Näytä suppeat kuvailutiedot

dc.contributor.authorRauhala, Juhani
dc.contributor.editorLehto, Martti
dc.contributor.editorNeittaanmäki, Pekka
dc.date.accessioned2023-02-21T09:33:16Z
dc.date.available2023-02-21T09:33:16Z
dc.date.issued2022
dc.identifier.citationRauhala, J. (2022). Physical Weaponization of a Smartphone by a Third Party. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 445-460). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_19" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_19</a>
dc.identifier.otherCONVID_117609641
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85569
dc.description.abstractIn the literature and media, the treatment of the dangers and exposures posed by smartphones has generally focused on information security or privacy concerns. There have also been reports of fires, explosions, electric shocks, or loss of phone functionality due to faulty design or manufacture. This article provides an overview of acute physical and physiological dangers of smartphones that could be induced or triggered by a third party. It proposes a categorical discussion framework to describe and define the dangers in terms of attack vectors, effects on the smartphone, harms, and potential culprits/instigators. Counterfeit smartphones are themselves a significant potential threat in this context. Finally, some possible solutions and mitigation are suggested as preventive measures. Some templates for threat assessment forms are also proposed.en
dc.format.extent484
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofCyber Security : Critical Infrastructure Protection
dc.relation.ispartofseriesComputational Methods in Applied Sciences
dc.rightsIn Copyright
dc.subject.othertechnology acceptance
dc.subject.othersmartphone dangers
dc.subject.othertechnology abuse
dc.subject.otherunorthodox weaponization
dc.titlePhysical Weaponization of a Smartphone by a Third Party
dc.typebookPart
dc.identifier.urnURN:NBN:fi:jyu-202302211828
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/BookItem
dc.relation.isbn978-3-030-91292-5
dc.type.coarhttp://purl.org/coar/resource_type/c_3248
dc.description.reviewstatuspeerReviewed
dc.format.pagerange445-460
dc.relation.issn1871-3033
dc.type.versionacceptedVersion
dc.rights.copyright© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.subject.ysoälypuhelimet
dc.subject.ysoväärinkäyttö
dc.subject.ysovaarat (pinnanmuodot)
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p23821
jyx.subject.urihttp://www.yso.fi/onto/yso/p11535
jyx.subject.urihttp://www.yso.fi/onto/yso/p3054
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-030-91293-2_19
dc.type.okmA3


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright