| Peer-Reviewed

Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects

Received: 7 June 2017     Accepted: 14 July 2017     Published: 3 August 2017
Views:       Downloads:
Abstract

Security concerns comprise a prominent phenomenon in industrial computing. Software counterfeiting, hardware cloning and loss of data are always at the center of IT professionalism’s thinking as it works to counteract those threats in the workspace. Still lacking however, is the awareness on security holes to industrial and personal computing, emanating from human behavior related to the end-users in the IT consumer blocks of the world, specifically the block of developing countries in Africa. In that context, the main purpose of this paper is to espouse the security holes from the end-user dimension as a way of sensitizing for inclusive security thinking among IT experts. The significance of the paper derives from at least two facts. One: while industrial computing is dominantly important, personal computing is also gaining prominence worldwide. As a result, complacency on security issues at this stage is no longer without felt consequences in industrial and mainstream computing. Two: as mobile technology use grows, so does the number of threats facing mobile data and platforms, as well as security vulnerability at personal computing level. This goes beyond the traditional data, software, and hardware concerns in industrial computing. It is noted that the level at which security concerns are stated makes a difference in the contemplation of solution options.

Published in International Journal of Data Science and Analysis (Volume 3, Issue 2)
DOI 10.11648/j.ijdsa.20170302.12
Page(s) 13-17
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2017. Published by Science Publishing Group

Keywords

End-User Computing, Industrial Computing, Mainstream Computing, Security

References
[1] BBC NEWS. (n. d). WannaCry ransomware cyber-attacks slow but fears remain - BBC News. Retrieved May 16, 2017, from http://www.bbc.com/news/technology-39920141.
[2] Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. Retrieved from http://www.jstor.org/stable/249008.
[3] Computer Economics, (2007). Trends in IT Security Threats: Executive Summary. Retrieved from http://www.computereconomics.com/article.cfm?id=1214.
[4] GSMA. (2016). The Mobile Economy: Africa 2016. GSMA Annual Report, 1–66. Retrieved from https://www.gsmaintelligence.com/research/?file=3bc21ea879a5b217b64d62fa24c55bdf&download.
[5] Hill, M. C, & Alan, B. W. (2011). End-User Computing Applications. The CPA Journal, 7, 67–71.
[6] IBM. (2017, April 27). A solution that addresses 4 key mobile security challenges. Data Center and Virtualization Media Group, p. 6. Retrieved from http://www.bitpipe.com/fulfillment/1481916529_964.
[7] ITU. (2011). Measuring the WSIS targets - a statistical framework. ITU.
[8] James, J, & Versteeg, M. (2007). Mobile phones in Africa: How much do we really know? Social Indicators Research, 84(1), 117–126. https://doi.org/10.1007/s11205-006-9079-x.
[9] Majzoobi, M, Koushanfar, F, & Potkonjak, M. (2008). Testing techniques for hardware security. Proceedings - International Test Conference, 1–10. https://doi.org/10.1109/TEST.2008.4700636.
[10] Ogunlesi, T; & Busari, S. (n.d.). Seven ways mobile phones have changed lives in Africa. Retrieved May 29, 2017, from http://edition.cnn.com/2012/09/13/world/africa/mobile-phones-change-africa/.
[11] Olavsrud, T. (n.d.). Top 4 security trends of 2016 | CIO. Retrieved May 16, 2017, from http://www.cio.com/article/3152347/security/top-4-security-trends-of-2016.html.
[12] Preyproject. (n.d.). Device tracking and protection. Retrieved May 17, 2017, from www.preyproject.com.
[13] Ratemo, J. (n.d.). Kenya’s smartphone owners turn to insurance. Retrieved June 6, 2017, from http://www.biztechafrica.com/article/kenyas-smartphone-owners-turn-insurance/9522/.
[14] Rose, G. S; McDonald, N; Yan, L. K; & Wysocki, B. (2013). A write-time based memristive PUF for hardware security applications. IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, 830–833. https://doi.org/10.1109/ICCAD.2013.6691209.
[15] Rostami, M; Koushanfar, F; & Karri, R. (2014). A primer on hardware security: Models, methods, and metrics. Proceedings of the IEEE, 102(8), 1283–1295. https://doi.org/10.1109/JPROC.2014.2335155.
[16] Rostami, M; Koushanfar, F; Rajendran, J; & Karri, R. (2013). Hardware security: Threat models and metrics. IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, 819–823. https://doi.org/10.1109/ICCAD.2013.6691207.
[17] Rouse, M. (n.d.). Security. Retrieved June 6, 2017, from http://searchsecurity.techtarget.com/definition/security?utm_content=control&utm_medium=EM&asrc=EM_ERU_76877080&utm_campaign=20170510_ERU Transmission for 05/10/2017%28UserUniverse:2366898%29&utm_source=ERU&src=5633804.
[18] Sparapani, J. (n. d). Signs point to cloud future at Red Hat Summit 2017. Retrieved May 10, 2017, from www.searchcio.techtarget.com.
[19] Subashini, S, & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. Retrieved from http://www.sciencedirect.com/science/article/pii/S1084804510001281.
[20] Tan, B. (2016). Balancing National Security Needs with Data Privacy and Freedom of Expression Concerns: Singapore’s Perspective. In C. Heinl & E. Tan (Eds.), Cybersecurity: Emerging Issues, Trends, Technologies and Threats in 2015 and Beyond (pp. 19–26). Singapore: RSIS.
[21] Wang, E. K; Ye, Y; Xu, X; Yiu, S. M; Hui, L. C. K; & Chow, K. P. (2010). Security Issues and Challenges for Cyber Physical System. 2010 IEEE/ACM Int’l Conference on Green Computing and Communications & Int’l Conference on Cyber, Physical and Social Computing, 733–738. https://doi.org/10.1109/GreenCom-CPSCom.2010.36.
[22] WSIS-03/GENEVA/DOC/9-E. (2004). REPORT OF THE GENEVA PHASE OF THE WORLD SUMMIT ON THE INFORMATION SOCIETY GENEVA - PALEXPO, 10 - 1 2 DECEMBER 2004. Geneva. Retrieved from https://www.itu.int/dms_pub/itu-s/md/03/wsis/doc/S03-WSIS-DOC-0009!R1!PDF-E.pdf.
[23] WSIS-05/TUNIS/DOC/9(Rev.1)-E. (2006). Report of the Tunis phase of the World Summit on the Information Society, Tunis, Kram Palexpo, 16-18 November 2005. Tunis. Retrieved from http://www.itu.int/net/wsis/docs2/tunis/off/9rev1.pdf.
Cite This Article
  • APA Style

