Dissemin is shutting down on January 1st, 2025

Published in

Elsevier, The Journal of Strategic Information Systems, 3(14), p. 307-321, 2005

DOI: 10.1016/j.jsis.2005.07.006

Links

Tools

Export citation

Search in Google Scholar

Modelling corporate wireless security and privacy

Journal article published in 2005 by Vasilios Katos ORCID, Carl Adams
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

As corporations adopt wireless technologies then both privacy and security landscapes change dramatically, causing a reassessment of how the wireless systems can be secured and at the same time ensuring privacy obligations to their customers, staff and shareholders are met. This paper explores the relationship between wireless security and privacy issues, and develops the foundation for metrics with which to develop and examine appropriate policies. The challenge is to get consistent and supportive security and privacy policies. In addition, the adoption of a wireless infrastructure will result in richer sets of information flows, requiring additional resources to achieve the same level of security as in a wired infrastructure. Richer sets of information are also likely to have a negative impact on privacy.