Risks Management of IT Smart Software and Hardware Controlling Daily Activities
暂无分享,去创建一个
[1] Karen A. Scarfone,et al. Guidelines on Cell Phone and PDA Security , 2008 .
[2] Nathan L. Clarke,et al. Risk Assessment for Mobile Devices , 2011, TrustBus.
[3] Wayne Jansen,et al. Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology , 2008 .
[4] K. Faqih. Exploring the Influence of Perceived Risk and Internet Self-Efficacy on Consumer Online Shopping Intentions: Perspective of Technology Acceptance Model , 2013 .
[5] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[6] Daniel Kardefelt-Winther,et al. A conceptual and methodological critique of internet addiction research: Towards a model of compensatory internet use , 2014, Comput. Hum. Behav..
[7] Jan H. P. Eloff,et al. Information security: The moving target , 2009, Comput. Secur..
[8] Dimitris Gritzalis,et al. Smartphone security evaluation The malware attack case , 2011, Proceedings of the International Conference on Security and Cryptography.
[9] Yajin Zhou,et al. Systematic Detection of Capability Leaks in Stock Android Smartphones , 2012, NDSS.
[10] Rolf Oppliger. Security and Privacy in an Online World , 2011, Computer.
[11] Tommi Laukkanen,et al. Mapping the reasons for resistance to Internet banking: A means-end approach , 2007, Int. J. Inf. Manag..
[12] Michael D. Reisig,et al. Perceived Risk of Internet Theft Victimization , 2009 .
[13] Tracey Caldwell. Smart security , 2011, Netw. Secur..
[14] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[15] Troels Fibæk Bertel,et al. From SMS to SNS: The Use of the Internet on the Mobile Phone among Young Danes , 2011 .
[16] Monica Barbovschi. Dealing with misuse of personal information online – Coping measures of children in the EU Kids Online III project , 2014 .
[17] Dongho Won,et al. A Practical Analysis of Smartphone Security , 2011, HCI.
[18] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[19] Felix C. Freiling,et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.