{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:41:19Z","timestamp":1654130479402},"reference-count":29,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Mobile devices have diffused through the global population with unprecedented rapidity. This diffusion has delivered great benefits to the populace at large. In the third world people living in rural areas are now able to contact family members who live in other parts of the country for the first time. For the city-dweller the mobile device revolution has brought the ability to communicate and work on the move, while they travel to and from work, or between meetings, thus making ertswhile \u201cdead\u201d time more productive. It is trivial, nowadays, to utilise workplace functionality, and access confidential information, outside the four walls of the organisation's traditional boundaries. Data now moves across organisational boundaries, is stored on mobile devices, on USB sticks, and in emails, and also stored in the cloud. Organisations have somehow lost control over their data. This mobility and lack of control undeniably creates the potential for information leakage that could hurt the organisation. The almost ubiquitous camera-equipped mobile phones exacerbate the problem. These feature-rich phones change the threat from mere Shoulder Surfing into Visual Information Capture. Information is now no longer merely observed or overheard but potentially captured and retained without the knowledge of the person working on said documents in public. The first step in deciding how to manage any risk is to be able to estimate the extent and nature of the risk. This paper seeks to help organisations to understand the risk related to mobile working. We will model the mobile information leakage risk, depicting the factors that play a role in exacerbating and encouraging the threat. We then report on two experiments that investigated the vulnerability of data on laptops and tablet devices to visual information capture. The authors address both capability and likelihood (probability) of such leakage. The results deliver insight into the size of the Mobile Information Leakage risk. The following stage in this research will be to find feasible ways of mitigating the risk.<\/p>","DOI":"10.4018\/ijcwt.2013100105","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T14:26:13Z","timestamp":1397053573000},"page":"40-51","source":"Crossref","is-referenced-by-count":0,"title":["Monkey See - Monkey Take Photo"],"prefix":"10.4018","volume":"3","author":[{"given":"Karen","family":"Renaud","sequence":"first","affiliation":[{"name":"School of Computing Science, University of Glasgow, Glasgow, UK"}]},{"given":"Wendy","family":"Goucher","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, UK"}]}],"member":"2432","reference":[{"key":"ijcwt.2013100105-0","unstructured":"Anderson, R., Bond, M., & Murdoch, S. J. (2006). Chip and spin. Retrieved February 8, 2013, from http:\/\/www.chipandspin.co.uk\/"},{"key":"ijcwt.2013100105-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.07.001"},{"key":"ijcwt.2013100105-2","doi-asserted-by":"publisher","DOI":"10.2307\/3654679"},{"key":"ijcwt.2013100105-3","unstructured":"comScore Data Mine. (2012). 15.5 percent of European smartphone owners have a tablet. Retrieved from http:\/\/www.comscoredatamine.com\/2012\/11\/15-5-percent-of-european-smartphone-owners-have-a-tablet\/"},{"key":"ijcwt.2013100105-4","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70049-1"},{"key":"ijcwt.2013100105-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0665-4_9"},{"key":"ijcwt.2013100105-6","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70155-X"},{"key":"ijcwt.2013100105-7","doi-asserted-by":"crossref","unstructured":"Goucher, W. (2011). In a world of their own: Working on the move. In Proceedings of the HCI 2011, Newcastle, UK.","DOI":"10.14236\/ewic\/HCI2011.77"},{"key":"ijcwt.2013100105-8","unstructured":"Honan, B. (2012). Secure, visual security white paper. The European Association of Visual Security. Retrieved February 8, 2013, from http:\/\/www.visualdatasecurity.eu\/visual-data-security\/"},{"key":"ijcwt.2013100105-9","unstructured":"ISO\/DIS 31000. (2009). Risk management \u2014 Principles and guidelines on implementation. International Organization for Standardization."},{"key":"ijcwt.2013100105-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtrangeo.2007.05.001"},{"key":"ijcwt.2013100105-11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21375-5_17"},{"key":"ijcwt.2013100105-12","unstructured":"Kristoffersen, S., & Ljungberg, F. (1998). Representing modalities in mobile computing. In Proceedings of Interactive Applications of Mobile Computing."},{"key":"ijcwt.2013100105-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtrangeo.2010.07.002"},{"key":"ijcwt.2013100105-14","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.52"},{"key":"ijcwt.2013100105-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2006.05.012"},{"key":"ijcwt.2013100105-16","unstructured":"Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., & Zanero, S. (2011). Fast, automatic iPhone shoulder surfing. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) (pp. 805-808). New York, NY: ACM."},{"key":"ijcwt.2013100105-17","unstructured":"Middleton, J. (2007). Global mobile penetration hits 50% today. Retrieved from http:\/\/www.telecoms.com\/1837\/global-mobile-penetration-hits-50-today\/"},{"key":"ijcwt.2013100105-18","author":"K. W.Miller","year":"2012","journal-title":"BYOD: Security and privacy considerations"},{"key":"ijcwt.2013100105-19","doi-asserted-by":"crossref","unstructured":"Okenyi, P., & Owens, T. (2007). The anatomy of human hacking. Information Security Journal: A Global Perspective, 16(6), 302-314.","DOI":"10.1080\/10658980701747237"},{"key":"ijcwt.2013100105-20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1984.tb00194.x"},{"key":"ijcwt.2013100105-21","unstructured":"Owen, G. (2008). The zzzzivil servant who fell asleep on the train with laptop secrets in full view. Mail Online. Retrieved February 8, 2013, from http:\/\/www.dailymail.co.uk\/news\/article-1082375\/The-zzzzivil-servant-fell-asleep-train-laptop-secrets-view.html"},{"key":"ijcwt.2013100105-22","doi-asserted-by":"crossref","unstructured":"Renaud, K., & Maguire, J. (2009). Armchair authentication. In Proceedings HCI 2009. People and Computers XXIII Celebrating People and Technology. Cambridge, UK (pp 388-397).","DOI":"10.14236\/ewic\/HCI2009.48"},{"key":"ijcwt.2013100105-23","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70070-8"},{"key":"ijcwt.2013100105-24","doi-asserted-by":"publisher","DOI":"10.1126\/science.1207745"},{"issue":"1","key":"ijcwt.2013100105-25","first-page":"47","article-title":"Data loss prevention technologies.","volume":"46","author":"T.Takebayashi","year":"2010","journal-title":"Fujitsu Scientific and Technical Journal"},{"key":"ijcwt.2013100105-26","unstructured":"Thomson, H. H. (2010) Visual data breach risk assessment study 2010 for 3M and with people security. Retrieved February 8, 2013, from http:\/\/solutions.3m.com\/wps\/portal\/3M\/en_US\/3MScreens_NA\/Protectors\/For_Organizations\/Industry_Whitepapers\/Visual_Data_Breach_Risk_Assessment\/"},{"key":"ijcwt.2013100105-27","unstructured":"UK Cyber Security Strategy. (n.d.). Protecting and promoting UK in a digital world. Retrieved October 20, 2013, from https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/60961\/uk-cyber-security-strategy-final.pdf"},{"key":"ijcwt.2013100105-28","author":"J.Worthington","year":"1998","journal-title":"Reinventing the workplace"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:07:07Z","timestamp":1654128427000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013100105"}},"subtitle":["The Risk of Mobile Information Leakage"],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013100105","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}