|
|
|
Kenneth Li Minn Ang, Jasmine Kah Phooi Seng and Ericmoore Ngharamike
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices. Mobile crowdsourcing can be seen as a new paradigm contributing to th...
ver más
|
|
|
|
|
|
|
Kathleen Downer and Maumita Bhattacharya
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, e...
ver más
|
|
|
|
|
|
|
Patrick Margo Margo Otto,Job Dubihlela,Olumide Henrie Benedict
Pág. pp. 23 - 34
This paper focuses on the importance of policies, procedures and employee training and awareness as aid to manage risks associated with the usage of mobile devices in local government entities in the Namakwa District of the Northern Cape region. A quanti...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ...
ver más
|
|
|
|
|
|
|
Maryam Mehrnezhad and Ehsan Toreini
Mobile sensors have already proven to be helpful in different aspects of people?s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While th...
ver más
|
|
|
|
|
|
|
Miroslav Behan, Ondrej Krejcar, Thabit Sabbah and Ali Selamat
Today?s digital society is interconnected and networked, with modern smart devices ubiquitously built into and embedded within smart environments and other environments, where people (their users) typically live. It is very important to mention that sens...
ver más
|
|
|
|
|
|
|
Jani Suomalainen, Kimmo Ahola, Mikko Majanen, Olli Mämmelä and Pekka Ruuska
Fifth generation (5G) technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between diffe...
ver más
|
|
|
|
|
|
|
Vasileios Gkioulos, Gaute Wangen and Sokratis K. Katsikas
Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A pletho...
ver más
|
|
|
|
|
|
|
Bram Bonné, Gustavo Rovelo, Peter Quax and Wim Lamotte
Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security...
ver más
|
|
|
|
|
|
|
Mohammed M. Alani
Pág. pp. 130 - 144
Having a share of over 80% of the smartphone market, Android has become an important mobile operating system that is used by billions of users on daily basis. With the widespread use of smartphones in general, and Android in specific, privacy concerns gr...
ver más
|
|
|
|