An effective approach to mobile device management: Security and privacy issues associated with mobile applications

[1]  L. Whitby DEFINITIONS AND CRITERIA , 1974 .

[2]  C. Gilbert Unbundling the Structure of Inertia: Resource Versus Routine Rigidity , 2005 .

[3]  S. Kaparthi,et al.  A Bibliometric Analysis , 2005 .

[4]  Tuncay Bayrak,et al.  Critical Infrastructure Network Evaluation , 2006, J. Comput. Inf. Syst..

[5]  Elena Navarro,et al.  A Metamodeling Approach for Requirements Specification , 2006, J. Comput. Inf. Syst..

[6]  Kathleen M. Eisenhardt,et al.  Theory Building From Cases: Opportunities And Challenges , 2007 .

[7]  InduShobha N. Chengalur-Smith,et al.  An overview of social engineering malware: Trends, tactics, and implications , 2010 .

[8]  Cathy Urquhart,et al.  Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..

[9]  Heng Yin,et al.  DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.

[10]  Scott J. Shackelford Should Your Firm Invest in Cyber Risk Insurance , 2012 .

[11]  Anurag Kumar Jain,et al.  Addressing Security and Privacy Risks in Mobile Applications , 2012, IT Professional.

[12]  Dongho Won,et al.  Security Requirements of a Mobile Device Management System , 2012 .

[13]  Saman Shojae Chaeikar,et al.  Definitions and Criteria of CIA Security Triangle in Electronic Voting System , 2013 .

[14]  Kevin G. Corley,et al.  Seeking Qualitative Rigor in Inductive Research , 2013 .

[15]  Nelson Uto A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies , 2013, Future Internet.

[16]  Choong-C. Lee,et al.  Understanding the Use of Location-Based Service Applications: Do Privacy Concerns Matter? , 2013 .

[17]  Dongho Won,et al.  Threat modeling of a mobile device management system for secure smart work , 2013, Electron. Commer. Res..

[18]  Bongshin Lee,et al.  Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing , 2013, INTERACT.

[19]  Alex Pentland,et al.  Big Data and Management , 2014 .

[20]  Suman Nath,et al.  PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps , 2014, MobiSys.

[21]  Jin Kwak,et al.  Digital forensics investigation methodology applicable for social network services , 2014, Multimedia Tools and Applications.

[22]  Paul Steiner Going beyond mobile device management , 2014 .

[23]  Nur Izura Udzir,et al.  A Review on Mobile Device's Digital Forensic Process Models , 2014 .

[24]  Shahriar Akter,et al.  How ‘Big Data’ Can Make Big Impact: Findings from a Systematic Review and a Longitudinal Case Study , 2015 .

[25]  Jennifer Golbeck,et al.  Introduction to Social Media Investigation: A Hands-on Approach , 2015 .

[26]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[27]  Jan H. Kietzmann,et al.  CGIP: Managing Consumer-Generated Intellectual Property , 2015 .

[28]  David A. Wagner,et al.  Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.

[29]  Dimitris Gritzalis,et al.  Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015) , 2015, Comput. Secur..

[30]  Christian Platzer,et al.  MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[31]  Anthony Marshall,et al.  How leading organizations use big data and analytics to innovate , 2015 .

[32]  Béla Genge,et al.  A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures , 2015, Int. J. Crit. Infrastructure Prot..

[33]  Benjamin W. Wah,et al.  Significance and Challenges of Big Data Research , 2015, Big Data Res..

[34]  Theodore Tryfonas,et al.  Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network , 2016, IEEE Transactions on Cybernetics.

[35]  Hein S. Venter,et al.  Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..

[36]  Sunil Erevelles,et al.  Big Data consumer analytics and the transformation of marketing , 2016 .

[37]  Catherine Dwyer,et al.  Leakage of Geolocation Data by Mobile Ad Networks , 2016 .

[38]  M. Cullen United States. Congress , 2016 .

[39]  S Saranraj,et al.  Illumination Invariant Feature Extraction for Multispectral Palmprint Verification , 2016 .

[40]  Young B. Choi,et al.  Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle , 2016, Journal of Medical Systems.

[41]  Charlie C. Chen,et al.  Intention to disclose personal information via mobile applications: A privacy calculus perspective , 2016, Int. J. Inf. Manag..

[42]  Darren Hayes,et al.  How to Deliver Open Sustainable Innovation: An Integrated Approach for a Sustainable Marketable Product , 2016 .

[43]  Athanasios V. Vasilakos,et al.  Big data: From beginning to future , 2016, Int. J. Inf. Manag..

