SMARTPHONE SECURITY AWARENESS AND PRACTICES OF USERS IN ALBANIA
Abstract
Keywords
References
- CAUSEY, B., 2013. Strategy: How to Conduct an Effective IT Security Risk Assessment, InformationWeek Reports.
- CONOLLY, T. & AYTES, K., 2003. A Research Model for Investigating Human Behavior Related to Computer Security.
- COSTANTINO, G., MARTINELLI, F., SARACINO, A. &SGANDURRA, D., 2013. Towards enforcing on-the-fly policies in BYOD environments. Gammarth, IEEE, pp. 61-65.
- GAJAR, P. K., GHOSH, A. &RAI, S., 2013. Bring Your Own Device (BYOD): Security risks and mitigating. Journal of Global Research in Computer Science, April.4(4).
- GOOD, N. et al., 2005. Stopping spyware at the gate: A user study of privacy, notice and spyware.
- HA, E. et al., 2012. Android Permissions: User Attention, Comprehension, and Behavior. Washington DC.
- KEARNEY, W. D. &KRUGER, H. A., 2006. A prototype for assessing information security awareness. Computers and Security, Volume 25, pp. 289-296.
- KELLEY, P. G., BENISCH, M., CRANOR, L. F. &SADEH, N., 2011. When are users comfortable sharing locations with advertisers?. Vancouver, pp. 2449-2452.
Details
Primary Language
English
Subjects
-
Journal Section
Research Article
Authors
Esmeralda Kadëna
This is me
Hungary
Publication Date
January 10, 2019
Submission Date
October 10, 2018
Acceptance Date
-
Published in Issue
Year 2018 Volume: 3 Number: 5