Skip to Main Content
Keywords: Mobile communication systems
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2020) 28 (5): 719–741.
Published: 27 June 2020
... Privacy Information security Consumers Mobile communication systems Security Self-efficacy theory Technology threat avoidance theory Mobile financial service The proliferation of mobile phones usage coupled with the deficit in accessing formal bank services within the Africa continent...
Journal Articles
Journal Articles
Information Management & Computer Security (2010) 18 (2): 72–85.
Published: 08 June 2010
... be contacted at: tychang@cc.ncue.edu.tw © Emerald Group Publishing Limited 2010 Message authentication Mouse controllers Neural nets Interactive devices Biometrics Mobile communication systems Keystroke characteristics is one of the biometric techniques which does not require other...
Journal Articles
Information Management & Computer Security (2004) 12 (3): 245–254.
Published: 01 July 2004
... restrictions that may apply to their use such as low bandwidth, high transmission costs, limited processing and storage resources and real time constraints (Engels, 2002 ; Rahman and Imai, 2002). Data security Risk management Mobile communication systems The global mobile commerce (m‐commerce...
Journal Articles
Information Management & Computer Security (2003) 11 (4): 161–166.
Published: 01 October 2003
... experimentation by the authors. Table I Investigation results Figure 1 Data capture software © MCB UP Limited 2003 Mobile communication systems Telephone equipment Communication skills Digital signal processing chips Personal communiction networks Neural nets...

or Create an Account

Close Modal
Close Modal