Show Less
Restricted access

Facing ICT Challenges in the Era of Social Media

Edited By Zoran Levnajic

World Wide Web is becoming an utility, not unlike electricity or running water in our homes. This creates new ways of using the web, where Social Media plays a particular role. This gives an unprecedented opportunity to study the emerging social phenomena in the virtual world. In addition, it opens new avenues for improving public services such as schooling and education. This book includes some of the latest developments in employing the information and communications technologies for examining both virtual and real-life social interactions. Investigating modern challenges such as online education, web security or organized cybercrime, this book outlines the state of the art in social applications and implications of ICT.
Show Summary Details
Restricted access

Secure Usage of Mobile Devices – Slovenian Survey


Blaž Markelj, Igor Bernik

Faculty of Criminal Justice and Security, University of Maribor, Slovenia


Providing security for sophisticated mobile devices is quite a difficult task. Even though numerous modern tools for ensuring advanced levels of security for users are available, these tools primarily deal with the technical aspects of supporting the safer usage of mobile devices. This said, the other factor in information security, the user, is often disregarded. Without constantly informing and educating users, data cannot be properly protected and information cannot be maintained. Numerous studies, including the presented one, show that users are not well aware of the dangers threatening mobile device users, and that they are even less informed about the, often freely available, solutions for protecting mobile devices and the access to data. In short, even the best technical solutions cannot help, if the user does not know which safety procedures to use. If would be sensible to outline guidelines for using mobile devices more safely, based on the data gained from the presented study and the data from studies conducted abroad. In accord with these guidelines, information security can only be established by interweaving advanced technical solutions with the unceasing education of users. In the future, the fast pace of the development of mobile technology will continue, therefore, it is imperative that the areas of information security are continuously upgraded, that new technical solutions are developed, and that each user of mobile information technology is well informed about...

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.