[44]  Scott J. Shackelford Business and cyber peace: We need you! , 2016 .

[45]  George Oikonomou,et al.  Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations , 2016, IEEE Transactions on Cybernetics.

[46]  Eduardo Fernández-Medina,et al.  Main Issues in Big Data Security , 2016, Future Internet.

[47]  Val A. Hooper,et al.  The emerging role of the CISO , 2016 .

[48]  Matthew J. Mazzei,et al.  Big data dreams: A framework for corporate strategy , 2017 .

[49]  Alicia Mas-Tur,et al.  Crossing borders with social media: Online social networks and FDI , 2017 .

[50]  Xing Gao,et al.  Location Privacy Breach: Apps Are Watching You in Background , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[51]  V. Krotov,et al.  Addressing barriers to big data , 2017 .

[52]  Scott B. Friend,et al.  Big Data Facilitation, Utilization, and Monetization: Exploring the 3Vs in a New Product Development Process , 2017 .

[53]  D. Trabucchi,et al.  Give Away Your Digital Services , 2017 .

[54]  Vishal Sachdev,et al.  The Digital Revolution, 3D Printing, and Innovation as Data , 2017 .

[55]  Giovanna Di Marzo Serugendo,et al.  SmartContent—Self-Protected Context-Aware Active Documents for Mobile Environments , 2017 .

[56]  Roberto Trasarti,et al.  Discovering and Understanding City Events with Big Data: The Case of Rome , 2017, Inf..

[57]  David Airehrour,et al.  Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model , 2018, Inf..

[58]  Darren R. Hayes,et al.  A Framework for More Effective Dark Web Marketplace Investigations , 2018, Inf..

[59]  Giustina Secundo,et al.  Creating value from Social Big Data: Implications for Smart Tourism Destinations , 2017, Inf. Process. Manag..

[60]  Agusti Solanas,et al.  Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.

[61]  Darren Hayes,et al.  A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective , 2018 .

[62]  F. Cappa,et al.  Open-source intelligence for risk assessment , 2018, Business Horizons.

[63]  Kostas E. Psannis,et al.  Social networking data analysis tools & challenges , 2016, Future Gener. Comput. Syst..

[64]  Virginia Pilloni,et al.  How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0 , 2018, Future Internet.

[65]  Mohsen Guizani,et al.  Privacy and Security Issues in Online Social Networks , 2018, Future Internet.

[66]  A. Petruzzelli,et al.  Big Data for Open Innovation in SMEs and Large Corporations: Trends, Opportunities, and Challenges , 2018 .

[67]  Lorenzo Bracciale,et al.  Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications , 2018, Future Internet.

[68]  A. Petruzzelli,et al.  A bibliometric analysis of research on Big Data analytics for business and management , 2019, Management Decision.

[69]  Donato Morea,et al.  Big Data for the Sustainability of Healthcare Project Financing , 2019, Sustainability.

[70]  Steven Furnell,et al.  Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment , 2019, Future Internet.

[71]  Elena Baralis,et al.  Forecasting Heating Consumption in Buildings: A Scalable Full-Stack Distributed Engine , 2019, Electronics.

[72]  Hussain Aldawood,et al.  Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues , 2019, Future Internet.

[73]  Wan Khairuzzaman Wan Ismail,et al.  Big Data Analytics and Firm Performance: A Systematic Review , 2019, Inf..

[74]  Naima Kaabouch,et al.  Social Engineering Attacks: A Survey , 2019, Future Internet.

[75]  Young-Myoung Kim,et al.  Intelligent Micro Energy Grid in 5G Era: Platforms, Business Cases, Testbeds, and Next Generation Applications , 2019, Electronics.

[76]  Mehmet A. Orgun,et al.  Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment , 2019, Health Informatics J..

[77]  Qiang Zhang,et al.  Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App , 2019, Sensors.

[78]  Giuseppina Passiante,et al.  A multi-dimension framework for value creation through big data , 2019, Industrial Marketing Management.

[79]  Andrew Crooks,et al.  Computational Social Science of Disasters: Opportunities and Challenges , 2019, Future Internet.

[80]  V. Timonen,et al.  Confused About Theoretical Sampling? Engaging Theoretical Sampling in Diverse Grounded Theory Studies , 2020, Qualitative health research.

[81]  Binxing Fang,et al.  Hierarchically defining Internet of Things security: From CIA to CACA , 2020, Int. J. Distributed Sens. Networks.

[82]  A multi-dimension framework for value creation through big data , 2020, Industrial Marketing Management.