Advisor

Security in Wireless Devices: Whose Problem Is It?

Posted November 2, 2010 | | Amplify

While the number of players involved in the delivery of mobile applications and services is large, the ultimate responsibility for security protection rests with the organization that does not want its reputation to be damaged by "whomever" of the players in the mobile value chain -- be it the equipment manufacturer, the network provider, the application vendor, or the end user/employee of the organization.

About The Author
Katia Passerini
Katia Passerini is Provost and Executive Vice President (EVP) of Seton Hall University. Passerini recently served as the Lesley H. and William L. Collins Distinguished Chair and Dean of the Lesley H. and William L. Collins College of Professional Studies at St. John's University. Previously, she was Professor and Hurlburt Chair of Management of Information Systems (MIS) and served as Dean of the Albert Dorman Honors College at New Jersey… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.