-
1
-
-
84949105226
-
-
Last accessed 20 February 2015
-
Berg Insight, 2013. "The mobile application market", http://www.berginsight.com/ReportPDF/ProductSheet/bi-app1-ps.pdf [Last accessed 20 February 2015].
-
(2013)
The Mobile Application Market
-
-
Berg Insight1
-
2
-
-
84895065041
-
Location privacy: The challenges of mobile service devices
-
Cheung, A. S. Y. 2014. "Location privacy: The challenges of mobile service devices", Computer Law & Security Review (30:1), pp. 41-54.
-
(2014)
Computer Law & Security Review
, vol.30
, Issue.1
, pp. 41-54
-
-
Cheung, A.S.Y.1
-
3
-
-
84923037733
-
Enforcing file system permissions on Android external storage
-
Do, Q., Martini, B. and Choo, K.-K. R. 2014, "Enforcing file system permissions on Android external storage." In Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). pp. 949-954.
-
(2014)
Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 949-954
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
4
-
-
84912008171
-
Exfiltrating data from Android devices
-
Do, Q., Martini, B. and Choo, K.-K. R. 2015, "Exfiltrating data from Android devices", Computer & Security (48), pp. 74-91.
-
(2015)
Computer & Security
, Issue.48
, pp. 74-91
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
7
-
-
84906311597
-
Use of geosocial networking (GSN) mobile phone applications to find men for sex by men who have sex with men (MSM) in Washington, DC
-
Phillips, G. II, et al. 2014. "Use of geosocial networking (GSN) mobile phone applications to find men for sex by men who have sex with men (MSM) in Washington, DC", AIDS and Behavior (18:9), pp. 1630-1637.
-
(2014)
AIDS and Behavior
, vol.18
, Issue.9
, pp. 1630-1637
-
-
Phillips, G.1
-
8
-
-
85027925815
-
South Korea's innovations in data privacy principles: Asian comparisons
-
Greenleaf, G. and Park, W. I. 2014. "South Korea's innovations in data privacy principles: Asian comparisons", Computer Law & Security Review (30:5), pp. 492-505.
-
(2014)
Computer Law & Security Review
, vol.30
, Issue.5
, pp. 492-505
-
-
Greenleaf, G.1
Park, W.I.2
-
9
-
-
84899412956
-
Gay and bisexual men's use of the internet: Research from the 1990s through 2013
-
Grov, C., et al. 2014. "Gay and bisexual men's use of the internet: Research from the 1990s through 2013", The Journal of Sex Research (51:4), pp. 390-409.
-
(2014)
The Journal of Sex Research
, vol.51
, Issue.4
, pp. 390-409
-
-
Grov, C.1
-
10
-
-
84963541587
-
-
20110, Android Forensics, A. Hoog, ed., Syngress
-
Hoog, A. 20110 "Android device, data, and app security", Android Forensics, A. Hoog, ed., Syngress, pp. 159-194.
-
Android Device, Data, and App Security
, pp. 159-194
-
-
Hoog, A.1
-
11
-
-
84919570761
-
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
-
Imgraben, J., Engelbrecht, A. and Choo, K.-K. R. 2014, "Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users", Behaviour & Information Technology (33:12), pp. 1347-1360.
-
(2014)
Behaviour & Information Technology
, vol.33
, Issue.12
, pp. 1347-1360
-
-
Imgraben, J.1
Engelbrecht, A.2
Choo, K.-K.R.3
-
14
-
-
84908233829
-
User control of personal information concerning mobile-app: Notice and consent?
-
Liu, Y. 2014. "User control of personal information concerning mobile-app: Notice and consent?", Computer Law & Security Review (30:5), pp. 521-529
-
(2014)
Computer Law & Security Review
, vol.30
, Issue.5
, pp. 521-529
-
-
Liu, Y.1
-
16
-
-
84963541600
-
Conceptual evidence collection and analysis methodology for Android devices
-
Ko, R. and Choo, K.-K. R., editors, In press
-
Martini, B., Do, Q. and Choo, K.-K. R. 2015a, "Conceptual evidence collection and analysis methodology for Android devices". In Ko, R. and Choo, K.-K. R., editors, Cloud Security Ecosystem, Syngress, an Imprint of Elsevier [In press].
-
(2015)
Cloud Security Ecosystem, Syngress, an Imprint of Elsevier
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
17
-
-
85018181307
-
Mobile cloud forensics: An analysis of seven popular Android apps
-
Ko, R. and Choo, K.-K. R., editors, In press
-
Martini, B., Do, Q. and Choo, K.-K. R. 2015b, "Mobile cloud forensics: An analysis of seven popular Android apps". In Ko, R. and Choo, K.-K. R., editors, Cloud Security Ecosystem, Syngress, an Imprint of Elsevier [In press].
-
(2015)
Cloud Security Ecosystem, Syngress, an Imprint of Elsevier
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
20
-
-
84949109143
-
-
Last accessed 20 February 2015
-
Research2Guidance, 2013. "Mobile health market", http://www.research2guidance.com/shop/index.php/downloadable/download/sample/sample-id/2 62/[Last accessed 20 February 2015].
-
(2013)
Mobile Health Market
-
-
Research2Guidance1
-
21
-
-
84963570338
-
-
Last accessed 18 February 2015
-
Wilson, L. 2014. "Warriena Tagpuno Wright murder: Does Tinder leave you exposed?", http://www.news.com.au/technology/online/warriena-tagpuno-wright-murder-does-tinder-leaveyou-exposed/story-fnjwnhzf-1227025983590 [Last accessed 18 February 2015].
-
(2014)
Warriena Tagpuno Wright Murder: Does Tinder Leave You Exposed?
-
-
Wilson, L.1
|