Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage

Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage

Karen Renaud, Wendy Goucher
Copyright: © 2013 |Volume: 3 |Issue: 4 |Pages: 12
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466634817|DOI: 10.4018/ijcwt.2013100105
Cite Article Cite Article

MLA

Renaud, Karen, and Wendy Goucher. "Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage." IJCWT vol.3, no.4 2013: pp.40-51. http://doi.org/10.4018/ijcwt.2013100105

APA

Renaud, K. & Goucher, W. (2013). Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage. International Journal of Cyber Warfare and Terrorism (IJCWT), 3(4), 40-51. http://doi.org/10.4018/ijcwt.2013100105

Chicago

Renaud, Karen, and Wendy Goucher. "Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage," International Journal of Cyber Warfare and Terrorism (IJCWT) 3, no.4: 40-51. http://doi.org/10.4018/ijcwt.2013100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mobile devices have diffused through the global population with unprecedented rapidity. This diffusion has delivered great benefits to the populace at large. In the third world people living in rural areas are now able to contact family members who live in other parts of the country for the first time. For the city-dweller the mobile device revolution has brought the ability to communicate and work on the move, while they travel to and from work, or between meetings, thus making ertswhile “dead” time more productive. It is trivial, nowadays, to utilise workplace functionality, and access confidential information, outside the four walls of the organisation's traditional boundaries. Data now moves across organisational boundaries, is stored on mobile devices, on USB sticks, and in emails, and also stored in the cloud. Organisations have somehow lost control over their data. This mobility and lack of control undeniably creates the potential for information leakage that could hurt the organisation. The almost ubiquitous camera-equipped mobile phones exacerbate the problem. These feature-rich phones change the threat from mere Shoulder Surfing into Visual Information Capture. Information is now no longer merely observed or overheard but potentially captured and retained without the knowledge of the person working on said documents in public. The first step in deciding how to manage any risk is to be able to estimate the extent and nature of the risk. This paper seeks to help organisations to understand the risk related to mobile working. We will model the mobile information leakage risk, depicting the factors that play a role in exacerbating and encouraging the threat. We then report on two experiments that investigated the vulnerability of data on laptops and tablet devices to visual information capture. The authors address both capability and likelihood (probability) of such leakage. The results deliver insight into the size of the Mobile Information Leakage risk. The following stage in this research will be to find feasible ways of mitigating the risk.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.