SMARTPHONE SECURITY AWARENESS AND PRACTICES OF USERS IN ALBANIA
Abstract
Keywords
Kaynakça
- CAUSEY, B., 2013. Strategy: How to Conduct an Effective IT Security Risk Assessment, InformationWeek Reports.
- CONOLLY, T. & AYTES, K., 2003. A Research Model for Investigating Human Behavior Related to Computer Security.
- COSTANTINO, G., MARTINELLI, F., SARACINO, A. &SGANDURRA, D., 2013. Towards enforcing on-the-fly policies in BYOD environments. Gammarth, IEEE, pp. 61-65.
- GAJAR, P. K., GHOSH, A. &RAI, S., 2013. Bring Your Own Device (BYOD): Security risks and mitigating. Journal of Global Research in Computer Science, April.4(4).
- GOOD, N. et al., 2005. Stopping spyware at the gate: A user study of privacy, notice and spyware.
- HA, E. et al., 2012. Android Permissions: User Attention, Comprehension, and Behavior. Washington DC.
- KEARNEY, W. D. &KRUGER, H. A., 2006. A prototype for assessing information security awareness. Computers and Security, Volume 25, pp. 289-296.
- KELLEY, P. G., BENISCH, M., CRANOR, L. F. &SADEH, N., 2011. When are users comfortable sharing locations with advertisers?. Vancouver, pp. 2449-2452.
Ayrıntılar
Birincil Dil
İngilizce
Konular
-
Bölüm
Araştırma Makalesi
Yazarlar
Esmeralda Kadëna
Bu kişi benim
Hungary
Yayımlanma Tarihi
10 Ocak 2019
Gönderilme Tarihi
10 Ekim 2018
Kabul Tarihi
-
Yayımlandığı Sayı
Yıl 2018 Cilt: 3 Sayı: 5