Mobile device security considerations for small- and medium-sized enterprise business mobility
暂无分享,去创建一个
[1] I. Henri,et al. ≪Give me a mobile phone, and I will work harder! ≫ Assessing the value of mobile technologies in organizations : an exploratory research , 2006, 2006 International Conference on Mobile Business.
[2] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[3] Jerry Fjermestad,et al. Privacy and Security in the Age of Electronic Customer Relationship Management , 2007, Int. J. Inf. Secur. Priv..
[4] Steve Gold. Cracking cellular networks via femtocells , 2011, Netw. Secur..
[5] Steve Mansfield-Devine,et al. Paranoid Android: just how insecure is the most popular mobile platform? , 2012, Netw. Secur..
[6] David W. Johnson,et al. Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive? , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[7] Harold L. Koch,et al. Are Home-Based Sales Representatives Aware and Proactive Regarding Security Risks in the Internet Era? , 2008 .
[8] Steve Gold,et al. Cracking wireless networks , 2011, Netw. Secur..
[9] Katia Passerini,et al. Information Technology for Small Business: Managing the Digital Enterprise , 2012 .
[10] Steve Mansfield-Devine. Security review: the past year , 2013 .
[11] Steve Mansfield-Devine,et al. Android architecture: attacking the weak points , 2012, Netw. Secur..
[12] Diomidis Spinellis,et al. Security requirements, risks and recommendations for small enterprise and home-office environments , 1999, Inf. Manag. Comput. Secur..
[13] Roy Thurik,et al. Erim Report Series Research in Management What's New about the New Economy? Sources of Growth in the Managed and Entrepreneurial Economies Bibliographic Data and Classifications , 2022 .
[14] D. Bradbard,et al. Computer Security in Small Business: An Empirical Study , 1990 .