Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Keywords: Mobile devices
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (5): 624–634.
Published: 18 July 2023
...Stephen Mujeye Purpose This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices. Design/methodology/approach A survey was used to investigate the differences in behaviors and practices of security...
Journal Articles
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (5): 687–704.
Published: 26 May 2022
... authentication (BBCA) system that is based on users keystroke dynamics and touch gestures on mobile devices. This paper aims to build a system that will continuously authenticate the user of a smartphone. Design/methodology/approach Session authentication schemes establish the identity of the user only...
Journal Articles
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (2): 243–254.
Published: 07 December 2021
... collection tool for mobile devices named BioGames App. The BioGames App collects keystroke dynamics, touch gestures, and motion modalities and is available on GitHub. Interested researchers and practitioners may use it to create their datasets for research purposes. Design/methodology/approach One major...
Journal Articles
A survey of security risks of mobile social media through blog mining and an extensive literature search
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (5): 381–400.
Published: 25 November 2013
... development of security risks associated with mobile social media. © Emerald Group Publishing Limited 2013 Risk mitigation Social media Mobile devices Mobile social media Security risks Bring your own device Enterprise security Blog mining An increasing number of companies...
