Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects
International Journal of Data Science and Analysis
Volume 3, Issue 2, April 2017, Pages: 13-17
Received: Jun. 7, 2017; Accepted: Jul. 14, 2017; Published: Aug. 3, 2017
Views 1890      Downloads 118
Author
Tibuhinda Ngonzi, Department of Accountancy and Finance, Saint Augustine University of Tanzania, Mwanza, Tanzania
Article Tools
Follow on us
Abstract
Security concerns comprise a prominent phenomenon in industrial computing. Software counterfeiting, hardware cloning and loss of data are always at the center of IT professionalism’s thinking as it works to counteract those threats in the workspace. Still lacking however, is the awareness on security holes to industrial and personal computing, emanating from human behavior related to the end-users in the IT consumer blocks of the world, specifically the block of developing countries in Africa. In that context, the main purpose of this paper is to espouse the security holes from the end-user dimension as a way of sensitizing for inclusive security thinking among IT experts. The significance of the paper derives from at least two facts. One: while industrial computing is dominantly important, personal computing is also gaining prominence worldwide. As a result, complacency on security issues at this stage is no longer without felt consequences in industrial and mainstream computing. Two: as mobile technology use grows, so does the number of threats facing mobile data and platforms, as well as security vulnerability at personal computing level. This goes beyond the traditional data, software, and hardware concerns in industrial computing. It is noted that the level at which security concerns are stated makes a difference in the contemplation of solution options.
Keywords
End-User Computing, Industrial Computing, Mainstream Computing, Security
To cite this article
Tibuhinda Ngonzi, Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects, International Journal of Data Science and Analysis. Vol. 3, No. 2, 2017, pp. 13-17. doi: 10.11648/j.ijdsa.20170302.12
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
BBC NEWS. (n. d). WannaCry ransomware cyber-attacks slow but fears remain - BBC News. Retrieved May 16, 2017, from http://www.bbc.com/news/technology-39920141.
[2]
Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. Retrieved from http://www.jstor.org/stable/249008.
[3]
Computer Economics, (2007). Trends in IT Security Threats: Executive Summary. Retrieved from http://www.computereconomics.com/article.cfm?id=1214.
[4]
GSMA. (2016). The Mobile Economy: Africa 2016. GSMA Annual Report, 1–66. Retrieved from https://www.gsmaintelligence.com/research/?file=3bc21ea879a5b217b64d62fa24c55bdf&download.
[5]
Hill, M. C, & Alan, B. W. (2011). End-User Computing Applications. The CPA Journal, 7, 67–71.
[6]
IBM. (2017, April 27). A solution that addresses 4 key mobile security challenges. Data Center and Virtualization Media Group, p. 6. Retrieved from http://www.bitpipe.com/fulfillment/1481916529_964.
[7]
ITU. (2011). Measuring the WSIS targets - a statistical framework. ITU.
[8]
James, J, & Versteeg, M. (2007). Mobile phones in Africa: How much do we really know? Social Indicators Research, 84(1), 117–126. https://doi.org/10.1007/s11205-006-9079-x.
[9]
Majzoobi, M, Koushanfar, F, & Potkonjak, M. (2008). Testing techniques for hardware security. Proceedings - International Test Conference, 1–10. https://doi.org/10.1109/TEST.2008.4700636.
[10]
Ogunlesi, T; & Busari, S. (n.d.). Seven ways mobile phones have changed lives in Africa. Retrieved May 29, 2017, from http://edition.cnn.com/2012/09/13/world/africa/mobile-phones-change-africa/.
[11]
Olavsrud, T. (n.d.). Top 4 security trends of 2016 | CIO. Retrieved May 16, 2017, from http://www.cio.com/article/3152347/security/top-4-security-trends-of-2016.html.
[12]
Preyproject. (n.d.). Device tracking and protection. Retrieved May 17, 2017, from www.preyproject.com.
[13]
Ratemo, J. (n.d.). Kenya’s smartphone owners turn to insurance. Retrieved June 6, 2017, from http://www.biztechafrica.com/article/kenyas-smartphone-owners-turn-insurance/9522/.
[14]
Rose, G. S; McDonald, N; Yan, L. K; & Wysocki, B. (2013). A write-time based memristive PUF for hardware security applications. IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, 830–833. https://doi.org/10.1109/ICCAD.2013.6691209.
[15]
Rostami, M; Koushanfar, F; & Karri, R. (2014). A primer on hardware security: Models, methods, and metrics. Proceedings of the IEEE, 102(8), 1283–1295. https://doi.org/10.1109/JPROC.2014.2335155.
[16]
Rostami, M; Koushanfar, F; Rajendran, J; & Karri, R. (2013). Hardware security: Threat models and metrics. IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, 819–823. https://doi.org/10.1109/ICCAD.2013.6691207.
[17]
Rouse, M. (n.d.). Security. Retrieved June 6, 2017, from http://searchsecurity.techtarget.com/definition/security?utm_content=control&utm_medium=EM&asrc=EM_ERU_76877080&utm_campaign=20170510_ERU Transmission for 05/10/2017%28UserUniverse:2366898%29&utm_source=ERU&src=5633804.
[18]
Sparapani, J. (n. d). Signs point to cloud future at Red Hat Summit 2017. Retrieved May 10, 2017, from www.searchcio.techtarget.com.
[19]
Subashini, S, & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. Retrieved from http://www.sciencedirect.com/science/article/pii/S1084804510001281.
[20]
Tan, B. (2016). Balancing National Security Needs with Data Privacy and Freedom of Expression Concerns: Singapore’s Perspective. In C. Heinl & E. Tan (Eds.), Cybersecurity: Emerging Issues, Trends, Technologies and Threats in 2015 and Beyond (pp. 19–26). Singapore: RSIS.
[21]
Wang, E. K; Ye, Y; Xu, X; Yiu, S. M; Hui, L. C. K; & Chow, K. P. (2010). Security Issues and Challenges for Cyber Physical System. 2010 IEEE/ACM Int’l Conference on Green Computing and Communications & Int’l Conference on Cyber, Physical and Social Computing, 733–738. https://doi.org/10.1109/GreenCom-CPSCom.2010.36.
[22]
WSIS-03/GENEVA/DOC/9-E. (2004). REPORT OF THE GENEVA PHASE OF THE WORLD SUMMIT ON THE INFORMATION SOCIETY GENEVA - PALEXPO, 10 - 1 2 DECEMBER 2004. Geneva. Retrieved from https://www.itu.int/dms_pub/itu-s/md/03/wsis/doc/S03-WSIS-DOC-0009!R1!PDF-E.pdf.
[23]
WSIS-05/TUNIS/DOC/9(Rev.1)-E. (2006). Report of the Tunis phase of the World Summit on the Information Society, Tunis, Kram Palexpo, 16-18 November 2005. Tunis. Retrieved from http://www.itu.int/net/wsis/docs2/tunis/off/9rev1.pdf.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186