Information security challenge of QR codes
Access Status
Authors
Date
2013Type
Metadata
Show full item recordCitation
Source Title
Additional URLs
ISSN
School
Collection
Abstract
The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security issues that must be considered by professionals in the area. It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the processes and procedures used by Information Security professionals.
Related items
Showing items related by title, author, creator and subject.
-
Nguyen, Hong-Oanh; Van Balen, Michael; Ingram, Aaron; Hurd, Stephen; Chheetri, Prem; Thai, Vinh; Warren, Matthew; Booi, Kam; Oloruntoba, Richard (2022)By volume, about 99% of Australia’s trade is carried by sea mainly through the Indo-Pacific region. Australia currently imports 90% of liquid fuel from other countries, primarily Japan, Korea and Singapore. Global shipping ...
-
Chang, Elizabeth; Dillon, Tharam S.; Hussain, Farookh (2006)Trust has played a central role in human relationships and hence has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has played a pivotal role in forming ...
-
Barrie, Glenn; Whyte, Andrew; Bell, Janice (2017)© 2017 ACM. The Internet of Things (IoT) paradigm with its vast range of heterogeneous connecting technologies heralds a new era for internet research, especially given that this explosion in connectivity for devices or ...