An effective approach to mobile device management: Security and privacy issues associated with mobile applications
暂无分享,去创建一个
[1] L. Whitby. DEFINITIONS AND CRITERIA , 1974 .
[2] C. Gilbert. Unbundling the Structure of Inertia: Resource Versus Routine Rigidity , 2005 .
[3] S. Kaparthi,et al. A Bibliometric Analysis , 2005 .
[4] Tuncay Bayrak,et al. Critical Infrastructure Network Evaluation , 2006, J. Comput. Inf. Syst..
[5] Elena Navarro,et al. A Metamodeling Approach for Requirements Specification , 2006, J. Comput. Inf. Syst..
[6] Kathleen M. Eisenhardt,et al. Theory Building From Cases: Opportunities And Challenges , 2007 .
[7] InduShobha N. Chengalur-Smith,et al. An overview of social engineering malware: Trends, tactics, and implications , 2010 .
[8] Cathy Urquhart,et al. Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..
[9] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[10] Scott J. Shackelford. Should Your Firm Invest in Cyber Risk Insurance , 2012 .
[11] Anurag Kumar Jain,et al. Addressing Security and Privacy Risks in Mobile Applications , 2012, IT Professional.
[12] Dongho Won,et al. Security Requirements of a Mobile Device Management System , 2012 .
[13] Saman Shojae Chaeikar,et al. Definitions and Criteria of CIA Security Triangle in Electronic Voting System , 2013 .
[14] Kevin G. Corley,et al. Seeking Qualitative Rigor in Inductive Research , 2013 .
[15] Nelson Uto. A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies , 2013, Future Internet.
[16] Choong-C. Lee,et al. Understanding the Use of Location-Based Service Applications: Do Privacy Concerns Matter? , 2013 .
[17] Dongho Won,et al. Threat modeling of a mobile device management system for secure smart work , 2013, Electron. Commer. Res..
[18] Bongshin Lee,et al. Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing , 2013, INTERACT.
[19] Alex Pentland,et al. Big Data and Management , 2014 .
[20] Suman Nath,et al. PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps , 2014, MobiSys.
[21] Jin Kwak,et al. Digital forensics investigation methodology applicable for social network services , 2014, Multimedia Tools and Applications.
[22] Paul Steiner. Going beyond mobile device management , 2014 .
[23] Nur Izura Udzir,et al. A Review on Mobile Device's Digital Forensic Process Models , 2014 .
[24] Shahriar Akter,et al. How ‘Big Data’ Can Make Big Impact: Findings from a Systematic Review and a Longitudinal Case Study , 2015 .
[25] Jennifer Golbeck,et al. Introduction to Social Media Investigation: A Hands-on Approach , 2015 .
[26] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[27] Jan H. Kietzmann,et al. CGIP: Managing Consumer-Generated Intellectual Property , 2015 .
[28] David A. Wagner,et al. Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.
[29] Dimitris Gritzalis,et al. Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015) , 2015, Comput. Secur..
[30] Christian Platzer,et al. MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[31] Anthony Marshall,et al. How leading organizations use big data and analytics to innovate , 2015 .
[32] Béla Genge,et al. A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures , 2015, Int. J. Crit. Infrastructure Prot..
[33] Benjamin W. Wah,et al. Significance and Challenges of Big Data Research , 2015, Big Data Res..
[34] Theodore Tryfonas,et al. Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network , 2016, IEEE Transactions on Cybernetics.
[35] Hein S. Venter,et al. Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..
[36] Sunil Erevelles,et al. Big Data consumer analytics and the transformation of marketing , 2016 .
[37] Catherine Dwyer,et al. Leakage of Geolocation Data by Mobile Ad Networks , 2016 .
[38] M. Cullen. United States. Congress , 2016 .
[39] S Saranraj,et al. Illumination Invariant Feature Extraction for Multispectral Palmprint Verification , 2016 .
[40] Young B. Choi,et al. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle , 2016, Journal of Medical Systems.
[41] Charlie C. Chen,et al. Intention to disclose personal information via mobile applications: A privacy calculus perspective , 2016, Int. J. Inf. Manag..
[42] Darren Hayes,et al. How to Deliver Open Sustainable Innovation: An Integrated Approach for a Sustainable Marketable Product , 2016 .
[43] Athanasios V. Vasilakos,et al. Big data: From beginning to future , 2016, Int. J. Inf. Manag..
