Reference Hub15
The Future of National and International Security on the Internet

The Future of National and International Security on the Internet

Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Copyright: © 2014 |Pages: 30
ISBN13: 9781466661585|ISBN10: 1466661585|EISBN13: 9781466661592
DOI: 10.4018/978-1-4666-6158-5.ch009
Cite Chapter Cite Chapter

MLA

Dawson, Maurice, et al. "The Future of National and International Security on the Internet." Information Security in Diverse Computing Environments, edited by Anne Kayem and Christoph Meinel, IGI Global, 2014, pp. 149-178. https://doi.org/10.4018/978-1-4666-6158-5.ch009

APA

Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and International Security on the Internet. In A. Kayem & C. Meinel (Eds.), Information Security in Diverse Computing Environments (pp. 149-178). IGI Global. https://doi.org/10.4018/978-1-4666-6158-5.ch009

Chicago

Dawson, Maurice, et al. "The Future of National and International Security on the Internet." In Information Security in Diverse Computing Environments, edited by Anne Kayem and Christoph Meinel, 149-178. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-6158-5.ch009

Export Reference

Mendeley
Favorite

Abstract

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.