Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do.
Brian HernackiPublished in: Inf. Secur. J. A Glob. Perspect. (2006)
Keyphrases
- mobile devices
- mobile phone
- smart phones
- mobile computing environment
- mobile internet
- mobile terminals
- wifi
- decision making
- web environment
- context aware
- information technology
- security risks
- user experience
- mobile applications
- physical location
- personal data
- user interaction
- user profiles
- information security
- end users
- social media
- privacy concerns
- information systems
- small screen
- cellular phone
- recommender systems
- access control
- security issues
- collaborative filtering
- ubiquitous computing
- learning activities