    Tibuhinda Ngonzi. (2017). Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects. International Journal of Data Science and Analysis, 3(2), 13-17. https://doi.org/10.11648/j.ijdsa.20170302.12

    Copy | Download

    ACS Style

    Tibuhinda Ngonzi. Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects. Int. J. Data Sci. Anal. 2017, 3(2), 13-17. doi: 10.11648/j.ijdsa.20170302.12

    Copy | Download

    AMA Style

    Tibuhinda Ngonzi. Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects. Int J Data Sci Anal. 2017;3(2):13-17. doi: 10.11648/j.ijdsa.20170302.12

    Copy | Download

  • @article{10.11648/j.ijdsa.20170302.12,
      author = {Tibuhinda Ngonzi},
      title = {Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects},
      journal = {International Journal of Data Science and Analysis},
      volume = {3},
      number = {2},
      pages = {13-17},
      doi = {10.11648/j.ijdsa.20170302.12},
      url = {https://doi.org/10.11648/j.ijdsa.20170302.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijdsa.20170302.12},
      abstract = {Security concerns comprise a prominent phenomenon in industrial computing. Software counterfeiting, hardware cloning and loss of data are always at the center of IT professionalism’s thinking as it works to counteract those threats in the workspace. Still lacking however, is the awareness on security holes to industrial and personal computing, emanating from human behavior related to the end-users in the IT consumer blocks of the world, specifically the block of developing countries in Africa. In that context, the main purpose of this paper is to espouse the security holes from the end-user dimension as a way of sensitizing for inclusive security thinking among IT experts. The significance of the paper derives from at least two facts. One: while industrial computing is dominantly important, personal computing is also gaining prominence worldwide. As a result, complacency on security issues at this stage is no longer without felt consequences in industrial and mainstream computing. Two: as mobile technology use grows, so does the number of threats facing mobile data and platforms, as well as security vulnerability at personal computing level. This goes beyond the traditional data, software, and hardware concerns in industrial computing. It is noted that the level at which security concerns are stated makes a difference in the contemplation of solution options.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects
    AU  - Tibuhinda Ngonzi
    Y1  - 2017/08/03
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ijdsa.20170302.12
    DO  - 10.11648/j.ijdsa.20170302.12
    T2  - International Journal of Data Science and Analysis
    JF  - International Journal of Data Science and Analysis
    JO  - International Journal of Data Science and Analysis
    SP  - 13
    EP  - 17
    PB  - Science Publishing Group
    SN  - 2575-1891
    UR  - https://doi.org/10.11648/j.ijdsa.20170302.12
    AB  - Security concerns comprise a prominent phenomenon in industrial computing. Software counterfeiting, hardware cloning and loss of data are always at the center of IT professionalism’s thinking as it works to counteract those threats in the workspace. Still lacking however, is the awareness on security holes to industrial and personal computing, emanating from human behavior related to the end-users in the IT consumer blocks of the world, specifically the block of developing countries in Africa. In that context, the main purpose of this paper is to espouse the security holes from the end-user dimension as a way of sensitizing for inclusive security thinking among IT experts. The significance of the paper derives from at least two facts. One: while industrial computing is dominantly important, personal computing is also gaining prominence worldwide. As a result, complacency on security issues at this stage is no longer without felt consequences in industrial and mainstream computing. Two: as mobile technology use grows, so does the number of threats facing mobile data and platforms, as well as security vulnerability at personal computing level. This goes beyond the traditional data, software, and hardware concerns in industrial computing. It is noted that the level at which security concerns are stated makes a difference in the contemplation of solution options.
    VL  - 3
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Accountancy and Finance, Saint Augustine University of Tanzania, Mwanza, Tanzania

  • Sections