Smartphone Owners Need Security Advice. How Can We Ensure They Get it?
Karen RenaudRénette J. BlignautIsabella Margarethe VenterPublished in: CONF-IRM (2016)
Keyphrases
- information security
- security policies
- intrusion detection
- security systems
- security issues
- information assurance
- security management
- security protocols
- access control
- statistical databases
- databases
- security level
- data security
- network security
- security requirements
- security mechanisms
- key management
- computer security
- mobile applications
- security problems
- cyber security
- daily life
- anomaly detection
- security properties
- security threats
- mobile devices
- high security
- data sets