Interpreting Users’ Perceptions of Mobile Security Methods and Their Effectiveness
Abstract
References
Christian, M. (2014). Integrating Cloud Computing and Mobile Applications: A Comparative Study Based on Cloud and Sanscode, Journal of Cloud Computing. 2(14) 1-9.
Gao, C, and Liu J. (2013). Modeling and Restraining Mobile Virus Propagation. IEEE Transactions on Mobile Computing, 12(3): 529-541.
Greenberg, A. (2010). Google Pulls App that Revealed Android Flaw, Issues Fix, http://news.cnet.com/8301-270803-20022545-245.html.
Harris, M, and Patten, K. (2013). Mobile Device Security Considerations for Small- and Medium-Sized Enterprise Business Mobility Integrated Information Technology, Information Management and Computer Science, 22(1): 97-144
Liu, D, Zhang, and Hu, K. (2013). A Survey on Smartphone Security, Applied Mechanics and Materials, (Vol 347-350): 3861-3865.
Mavridis, I., & Pangalos, G. (2012). Security Issues in a Mobile Computing Paradigm. In I. Mavridis, & G. Pangalos, Communications and Multimedia Security (pp. 61-76). Springer US.
Park, J., Yi, K and Jeong, Y. (2014). An Enhanced Smartphone Security Model based on Information Security Management Systems, Electronic Commerce Research, 14(3): 321-348.
Patten, K and Passerini, K. (2007). Next Generation Small and Medium Enterprises Mobility Strategy Roadmap, Proceedings of ISOneWorldConference, Las Vegas, NV, 11-13 April.
Waltz, M. (2011). Mobility Threats, Mobile Enterprise, 7 March, Accessed 9 Februrary 2013, http://mobileenterp rise.edgl.com/top-stories/Mobility-Threats71022
Wei, J and Ozok, A. (2009). Development of a Mobile Commerce Security Analysis Method. Journal of Information Privacy & Security 5: 1; 28.
Yaseen, B, and Tariq, M. (2012). Technical Comparison Between Android And IOS With Respect to Their Architecture. Technical Report Documentation Page, Punjab University College of Information Technology, University (PUCIT), Report No:BCSF09A: 1- 16.
Lookout, 2013. “2013 Mobile Threat Predictions”, Accessed 11 Februrary 2013,https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/
Stat counter, 2013. “Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013”, Stat Counter Global Stats, accessed 12 February 2013