EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"mobile security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 7 Datensicherheit 7 Mobile security 7 mobile security 6 Mobile Anwendung 5 Mobile Security 5 Mobile application 5 Mobile communications 5 Mobilkommunikation 5 BYOD 3 Mobile Business 3 Mobile business 3 Mobile devices 3 Big Data 2 Big data 2 Data protection 2 Datenschutz 2 IT risk 2 Mobile Phone 2 Mobile device management 2 Mobile forensics 2 Mobile phone 2 Mobiltelefon 2 Privacy 2 decision making 2 phishing 2 risk management 2 strategies 2 threat 2 Ability 1 Adolescents 1 Android Security 1 Android unlock patterns 1 Anwendungssoftware 1 Application software 1 Awareness 1 Belief-action-outcome 1 Benutzerschnittstelle 1 Bring Your Own Device 1 Bring Your Own Technology 1
more ... less ...
Online availability
All
Undetermined 9 Free 5 CC license 2
Type of publication
All
Article 18
Type of publication (narrower categories)
All
Article in journal 10 Aufsatz in Zeitschrift 10 research-article 3 Article 1
Language
All
English 13 German 3 Undetermined 2
Author
All
Cairns, Paul 2 Fietz, Adrian 2 Gheorghe, Mirela 2 Stanciu, Victoria 2 Teuteberg, Frank 2 Walterbusch, Marc 2 Aichele, Christian 1 Andronoudi, Anna 1 Cappa, Francesco 1 Clark, John 1 Clark, John A. 1 Costa, Saree 1 El-Din, Rasha Salah 1 El-din, Rasha Salah 1 Fehér-Polgár, Pál 1 Georgiadis, Christos K. 1 Hanafizadeh, Payam 1 Hayes, Darren 1 Kim, Seongcheol 1 Knopper, Klaus 1 Kolbe, Lutz 1 Le-Khac, Nhien-An 1 Lowry, Paul Benjamin 1 Meng, Weizhi 1 Michelberger, Pál 1 Moody, Gregory D. 1 Mujeye, Stephen 1 Rivadeneira Zambrano, Fabricio R. 1 Rodriguez Rafael, Glen D. 1 Ruch, Thierry Jean 1 Schönberger, Marius 1 Stiakakis, Emmanouil 1 Wu, Dezhi 1 Yan, River 1 Zhang, Jun 1 Zhang, Sonya 1
more ... less ...
Institution
All
Keleti Károly Gazdasági Kar, Óbudai Egyetem 1
Published in...
All
HMD : Praxis der Wirtschaftsinformatik 3 Digital business 2 Information & Computer Security 2 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information systems and e-business management : ISeB 1 International Journal of Cyber Behavior, Psychology and Learning (IJCBPL) 1 International Journal of Mobile Human Computer Interaction (IJMHCI) 1 International journal of electronic business 1 Journal of Accounting and Management Information Systems (JAMIS) 1 Journal of Enterprise Information Management 1 Journal of Management and Strategy 1 Journal of accounting & management information systems : JAMIS 1 Journal of management and strategy : JMS 1 Volume of Management, Enterprise and Benchmarking in the 21st century 1
more ... less ...
Source
All
ECONIS (ZBW) 10 Other ZBW resources 5 RePEc 2 EconStor 1
Showing 1 - 10 of 18
Cover Image
An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices
Mujeye, Stephen - In: Information & Computer Security 31 (2023) 5, pp. 624-634
Purpose This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices. Design/methodology/approach A survey was used to investigate the differences in behaviors and practices of security-conscious users...
Persistent link: https://www.econbiz.de/10014754749
Saved in:
Cover Image
Digital Business : a new forum for discussion and debate on digital business model and digital transformation
Hanafizadeh, Payam; Kim, Seongcheol - In: Digital business 1 (2020) 1, pp. 1-2
Persistent link: https://www.econbiz.de/10012594193
Saved in:
Cover Image
An effective approach to mobile device management : security and privacy issues associated with mobile applications
Hayes, Darren; Cappa, Francesco; Le-Khac, Nhien-An - In: Digital business 1 (2020) 1, pp. 1-8
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the...
Persistent link: https://www.econbiz.de/10012594293
Saved in:
Cover Image
Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention
Wu, Dezhi; Moody, Gregory D.; Zhang, Jun; Lowry, Paul … - In: Information & management : the internat. journal of … 57 (2020) 5, pp. 1-15
Persistent link: https://www.econbiz.de/10012293392
Saved in:
Cover Image
Facing the Mobile Revolution: A Romanian Insight
Stanciu, Victoria; Gheorghe, Mirela - In: Journal of Accounting and Management Information … 18 (2019) 1, pp. 101-118
-depth understanding of the accounting students' profile as mobile devices' users and their knowledge and awareness in regard with mobile … security threats. Data: The analyzed sample includes 180 subjects, out of which 81% are bachelors in accounting (38% 1st year …
Persistent link: https://www.econbiz.de/10015196273
Saved in:
Cover Image
Users' perceptions about mobile security breaches
Stiakakis, Emmanouil; Georgiadis, Christos K.; … - In: Information systems and e-business management : ISeB 14 (2016) 4, pp. 857-882
Persistent link: https://www.econbiz.de/10011673350
Saved in:
Cover Image
Facing the mobile revolution : a Romanian insight
Stanciu, Victoria; Gheorghe, Mirela - In: Journal of accounting & management information systems … 18 (2019) 1, pp. 101-118
Persistent link: https://www.econbiz.de/10012098794
Saved in:
Cover Image
Mobile Users' Strategies for Managing Phishing Attacks
El-Din, Rasha Salah; Cairns, Paul; Clark, John - In: Journal of Management and Strategy 5 (2014) 2, pp. 70-81
Phishing is the use of electronic media, like emails and SMS messages, to fraudulently elicit private information or obtain money under false pretence. Though there is considerable interest in phishing as a security problem, there is little previous research from the human factors perspective...
Persistent link: https://www.econbiz.de/10011267513
Saved in:
Cover Image
Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation
Zhang, Sonya; Costa, Saree - In: International Journal of Mobile Human Computer … 10 (2018) 1, pp. 23-39
are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of … recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a … generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web …
Persistent link: https://www.econbiz.de/10012046604
Saved in:
Cover Image
Bring your own device : a survey of threats and security management models
Rivadeneira Zambrano, Fabricio R.; Rodriguez Rafael, Glen D. - In: International journal of electronic business 14 (2018) 2, pp. 146-170
Persistent link: https://www.econbiz.de/10011980105
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...