Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Mobile communication systems
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Security behaviour of mobile financial service users
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (5): 719–741.
Published: 27 June 2020
... Privacy Information security Consumers Mobile communication systems Security Self-efficacy theory Technology threat avoidance theory Mobile financial service The proliferation of mobile phones usage coupled with the deficit in accessing formal bank services within the Africa continent...
Journal Articles
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (4): 204–225.
Published: 12 October 2010
... as little as 24 hours. Sigi Goode can be contacted at: sigi.goode@anu.edu.au © Emerald Group Publishing Limited 2010 Mobile communication systems Integrated software Copyright law Data security Information systems The apparent problems of software piracy have been well...
Journal Articles
A personalized rhythm click‐based authentication system
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (2): 72–85.
Published: 08 June 2010
... be contacted at: tychang@cc.ncue.edu.tw © Emerald Group Publishing Limited 2010 Message authentication Mouse controllers Neural nets Interactive devices Biometrics Mobile communication systems Keystroke characteristics is one of the biometric techniques which does not require other...
Journal Articles
An exploration of wireless computing risks: Development of a risk taxonomy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (3): 245–254.
Published: 01 July 2004
... restrictions that may apply to their use such as low bandwidth, high transmission costs, limited processing and storage resources and real time constraints (Engels, 2002 ; Rahman and Imai, 2002). Data security Risk management Mobile communication systems The global mobile commerce (m‐commerce...
Journal Articles
Keystroke dynamics on a mobile handset: a feasibility study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (4): 161–166.
Published: 01 October 2003
... experimentation by the authors. Table I Investigation results Figure 1 Data capture software © MCB UP Limited 2003 Mobile communication systems Telephone equipment Communication skills Digital signal processing chips Personal communiction networks Neural nets...
