Reference Hub2
Mobile Government and Defense

Mobile Government and Defense

Jim Jones
Copyright: © 2012 |Pages: 12
ISBN13: 9781613501504|ISBN10: 1613501501|EISBN13: 9781613501511
DOI: 10.4018/978-1-61350-150-4.ch005
Cite Chapter Cite Chapter

MLA

Jones, Jim. "Mobile Government and Defense." Mobile Technology Consumption: Opportunities and Challenges, edited by Barbara L. Ciaramitaro, IGI Global, 2012, pp. 65-76. https://doi.org/10.4018/978-1-61350-150-4.ch005

APA

Jones, J. (2012). Mobile Government and Defense. In B. Ciaramitaro (Ed.), Mobile Technology Consumption: Opportunities and Challenges (pp. 65-76). IGI Global. https://doi.org/10.4018/978-1-61350-150-4.ch005

Chicago

Jones, Jim. "Mobile Government and Defense." In Mobile Technology Consumption: Opportunities and Challenges, edited by Barbara L. Ciaramitaro, 65-76. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-150-4.ch005

Export Reference

Mendeley
Favorite

Abstract

The Government, Military, and Intelligence communities of the United States and other countries are adopting mobile technologies almost as quickly as commercial entities, and in some cases are going beyond the applications we see in the commercial space. Government services, such as information access and certain transactions, are rapidly adopting mobile delivery mechanisms. The military is using mobile technology to share static information as well, but is also providing live data feeds and information sharing to support combat operations. Intelligence agencies are using mobile devices as a data collection platform for their own agents, and are also accessing the mobile devices of enemy agents and intelligence targets to collect data surreptitiously. Military operations face unique challenges, given that they are often conducted in regions without existing networks and against an enemy trying to actively disrupt communications. The Government, Defense, and Intelligence communities all face the challenge of securing mobile devices and data in response to regulatory and statutory requirements, as well as a dynamic and evolving threat space of identity thieves, hackers/crackers, hostile military forces, and foreign intelligence services.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.