Camera Phones as Theft Device

October 2007
Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p63
Trade Publication
The article discusses how camera cellular telephones can be used as theft devices. It is stated that camera cellular telephones can share pictures instantly and automatically through a sharing infrastructure integrated with the carrier network. Business enterprises are responding to real and potential misuse of camera phones.


Related Articles

  • Download huge files faster.  // Computer Active;Mar2014, Vol. 9 Issue 3, p56 

    The article discusses techniques on how to speed up the process of downloading large files. Topics include ways to speed up downloads on very slow broadband connections, ways on faster download of files from iTunes, and faster option when downloading files from phone and tablets. It also...

  • File Sharing: Selected Universities Report Taking Action to Reduce Copyright Infringement: GAO-04-503. Koontz, Linda D. // GAO Reports;5/28/2004, p1 

    The college and university officials we interviewed are aware of the use of file-sharing applications on their networks, almost all of them have experienced some problems and increased costs as a result of the use of these applications; therefore, they are taking steps to reduce the use of...

  • Robert W. Woodruff Library Installs Unisys PALS System.  // Information Today;Feb1992, Vol. 9 Issue 2, p46 

    This article reports that Robert W. Woodruff Library at the Atlanta, Georgia-based Atlanta University Center Inc., a consortium of the U.S.'s premier historical private black colleges, has installed the Unisys Corp.'s PALS library system. The Woodruff Library opened in January 1982 and has...

  • A ESTRATÉGIA DISCUTIDA ATRAVÉS DE VARIÁVEIS DA ADMINISTRAÇÃO: PERGUNTAS E RESPOSTAS. da Silva Siqueira, Eduardo Augusto Benedeti; da Cruz Silva, Sérgio; de Souza, Marco Antônio Ferreira // Revista Pretexto;Jan-Mar2011, Vol. 12 Issue 1, p55 

    The strategies are influenced by various factors known in the area of administration and management, such as sharing of information, culture and power, learning, motivation, quality, identity, and the different existing approaches, such as generic strategies of Porter, VBR and VBM. Much has been...

  • Bridging the Security Gap in Microsoft's Communication and Collaboration Platform.  // Database & Network Journal;Jun2011, Vol. 41 Issue 3, p8 

    In this article, the author discusses the issues regarding several enterprise communication and collaboration solutions from Microsoft Corp. including Exchange, Office Communications Server (OCS) and Sharepoint. The author states that online communication and collaboration are important to...

  • Transferring styles. Bradley, Helen // Australian PC User;Jun2009, Vol. 21 Issue 6, p90 

    The article provides an answer to a question on transfering specific formatting to another computer.

  • BETA WATCH. Albro, Edward N. // PCWorld;Apr2011, Vol. 29 Issue 4, p14 

    This article features a computer file-sharing service called Min.us and a Web service called VipID.

  • Share huge files without an account for free.  // Computer Active;Jun2014, Vol. 9 Issue 6, p72 

    The article offers step-by-step instructions on how to share huge files without an account for free with www.onetimeb ox.org.

  • DATA WAITING GAME.  // Telephony;11/8/2004, Vol. 245 Issue 22, p20 

    Comments on carriers' focus on driving users to their wireless data networks to take back the money they have spent on software overlays, new infrastructure, handset subsidies and spectrum licenses. Carriers and developers' failure to consider technologies that do not have a direct or obvious...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics