The Influence of Students' Characteristics on Mobile Device Security Measures
暂无分享,去创建一个
[1] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[2] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[3] J. Lowell Mooney,et al. Your Firm’s Mobile Devices: How Secure Are They? , 2011 .
[4] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[5] Alain Yee-Loong Chong,et al. Understanding Mobile Commerce Continuance Intentions: An Empirical Analysis of Chinese Consumers , 2013, J. Comput. Inf. Syst..
[6] Elizabeth C. Whipple,et al. Third-year medical students’ knowledge of privacy and security issues concerning mobile devices , 2012, Medical teacher.
[7] Ashutosh Mishra,et al. Exploring the threats in Cell Phone as a Portable Storage Device , 2010 .
[8] Craig C. Claybaugh,et al. Professional Social Network Participation of Business School Graduates: Effects of University, Degree Type, and Gender , 2014, Int. J. Inf. Syst. Soc. Chang..
[9] K. Scarfone,et al. Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .
[10] Scott Mensch,et al. Information Security Activities of College Students: An Exploratory Study , 2011 .
[11] Ken Munro. Android scraping: accessing personal data on mobile devices , 2014, Netw. Secur..
[12] Jon Friedman,et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses , 2008, Inf. Knowl. Syst. Manag..
[13] Robert Miller,et al. Online Social Networks: Student Perceptions and Behavior Across Four Countries , 2012, Int. J. Inf. Syst. Soc. Chang..
[14] Kim-Kwang Raymond Choo,et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..
[15] Ewuuk Lomo-David,et al. Information Systems Security and Safety Measures: The Dichotomy between Students' Familiarity and Practice , 2009 .
[16] R. Sitgreaves. Psychometric theory (2nd ed.). , 1979 .
[17] Margaret Tan,et al. An investigation of students' perception of Bluetooth security , 2012, Inf. Manag. Comput. Secur..
[18] Beth H. Jones,et al. Risky business: Students and smartphones , 2014 .
[19] Zoran Budimac,et al. Wiki as a Tool of Choice for Students' Team Assignments , 2013, Int. J. Inf. Syst. Soc. Chang..
[20] Mark A. Harris,et al. The Need to Address Mobile Device Security in the Higher Education IT Curriculum , 2013, J. Inf. Syst. Educ..
[21] R. Raisamo,et al. Investigating students' behavioural intention to adopt and use mobile learning in higher education in East Africa , 2014 .
[22] Geoffrey E. Mills,et al. Educational Research: Competencies for Analysis and Application , 1995 .
[23] S. E. Kruck,et al. Empiracal Study of Students' Computer Security Practices/Perceptions , 2007, J. Comput. Inf. Syst..