On Mobile Device Security Practices and Training Efficacy: An Empirical Study.
Amita Goyal ChinUgochukwu O. EtudoMark A. HarrisPublished in: Informatics Educ. (2016)
Keyphrases
- mobile devices
- intrusion detection
- access control
- training set
- online learning
- mobile commerce
- security level
- security issues
- training examples
- information security
- training process
- training algorithm
- training phase
- encryption scheme
- context aware
- mobile learning
- network security
- mobile applications
- security policies
- location aware
- learning environment