dc.contributor.author | Rauhala, Juhani | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2023-02-21T09:33:16Z | |
dc.date.available | 2023-02-21T09:33:16Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Rauhala, J. (2022). Physical Weaponization of a Smartphone by a Third Party. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 445-460). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_19" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_19</a> | |
dc.identifier.other | CONVID_117609641 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85569 | |
dc.description.abstract | In the literature and media, the treatment of the dangers and exposures posed by smartphones has generally focused on information security or privacy concerns. There have also been reports of fires, explosions, electric shocks, or loss of phone functionality due to faulty design or manufacture. This article provides an overview of acute physical and physiological dangers of smartphones that could be induced or triggered by a third party. It proposes a categorical discussion framework to describe and define the dangers in terms of attack vectors, effects on the smartphone, harms, and potential culprits/instigators. Counterfeit smartphones are themselves a significant potential threat in this context. Finally, some possible solutions and mitigation are suggested as preventive measures. Some templates for threat assessment forms are also proposed. | en |
dc.format.extent | 484 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cyber Security : Critical Infrastructure Protection | |
dc.relation.ispartofseries | Computational Methods in Applied Sciences | |
dc.rights | In Copyright | |
dc.subject.other | technology acceptance | |
dc.subject.other | smartphone dangers | |
dc.subject.other | technology abuse | |
dc.subject.other | unorthodox weaponization | |
dc.title | Physical Weaponization of a Smartphone by a Third Party | |
dc.type | bookPart | |
dc.identifier.urn | URN:NBN:fi:jyu-202302211828 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-030-91292-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 445-460 | |
dc.relation.issn | 1871-3033 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | älypuhelimet | |
dc.subject.yso | väärinkäyttö | |
dc.subject.yso | vaarat (pinnanmuodot) | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p23821 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11535 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3054 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-91293-2_19 | |
dc.type.okm | A3 | |