메뉴 건너뛰기




Volumn 33, Issue 12, 2014, Pages 1347-1360

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

Author keywords

Cyber crime; Malware; Mobile security; Phishing; Security survey; Smart mobile devices; Unauthorised access

Indexed keywords

CRIME; MALWARE; MOBILE TELECOMMUNICATION SYSTEMS; SURVEYS;

EID: 84919570761     PISSN: 0144929X     EISSN: 13623001     Source Type: Journal    
DOI: 10.1080/0144929X.2014.934286     Document Type: Article
Times cited : (96)

References (44)
  • 3
    • 84919574237 scopus 로고    scopus 로고
    • AVG. 2012. AVG Community Powered Threat Report. http://aa-download.avg.com/filedir/news/AVG-Community-Powered-Threat-Report-Q1-2012.pdf
    • (2012) AVG Community Powered Threat Report
  • 4
    • 80053548870 scopus 로고    scopus 로고
    • Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions
    • Beyah, R., and A. Venkataraman. 2011. "Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions." IEEE Security & Privacy 9 (5): 56-61.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.5 , pp. 56-61
    • Beyah, R.1    Venkataraman, A.2
  • 5
    • 84859798125 scopus 로고    scopus 로고
    • Open Sesame: Design Guidelines for Invisible Passwords
    • Bianchi, A., I. Oakley, and D. Kwon. 2012. "Open Sesame: Design Guidelines for Invisible Passwords." Computer 45 (4): 58-65.
    • (2012) Computer , vol.45 , Issue.4 , pp. 58-65
    • Bianchi, A.1    Oakley, I.2    Kwon, D.3
  • 6
    • 80955155209 scopus 로고    scopus 로고
    • Cybercrime and On-line Safety in Cyberspace
    • edited by C. Smith, S. Zhang, and R. Barberet, New York: Routledge
    • Broadhurst, R., and K.-K. R. Choo. 2011. "Cybercrime and On-line Safety in Cyberspace." In Routledge International Handbook of Criminology, edited by C. Smith, S. Zhang, and R. Barberet, 153-165. New York: Routledge.
    • (2011) Routledge International Handbook of Criminology , pp. 153-165
    • Broadhurst, R.1    Choo, K.-K.R.2
  • 7
    • 70350755355 scopus 로고    scopus 로고
    • Do You Trust Your Phone?
    • 10th International Conference on E-commerce and Web Technologies, Linz, Austria
    • Catiglione, A., R. Prisco, and A. Santis. 2009. "Do You Trust Your Phone?" 10th international conference on e-commerce and web technologies, Linz, Austria, LNCS 5692/2009, 50-61.
    • (2009) LNCS , vol.5692 , Issue.2009 , pp. 50-61
    • Catiglione, A.1    Prisco, R.2    Santis, A.3
  • 8
    • 84861302816 scopus 로고    scopus 로고
    • Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
    • Lyon, France, ACM, 2012
    • Chia, P. H., Y. Yamamoto, and N. Asokan. 2012. "Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals." International World Wide Web Conference Committee, Lyon, France, ACM, 2012, 311-320.
    • (2012) International World Wide Web Conference Committee , pp. 311-320
    • Chia, P.H.1    Yamamoto, Y.2    Asokan, N.3
  • 9
    • 80955142795 scopus 로고    scopus 로고
    • The Cyber Threat Landscape: Challenges and Future Research Directions
    • Choo, K.-K. R. 2011a. "The Cyber Threat Landscape: Challenges and Future Research Directions." Computers & Security 30 (8): 719-731.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 10
    • 80054035972 scopus 로고    scopus 로고
    • Cyberthreat Landscape Faced by Financial and Insurance Industry
    • Choo, K.-K. R. 2011b. "Cyberthreat Landscape Faced by Financial and Insurance Industry." Trends & Issues in Crime and Criminal Justice 408: 1-6.
    • (2011) Trends & Issues in Crime and Criminal Justice , vol.408 , pp. 1-6
    • Choo, K.-K.R.1
  • 11
    • 84875157541 scopus 로고    scopus 로고
