{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:05:13Z","timestamp":1754157913886,"version":"3.41.2"},"reference-count":19,"publisher":"Emerald","issue":"1\/2","license":[{"start":{"date-parts":[[2004,6,1]],"date-time":"2004-06-01T00:00:00Z","timestamp":1086048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,6,1]]},"abstract":"<jats:p>Viruses, worms, Trojan horses, spywares have been effective for quite sometime in the domain of digital computers. These malicious software cause millions of dollars of loss in assets, revenue, opportunity, cleanup cost, and lost productivity. To stop virus attacks, organizations frame up different security policies. These policies work only within the limited domain of the organization\u2019s network. However, the emergence of wireless technologies, and the seamless mobility features of the wireless devices from one network to the other have created a challenge to uphold the security policies of a particular network. Hence, in this digital society, while mobile devices roam in foreign networks, they get infected through viruses in the foreign network. Anti\u2010virus software is not so effective for novel viruses. There have been no reports of mobile\u2010phone viruses in the wild as yet. However, with the emergence of execution environments on mobile phones, it will be possible to write viruses and worms for mobile devices in cellular networks. We should be prepared to fight against viruses in the cellular networks. All the technologies available to fight against viruses are specific to virus signatures. We propose that this fight needs to be multilayered. In this paper the authors have proposed a novel philosophy in cellular network called Artificial Hygiene (AH), which is virus neutral and will work at the class level. With this process a device and the network will take the necessary steps to keep the digital environment safe. <\/jats:p>","DOI":"10.1108\/13287260480000779","type":"journal-article","created":{"date-parts":[[2010,6,5]],"date-time":"2010-06-05T07:20:42Z","timestamp":1275722442000},"page":"10-22","source":"Crossref","is-referenced-by-count":1,"title":["Artificial hygiene: Non\u2010proliferation of viruses in cellular networks"],"prefix":"10.1108","volume":"8","author":[{"given":"Asoke K","family":"Talukder","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Debabrata","family":"Das","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"volume-title":"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/2690253.stm, Jan 2003, 2003","author":"News","key":"p_1"},{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176998"},{"volume-title":"IEEE SPECTRUM","year":"2001","author":"Cass Stephen","key":"p_4"},{"volume-title":"http:\/\/www.cnn.com\/2003\/TECH\/10\/15\/itu.security\/, Oct 2003, 2003","author":"CNN","key":"p_6"},{"volume-title":"Software experts find 'first' mobile virus","year":"2004","author":"Forbes","key":"p_7"},{"volume-title":"RFC 2196, (September","year":"1997","author":"Fraser B.","key":"p_8"},{"volume-title":"Filtering of Undesirable Content in a Distributed Environment over the Internet, accepted for presentation at Asia Pacific Conference on Parallel and Distributed Computing Technologies (ObComAPC2004)","year":"2004","author":"Jose C.","key":"p_9"},{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1109\/6.275061"},{"volume-title":"IEEE Computer Magazine","year":"2004","author":"Keromytis A. D.","key":"p_11"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1109\/6294.918222"},{"volume-title":"Proceedings of Third SIAM International Conference on Data Mining","year":"2003","author":"Lazarevic L.","key":"p_13"},{"key":"p_14","volume-title":"Science","volume":"292","author":"Lloyd L.","year":"2001"},{"volume-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy","year":"2001","author":"Lorenz G.","key":"p_15"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035101"},{"key":"p_17","volume-title":"Ms Banarsidas Bhanot","author":"Park K.","year":"2000","edition":"16"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"p_21","first-page":"484","volume-title":"Proceedings of IEEE INDICON 2004","author":"Talukder A. K.","year":"2004"},{"volume-title":"HPL2003-103","year":"2003","author":"Twycross J.","key":"p_24"},{"volume-title":"Very Fast Containment of Scanning Worms","year":"2004","author":"Weaver N.","key":"p_26"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13287260480000779\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13287260480000779\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:24:10Z","timestamp":1753403050000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/8\/1-2\/10-22\/255982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6,1]]},"references-count":19,"journal-issue":{"issue":"1\/2","published-print":{"date-parts":[[2004,6,1]]}},"alternative-id":["10.1108\/13287260480000779"],"URL":"https:\/\/doi.org\/10.1108\/13287260480000779","relation":{},"ISSN":["1328-7265"],"issn-type":[{"type":"print","value":"1328-7265"}],"subject":[],"published":{"date-parts":[[2004,6,1]]}}}