Title
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness
Abstract
The new age of mobile communication brought on by the internet has meant that people now have mobile access to a wealth of information and services. Although the benefits of mobile information access are acknowledged through the empowering influence over its audience, a concern is noted with reference to largely uncensored forums offering mobile communication exchange to children. The proliferation of mobile technologies available, in conjunction with applications facilitating social networking, has steadily increased the attack surface minors are exposed to in an online environment. Most minors engaging in online activities do so through mobile technologies such as the cell phone. This device, as a consequence of its mobility, offers access to the internet that circumvents controls of supervision. This paper presents an approach that offers an alternative to existing solutions, available to the commercial market, that are driven by static configurations. The proposed solution seeks to avail a state of digital forensic readiness in order to deliver a proactive solution, this is accomplished through risk profiling of a user through usage which dictates the level of protection accordingly. It is suggested that this proposal will benefit children engaging in online interactions through the implementation of proactive strategies.
Year
DOI
Venue
2011
10.1109/ISSA.2011.6027507
Information Security South Africa
Keywords
Field
DocType
Internet,computer forensics,mobile computing,mobile radio,social networking (online),Internet,cell phone,digital forensic readiness,mobile communication exchange,mobile cyber-bullying,mobile information access,mobile technology,online environment,online interaction,risk mitigation,risk profiling,social networking,cell phone,children,cyber bullying,digital forensic readiness,internet,uncensored forums
Mobile computing,Mobile technology,Internet privacy,Attack surface,Digital forensics,Computer security,Computer science,Information access,Risk management,Mobile telephony,The Internet
Conference
ISBN
Citations 
PageRank 
978-1-4577-1481-8
2
0.66
References 
Authors
0
2
Name
Order
Citations
PageRank
Stephen Serra120.66
Hein S. Venter2588.01