Next Article in Journal
Diffusion of Open Data and Crowdsourcing among Heritage Institutions: Results of a Pilot Survey in Switzerland
Previous Article in Journal
Legal and Institutional Challenges for Opening Data across Public Sectors: Towards Common Policy Solutions
 
 
Journal of Theoretical and Applied Electronic Commerce Research is published by MDPI from Volume 16 Issue 3 (2021). Previous articles were published by another publisher in Open Access under a CC-BY 3.0 licence, and they are hosted by MDPI on mdpi.com as a courtesy and upon agreement with Faculty of Engineering of the Universidad de Talca.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments

1
Centre for Computer Security Research, University of Wollongong, Wollongong, Australia
2
Centre for Leadership and Knowledge Management, School of Management and Marketing, University of Wollongong, Wollongong, Australia
J. Theor. Appl. Electron. Commer. Res. 2006, 1(2), 79-89; https://doi.org/10.3390/jtaer1020015
Submission received: 5 December 2005 / Revised: 8 May 2006 / Accepted: 30 June 2006 / Published: 1 August 2006

Abstract

M-commerce, a growing sub-category of E-business, allows business to be done ‘anywhere, anytime’. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals’ use of and opinions about two types of WNVA: wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked and the fact that penetration testing is fairly well understood. In the light of organizational culture the survey findings become more explicable. Senior management, and even IT staff, may still hold a traditional, ‘wired network’ view of their organization. Aspects of organizational culture also appear to limit the way WNVA users go about the assessment process. A cultural shift could help change users’ perceptions about the risks and rewards of WNVAs. This could threaten IT staff’s professional identity, however, and needs further research.
Keywords: organizational culture; wireless network vulnerability assessment; computer security; m-commerce organizational culture; wireless network vulnerability assessment; computer security; m-commerce

Share and Cite

MDPI and ACS Style

Dyce, K.; Barrett, M. Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments. J. Theor. Appl. Electron. Commer. Res. 2006, 1, 79-89. https://doi.org/10.3390/jtaer1020015

AMA Style

Dyce K, Barrett M. Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments. Journal of Theoretical and Applied Electronic Commerce Research. 2006; 1(2):79-89. https://doi.org/10.3390/jtaer1020015

Chicago/Turabian Style

Dyce, Keir, and Mary Barrett. 2006. "Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments" Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2: 79-89. https://doi.org/10.3390/jtaer1020015

Article Metrics

Back to TopTop