Information Security Policies for Networkable Devices

Information Security Policies for Networkable Devices

Julia Kotlarsky (University of Warwick, USA), Ilan Oshri (Rotterdam School of Management Erasmus, The Netherlands) and Corey Hirsch (Henley Management College, UK)
Copyright: © 2007 |Pages: 7
DOI: 10.4018/978-1-59140-987-8.ch055
OnDemand PDF Download:
No Current Special Offers


Recent years have seen a surge in the introduction of networkable Windows-based operating system (NWOS) devices. Some examples are home entertainment systems (e.g., Xbox), smart phones (e.g., Motorola i930 and PlamOne’s Treo), and Pocket PC (e.g., Toshiba e850). While NWOS devices present an appealing proposition for both software vendors and buyers in terms of the flexibility to add supplementary software applications, such devices also introduce new challenges in terms of managing information security risks. NWOS devices are particularly vulnerable to information security threats because of the vendors’ and buyers’ lack of awareness of the security risks associated with such devices. In addition to the direct damage to business operations that an infected NWOS device might cause, other consequences may also include alienated customers and a tarnished reputation (Austin & Darby, 2003).

Complete Chapter List

Search this Book: