A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
As information technology environment gets based on mobile, cloud, BYOD, mobile terminal just used for communication in the past is changed to support e-commerce and mobile office using the internet. However, threat of tap and information leak due to terminal loss, theft or infection of malware occurs. Corporations are strengthening access control and security through attaching sticker to a smart phone camera but it looks not enough as fundamental protection measures. In order to maintain highdoi:10.14257/ijsia.2015.9.10.34 fatcat:og4tvc6ybnfchbr6xbpafk3xza