@conference { , title = {The Risks and Opportunities of Mobile Working within Cloud Environments.}, abstract = {This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mobile devices for business and social uses, and define some best practice methods which can overcome these. This includes case study examples which show when things can go wrong, along with attempting to show how easy it is to break the security on a mobile device, using a practical and live demonstration.}, conference = {Practical Perspectives on Secure Mobile Working}, note = {Conference dates: February 2014 School: iidi}, organization = {Edinburgh}, publicationstatus = {Unpublished}, url = {http://researchrepository.napier.ac.uk/id/eprint/6848}, keyword = {004 Data processing & computer science, QA75 Electronic computers. Computer science, Cyber-security, Centre for Distributed Computing, Networking and Security, AI and Technologies, Business sytems, Cloud computing, mobile devices, computing security;}, year = {2024}, author = {Buchanan, William J and Smales, Adrian} }