[44] Scott J. Shackelford. Business and cyber peace: We need you! , 2016 .
[45] George Oikonomou,et al. Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations , 2016, IEEE Transactions on Cybernetics.
[46] Eduardo Fernández-Medina,et al. Main Issues in Big Data Security , 2016, Future Internet.
[47] Val A. Hooper,et al. The emerging role of the CISO , 2016 .
[48] Matthew J. Mazzei,et al. Big data dreams: A framework for corporate strategy , 2017 .
[49] Alicia Mas-Tur,et al. Crossing borders with social media: Online social networks and FDI , 2017 .
[50] Xing Gao,et al. Location Privacy Breach: Apps Are Watching You in Background , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[51] V. Krotov,et al. Addressing barriers to big data , 2017 .
[52] Scott B. Friend,et al. Big Data Facilitation, Utilization, and Monetization: Exploring the 3Vs in a New Product Development Process , 2017 .
[53] D. Trabucchi,et al. Give Away Your Digital Services , 2017 .
[54] Vishal Sachdev,et al. The Digital Revolution, 3D Printing, and Innovation as Data , 2017 .
[55] Giovanna Di Marzo Serugendo,et al. SmartContent—Self-Protected Context-Aware Active Documents for Mobile Environments , 2017 .
[56] Roberto Trasarti,et al. Discovering and Understanding City Events with Big Data: The Case of Rome , 2017, Inf..
[57] David Airehrour,et al. Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model , 2018, Inf..
[58] Darren R. Hayes,et al. A Framework for More Effective Dark Web Marketplace Investigations , 2018, Inf..
[59] Giustina Secundo,et al. Creating value from Social Big Data: Implications for Smart Tourism Destinations , 2017, Inf. Process. Manag..
[60] Agusti Solanas,et al. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.
[61] Darren Hayes,et al. A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective , 2018 .
[62] F. Cappa,et al. Open-source intelligence for risk assessment , 2018, Business Horizons.
[63] Kostas E. Psannis,et al. Social networking data analysis tools & challenges , 2016, Future Gener. Comput. Syst..
[64] Virginia Pilloni,et al. How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0 , 2018, Future Internet.
[65] Mohsen Guizani,et al. Privacy and Security Issues in Online Social Networks , 2018, Future Internet.
[66] A. Petruzzelli,et al. Big Data for Open Innovation in SMEs and Large Corporations: Trends, Opportunities, and Challenges , 2018 .
[67] Lorenzo Bracciale,et al. Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications , 2018, Future Internet.
[68] A. Petruzzelli,et al. A bibliometric analysis of research on Big Data analytics for business and management , 2019, Management Decision.
[69] Donato Morea,et al. Big Data for the Sustainability of Healthcare Project Financing , 2019, Sustainability.
[70] Steven Furnell,et al. Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment , 2019, Future Internet.
[71] Elena Baralis,et al. Forecasting Heating Consumption in Buildings: A Scalable Full-Stack Distributed Engine , 2019, Electronics.
[72] Hussain Aldawood,et al. Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues , 2019, Future Internet.
[73] Wan Khairuzzaman Wan Ismail,et al. Big Data Analytics and Firm Performance: A Systematic Review , 2019, Inf..
[74] Naima Kaabouch,et al. Social Engineering Attacks: A Survey , 2019, Future Internet.
[75] Young-Myoung Kim,et al. Intelligent Micro Energy Grid in 5G Era: Platforms, Business Cases, Testbeds, and Next Generation Applications , 2019, Electronics.
[76] Mehmet A. Orgun,et al. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment , 2019, Health Informatics J..
[77] Qiang Zhang,et al. Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App , 2019, Sensors.
[78] Giuseppina Passiante,et al. A multi-dimension framework for value creation through big data , 2019, Industrial Marketing Management.
[79] Andrew Crooks,et al. Computational Social Science of Disasters: Opportunities and Challenges , 2019, Future Internet.
[80] V. Timonen,et al. Confused About Theoretical Sampling? Engaging Theoretical Sampling in Diverse Grounded Theory Studies , 2020, Qualitative health research.
[81] Binxing Fang,et al. Hierarchically defining Internet of Things security: From CIA to CACA , 2020, Int. J. Distributed Sens. Networks.
[82] A multi-dimension framework for value creation through big data , 2020, Industrial Marketing Management.