    • New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports
    • Choo, K.-K. R. 2013. "New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports." Computers& Security 36: 12-26.
    • (2013) Computers & Security , vol.36 , pp. 12-26
    • Choo, K.-K.R.1
  • 12
    • 84905834871 scopus 로고    scopus 로고
    • A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework
    • edited by H. Kaur and X. Tao, New York: Springer
    • Choo, K.-K. R. 2014. "A Conceptual Interdisciplinary Plug-and- Play Cyber Security Framework." In ICTs and the Millennium Development Goals - A United Nations Perspective, edited by H. Kaur and X. Tao, 81-99. New York: Springer.
    • (2014) ICTs and the Millennium Development Goals - A United Nations Perspective , pp. 81-99
    • Choo, K.-K.R.1
  • 13
    • 0000204509 scopus 로고
    • Social Change and Crime Rate Trends: A Routine Activity Approach
    • Cohen, L. E., and M. Felson. 1979. "Social Change and Crime Rate Trends: A Routine Activity Approach." American Sociological Review 44 (4): 588-608.
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 19
    • 84867507824 scopus 로고    scopus 로고
    • F-Secure. 2012. Mobile Threat Report Q1 2012. http://www.fsecure.com/weblog/archives/MobileThreatReport-Q1-2012.pdf
    • (2012) Mobile Threat Report Q1 2012
  • 20
    • 84919574236 scopus 로고    scopus 로고
    • Apple Expels Serial Hacker for Publishing iPhone Exploit
    • 8 November
    • Goodin, D. 2011. "Apple Expels Serial Hacker for Publishing iPhone Exploit." The Register 8 November. http://www.theregister.co.uk/2011/11/08/apple-excommunicates-charlie-miller/
    • (2011) The Register
    • Goodin, D.1
  • 22
    • 84919574234 scopus 로고    scopus 로고
    • Creator of 'Point-and-Click' Wi-Fi Hacking Tool Defends its Release
    • 5 November
    • Grubb, B. 2010. "Creator of 'Point-and-Click' Wi-Fi Hacking Tool Defends its Release." Sydney Morning Herald 5 November. http://www.smh.com.au/technology/security/creator-of-pointandclick-wifi-hacking-tool-defends-its-release-20101105-17gon.html
    • (2010) Sydney Morning Herald
    • Grubb, B.1
  • 23
    • 84875598792 scopus 로고    scopus 로고
    • Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
    • Guinchard, A. 2011. "Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy." Journal of Strategic Security 4 (2): 75-96.
    • (2011) Journal of Strategic Security , vol.4 , Issue.2 , pp. 75-96
    • Guinchard, A.1
  • 24
    • 84875587046 scopus 로고    scopus 로고
    • Cloud Computing and its Implications for Cybercrime Investigations in Australia
    • Hooper, C., B. Martini, and K.-K. R. Choo. 2013. "Cloud Computing and its Implications for Cybercrime Investigations in Australia." Computer Law and Security Review 29 (2): 152-163.
    • (2013) Computer Law and Security Review , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 25
    • 84866720156 scopus 로고    scopus 로고
    • Juniper Networks. 2012. 2011 Mobile Threats Report. http://www.juniper.net/us/en/local/pdf/additional-resources/jnpr-2011-mobile-threats-report.pdf
    • (2012) 2011 Mobile Threats Report
  • 26
    • 84893656776 scopus 로고    scopus 로고
    • Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations
    • Mani, D., K.-K. R. Choo, and S. Mubarak. 2014. "Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations." Information Management and Computer Security 22 (1): 24-41.
    • (2014) Information Management and Computer Security , vol.22 , Issue.1 , pp. 24-41
    • Mani, D.1    Choo, K.-K.R.2    Mubarak, S.3
  • 27
