메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1647-1650

Can i borrow your phone? understanding concerns when sharing mobile phones

Author keywords

Mobile phone sharing; Phone privacy; Phone security

Indexed keywords

BINARY MODELS; FIELD STUDIES; MOBILE PHONE SHARING; PHONE SECURITY; PRIVACY CONCERNS; SECURITY CONSTRAINT; SECURITY MODEL; WILLINGNESS TO SHARE;

EID: 84887058303     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1518701.1518953     Document Type: Conference Paper
Times cited : (133)

References (4)
  • 2
    • 84864996824 scopus 로고    scopus 로고
    • One user, many hats; and, sometimes, no hat-towards a secure yet usable pda
    • Springer Verlag
    • Stajano, F. One user, many hats; and, sometimes, no hat-towards a secure yet usable PDA. Security Protocols Workshop, Springer Verlag (2004), 51-64.
    • (2004) Security Protocols Workshop , pp. 51-64
    • Stajano, F.1
  • 3
    • 76149089901 scopus 로고    scopus 로고
    • Beyond the personal and private: Modes of mobile phone sharing in urban India
    • S. W. Campbell & R. Ling (Eds.) Transaction Books (in press
    • Steenson, M. and Donner, J. Beyond the personal and private: Modes of mobile phone sharing in urban India. In S. W. Campbell & R. Ling (Eds.), Mobile Comm. Research Annual (Vol. 1), Transaction Books (in press).
    • Mobile Comm. Research Annual , vol.1
    • Steenson, M.1    Donner, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.