Society Research Institute, NTT DOCOMO, INC.
-
- Saito Kota
- Mobile Society Research Institute, NTT DOCOMO, INC.
-
- Yuhashi Hiroyasu
- Mobile Society Research Institute, NTT DOCOMO, INC.
Bibliographic Information
- Other Title
-
- ビジネス携帯の情報セキュリティ対策は万全か?
Abstract
Act for the Protection of Personal Information was enforced in April 2005. Since Keitai can store much confidential information, the risk of the information leak would be high in case of the loss or theft. This research investigated the security mind and setting of password for Keitai on business by questionnaire survey. We elucidate duties of the CIO for Keitai security by the analysis of the Attitude Transformation Model. In addition, we suggest the measures for information security vulnerabilities for the Keitai which a company should adopt for the Business Continuity Management (BCM) on the basis of an interview to the business persons from some excellent company in security perspective.
Journal
-
- Abstracts of Annual Conference of Japan Society for Management Information
-
Abstracts of Annual Conference of Japan Society for Management Information 2009s (0), 69-69, 2009
THE JAPAN SOCIETY FOR MANAGEMENT INFORMATION (JASMIN)
- Tweet
Details 詳細情報について
-
- CRID
- 1390001205710564352
-
- NII Article ID
- 130005049413
-
- Text Lang
- ja
-
- Data Source
-
- JaLC
- CiNii Articles
-
- Abstract License Flag
- Disallowed