Managing Security Risks in Wireless Web Services


  • Alaa Alsaeed Management Information Systems, Bowie State University, United States



Internet, Computers, M2M Services, Cloud Interfaces, WLAN, WEP, System, Wireless Networks, Management, MAC Address


Over the last twenty years, the Internet has become highly interactive and is not merely a static repository of websites, which allows its users to interact proactively. The functions and tasks of the Internet have evolved during this twenty-year period, such that it is no longer a rudimentary collection of websites. The Internet empowers individual users to explore the Internet in an exponentially greater capacity than in years past. In this study, we will consider the issues like security and trust issues in IoT and local cloud interfaces. Additionally, the security, requirements of M2M services and security solutions for the internet are analyzed, and their ineffectiveness is discussed.


E. Aihab Shehzadi, SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security. Issues in Informing Science & Information Technology, pp. 1-12. 2009.

R.O. Bagley, How The Cloud And Big Data Are Changing Small Business. [Online]. Available: http://www.forbes.comsites/rebecca bagley/2014/07/15/how-the-cloud-and-big-data-are-changing-small-business.

N. Bendary,Intelligent Detection and Control for Environmental Noise Pollution. American Academic & Scholarly Research Journal, Vol. 5, No. 3, pp. 1- 9, 2013.

Bernadette Wilson, Managed Services, Backup And Recovery, and Networking News From June 2014. [Online]. Available: elit Expands m2mAIR Mobile Coverage Across Europe and Latin America in Partnership with Telefonica. [Online]. Available: 1/en/Telit-Expands-m2mAIR-Mobile-Coverage-Europe-Latin#. U8jIEJSSxvQ.

J. J.Carafano, Wiki at War: Conflict in a Socially Networked World. Texas A&M University Press, 2012.

S. Cleland, The Next Leg of Wireless Growth? [Online]. Available: scottcleland/2011/10/11/the-next-leg-of-wireless-growth.

Corman. Home, hacked home. [Online]. Available:

D. Crystal, Language and the Internet. Cambridge University Press. 2011.

L. Diana and J. B. Miraka, The Power of Convergence: Linking Business Strategies and Technology Decisions to Create Sustainable Success. American Management Association, 2011. In-flight internet is it secure. [Online]. Available: about wireless.2011. [Online]. Available: Defending the digital frontier. [Online]. Available: -markets-and-countries-are-increasingly-under-attack-cyber-criminals

L. Geoffrey and P. H. Greif,Group Work with Populations at Risk. Oxford University Press, 2005.

T. Geron, Data For Nothing, Calls For Free: How FreedomPop Will Offer Free Phone Service. [Online]. Available: http://www.forbes. com/sites/tomiogeron/2013/06/05/data-for-nothing-calls-for-free-how -freedompop-will-offer-free-phone-service/

R. Isaac and I. P. Porche, Redefining Information Warfare Boundaries for An Army in a Wireless World. rand.2013.

G. Kabat, Do Cell Phones Cause Brain Cancer? The Diehards Cling Desperately To Opinion. [Online]. Available: sites/geoffreykabat/2013/03/05/do-cell-phones-cause-brain-cancer-the-diehards-cling-desperately-to-opinion.

A. Konrad, Tesla Now Connects Every Car To Internet Through AT&T Wireless, But It's Not 4G LTE. [Online]. Available: ted-cars.

D. Lyon, Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Routledge, 2013.

R. H. Maarten Botterman, Enabling the Information Society by Stimulating the Creation of a Broadband Environment in Europe: Analyses of Evolution Scenarios for Future Networking Technologies and Networks in Europe. Rand., 2013.

M. Marlene and M. L. Maheu, The Mental Health Professional and the New Technologies: A Handbook for Practice Today. Lawrence Erlbaum Associates, 2005.

M. L. Michael Chui, The Internet of Things. [Online]. Available:

J. Paton, Bechtel-Union Discord Raises Australian LNG Plant Delay Risk. [Online]. Available: html? cmpid=msnmoney&industry=IND_ENERGY&isub.

A. Plante, On Point: Cloud Advancements and Encryption, Web Security Updates. [Online]. Available: 2014/06/20/point-cloud-advancements-encryption-web-security-updates/#.U8eM5pSSxvQ.

S. Radack, security for wireless networks and devices. [Online]. Available:

R. T. Ramessur, Computer-Mediated Communication for Effective Teaching-Learning of Coastal Zone Management Module. International Journal of Education and Development using Information and Communication Technology, Vol. 3, No. 1, pp. 1-4, 2013.

J Robert and J. Thierauf, Smart Business Systems for the Optimized Organization. Praeger, 2013.

G. Russell and L. James, Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures. Trends & Issues in Crime and Criminal Justice, Vol. 456, No. 1, pp. 12-18, 2013.




How to Cite

Alsaeed, A. (2021). Managing Security Risks in Wireless Web Services. Asian Journal of Computer Science and Technology, 10(2), 41–51.