    • 84889083567 scopus 로고    scopus 로고
    • Cloud Storage Forensics: OwnCloud as a Case Study
    • Martini, B., and K.-K. R. Choo. 2013. "Cloud Storage Forensics: ownCloud as a Case Study." Digital Investigation 10 (4): 287-299.
    • (2013) Digital Investigation , vol.10 , Issue.4 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 32
    • 84884589497 scopus 로고    scopus 로고
    • Forensic Collection of Cloud Storage Data: Does the Act of Collection Result in Changes to the Data or Its Metadata?
    • Quick, D., and K.-K. R. Choo. 2013a. "Forensic Collection of Cloud Storage Data: Does the Act of Collection Result in Changes to the Data or Its Metadata?" Digital Investigation 10 (3): 266-277.
    • (2013) Digital Investigation , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 33
    • 84875147433 scopus 로고    scopus 로고
    • Digital Droplets: Microsoft SkyDrive Forensic Data Remnants
    • Quick, D., and K.-K. R. Choo. 2013b. "Digital Droplets: Microsoft SkyDrive Forensic Data Remnants." Future Generation Computer Systems 29 (6): 1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 34
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox Analysis: Data Remnants on User Machines
    • Quick, D., and K.-K. R. Choo. 2013c. "Dropbox Analysis: Data Remnants on User Machines." Digital Investigation 10 (1): 3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 35
    • 85008009657 scopus 로고    scopus 로고
    • Interview: Software Security in the Real World
    • Sobel, A. E. K., and G. McGraw. 2010. "Interview: Software Security in the Real World." IEEE Computer 43 (9): 47-53.
    • (2010) IEEE Computer , vol.43 , Issue.9 , pp. 47-53
    • Sobel, A.E.K.1    McGraw, G.2
  • 36
    • 84869206387 scopus 로고    scopus 로고
    • Sophos. 2012. Security Threat Report 2012. http://www.sophos.com/medialibrary/PDFs/other/SophosSecurityThreatReport2012.pdf
    • (2012) Security Threat Report 2012
  • 37
    • 84919574233 scopus 로고    scopus 로고
    • ZTE Score M Scores a Backdoor Vulnerability
    • 25 May
    • Sun. 2012. "ZTE Score M Scores a Backdoor Vulnerability." Trend Micro 25 May. http://blog.trendmicro.com/trendlabs-security-intelligence/zte-score-m-scores-a-backdoor-vulnerability/
    • (2012) Trend Micro
    • Sun1
  • 38
    • 84890628545 scopus 로고    scopus 로고
    • Symantec. 2012. Internet Security Threat Report 2011 Trends. http://www.symantec.com/content/en/us/enterprise/other-resources/b-istr-main-report-2011-21239364.en-us.pdf
    • (2012) Internet Security Threat Report 2011 Trends
  • 40
  • 41
    • 85006850453 scopus 로고    scopus 로고
    • TrendMicro. 2012. "Enterprise Readiness of Consumer Mobile Platforms." http://www.trendmicro.com/cloud-content/us/pdfs/business/reports/rpt-enterprise-readiness-consumerization-mobile-platforms.pdf
    • (2012) Enterprise Readiness of Consumer Mobile Platforms.
  • 42
    • 84881111823 scopus 로고    scopus 로고
    • Washington, DC: US Government Accountability Office (US GAO)
    • US GAO (US Government Accountability Office). 2012. Cybersecurity: Threats Impacting the Nation. Washington, DC: US Government Accountability Office (US GAO).
    • (2012) Cybersecurity: Threats Impacting the Nation
  • 43
    • 34247657469 scopus 로고    scopus 로고
    • The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory
    • Yar, M. 2005. "The Novelty of 'Cybercrime': An Assessment in Light of Routine Activity Theory." European Journal of Criminology 2 (4): 407-427.
    • (2005) European Journal of Criminology , vol.2 , Issue.4 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.