As capabilities and functionality are added to devices the


As capabilities and functionality are added to devices, the differences between PC, e-reader, smartphone, and PDA gets blurred. We rely on current trends in terminology and categorization, but recognize that as mobile hardware evolves, new categories will emerge and traditional categories will become irrelevant At present, the benefits associated with mobile computing seem to outweigh potential security threats. However, as the number of people who engage in mobile computing increase, the likelihood that criminals will target mobile financial activity is sure to grow as well.

QUESTION:

What are the most common security risks associated with mobile computing?

Request for Solution File

Ask an Expert for Answer!!
Operation Management: As capabilities and functionality are added to devices the
Reference No:- TGS02211312

Expected delivery within 24 Hours