Font Size: a A A

Information Security Issues Of Mobile Gis Applications

Posted on:2008-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:J DongFull Text:PDF
GTID:2190360215975693Subject:Cartography and Geographic Information System
Abstract/Summary:PDF Full Text Request
The process of social information-based accelerating facilitated not only government and enterprise but also society and individual to demand for constant enlargement of the spatial information. The combination of wireless network technology and spatial information technique has promoted formulation and development of Mobile GIS technique. Therefore, with the development of information field at full speed in our times, network technique and mobile communication has become two pillar industries advancing by leaps and bounds, which nearly absorbed and adopted the all new technique in such respects as the latest information, communication, computer, electron, etc. Following the range of the network covering being larger and larger, the transfer rate being faster and faster, and the user terminal's volume being smaller and smaller, from LAN to WAN, from wired network to wireless network, from wired attaching to wireless attaching, people have more and more higher expectations for communication technique. So mobile communication technique is welcoming unprecedented opportunity and the same time must face the unprecedented challenge too.With the combining of GIS and communications network, it has helped to bring about great-leap-forward development of GIS the day after tomorrow. Since Mobil GIS system makes dependence to the networks that produce many security troubles. Information security has penetrated into the life aspects. Information system is a complicated computer system it has security Vulnerability on management, physics and operation.This article has first analyzed the existing information network constitution, the development of mobile communication technology, the combining of existing computer network and communications.Secondly, analysis the development and appliance of GIS, the structure of Mobile GIS, and bring forward security precautions of every information security menace.Finally, take the example of Mobile GIS of province; bring forward security precautions and programming.
Keywords/Search Tags:information of network, Mobile GIS, information security menace, technology program, security precaution
PDF Full Text Request
Related items