Smartphone security: understanding smartphone users' trust in information security management.
Yu-Teng JangShuchih Ernest ChangYi-Jey TsaiPublished in: Secur. Commun. Networks (2014)
Keyphrases
- information security management
- mobile applications
- information security
- daily life
- security management
- risk management
- privacy concerns
- mobile devices
- end users
- trust relationships
- information systems
- user experience
- security issues
- personal data
- trust model
- smart phones
- security policies
- smart card
- security requirements
- intrusion detection
- social media
- databases
- network security