[
Al-Khateeb, S., & Agarwal, N. (2016). The rise & fall of #NoBackDoor on Twitter: The apple vs. FBI case. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Available at: https://doi.org/10.1109/asonam.2016.7752334.
]Search in Google Scholar
[
Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, Vol. 13, Issue 9, 5700. Available at: https://doi.org/10.3390/app13095700.
]Search in Google Scholar
[
Arksey, H., & O’Malley, L. (2005). Scoping studies: towards a methodological framework. International Journal of Social Research Methodology, Vol. 8, Issue 1, 19-32.
]Search in Google Scholar
[
Asefa, A., et al. (2022). Does the perception of HIV risk among female sex workers affect HIV prevention behavior? Application of the Health Belief Model (H.B.M.). BMC Public Health, Vol. 22, 1-10. Available at: https://doi.org/10.1186/s12889-022-14046-3.
]Search in Google Scholar
[
Black, L., Scala, N.M., Goethals, P.L., & Howard, J. (2018). Values and trends in cybersecurity. In Proceedings of the Institute of Industrial and Systems Engineering Conference. 1820-1825. Orlando, FL: Institute of Industrial and Systems Engineers.
]Search in Google Scholar
[
Cao, N. (2022). Research on the influence of wearable equipment on sports under the background of information technology. 2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI). Available at: https://doi.org/10.1109/icceai55464.2022.00185.
]Search in Google Scholar
[
Cichonski, P.R., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide: Recommendations of the National Institute of Standards and Technology. Available at: https://doi.org/10.6028/nist.sp.800-61r2.
]Search in Google Scholar
[
Coombs, W.T. (2007). Protecting organization reputations during a crisis: The development and application of situational crisis communication theory. Corporate Reputation Review, Vol. 10, Issue 3, 163-176. Available at: https://doi.org/10.1057/palgrave.crr.1550049.
]Search in Google Scholar
[
Cybersecurity|NIST. (2023, October 10). NIST. Available at: https://www.nist.gov/cybersecurity.
]Search in Google Scholar
[
FBI’s Internet Crime Complaint Center. (2021). Internet crime report 2021. Federal Bureau of Investigation. Available at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf.
]Search in Google Scholar
[
Hiremath, S.V., Yang, G., & Mankodiya, K. (2014). Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare. 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH), 304-307. Available at: https://doi.org/10.1109/mobihealth.2014.7015971.
]Search in Google Scholar
[
Hunt, R. (2013). Security testing in Android networks - A practical case study. 2013 19th IEEE International Conference on Networks (ICON). Available at: https://doi.org/10.1109/icon.2013.6781950.
]Search in Google Scholar
[
International Organization for Standardization. (n.d.). ISO - About us. ISO. Available at: https://www.iso.org/about-us.html, accessed on February 3, 2024.
]Search in Google Scholar
[
International Organization for Standardization. (2023, February). ISO/IEC 27035-1:2023. ISO. Available at: https://www.iso.org/standard/78973.html.
]Search in Google Scholar
[
Jones, C., Jensen, J.D., Scherr, C.L., Brown, N., Christy, K.R., & Weaver, J. (2014). The health belief model as an explanatory framework in communication research: Exploring parallel, serial, and moderated mediation. Health Communication, Vol. 30, Issue 6, 566-576. Available at: https://doi.org/10.1080/10410236.2013.873363.
]Search in Google Scholar
[
Kotwal, P.A., & Singh, A.R. (2012). Evolution and effects of mobile cloud computing, middleware services on cloud, future prospects: A peek into the mobile cloud operating systems. 2012 IEEE International Conference on Computational Intelligence and Computing Research. Available at: https://doi.org/10.1109/iccic.2012.6510270.
]Search in Google Scholar
[
Landmann, M. (2010). Managing smartphone security risk. In Proceedings of the 2010 Information Security Curriculum Development Conference, 145-155.
]Search in Google Scholar
[
Mobile Security Updates: Understanding the issues. (2021, August 5). Federal Trade Commission. Available at: https://www.ftc.gov/reports/mobile-security-updates-understanding-issues.
]Search in Google Scholar
[
Nicas, J., & Benner, K. (2020, January 7). FBI Asks Apple to Help Unlock Two iPhones. The New York Times. Available at: https://www.nytimes.com/2020/01/07/technology/apple-fbi-iphone-encryption.html, accessed on February 28, 2022.
]Search in Google Scholar
[
NIST. (2024, January 24). NIST. Available at: https://www.nist.gov/.
]Search in Google Scholar
[
Novac, O.C., et al. (2017a). Comparative study of Google Android, Apple iOS, and Microsoft Windows Phone mobile operating systems. 2017 14th International Conference on Engineering of Modern Electric Systems (EMES). Available at: https://doi.org/10.1109/emes.2017.7980403.
]Search in Google Scholar
[
Ohlhausen, M.K., & McSweeny, T. (2018). Mobile security updates: Understanding the issues. Federal Trade Commission, 1-134. Available at: http://www/ftc.gov.
]Search in Google Scholar
[
Oludayo, O.I., Kikelomo, A.A., Adedeji, A.A., & Ayodeji, A.A. (2023). A review of smartphone security challenges and prevention. International Research Journal of Innovations in Engineering and Technology, Vol. 7, Issue 5, 234235. Available at: https://doi.org/10.47001/irjiet/2023.705030.
]Search in Google Scholar
[
Owsley, B. (2017). Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it? Health and Technology, Vol. 7, Issue 4, 369-376. Available at: https://doi.org/10.1007/s12553-017-0192-4.
]Search in Google Scholar
[
Pigola, A., & Da Costa, P.R. (2023). Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats. Communications of the Association for Information Systems, Vol. 53, Issue 1, 1099-1135. Available at: https://doi.org/10.17705/1cais.05347.
]Search in Google Scholar
[
Rakhmatov, D. (2021). Mobile technologies in higher education. Mental Enlightenment Scientific-Methodological Journal, 2021, Vol. 2, 182-196. Available at: https://doi.org/10.51348/tziuj2021s21.
]Search in Google Scholar
[
Saldana, J.J. II. (2023). The effect of cybersecurity training on government employee’s knowledge of cybersecurity issues and practices (Order No. 30314775). ProQuest One Academic. (2844501501). Available at: https://www.proquest.com/dissertations-theses/effect-cybersecurity-training-on-government/docview/2844501501/se-2.
]Search in Google Scholar
[
Scortzaru, A. (2022). The moderating effect of personalization on the influence of consumer privacy concerns on mobile technology adoption (Order No. 29326882). ProQuest One Academic. (2716536834). Available at: https://www.proquest.com/dissertations-theses/moderating-effect-personalization-on-influence/docview/2716536834/se-2.
]Search in Google Scholar
[
Smith, J.D. (2022). Employees’ protection motivations to comply with bring your own device security policies: A quantitative study (Order No. 29059869). ProQuest One Academic. (2644338575). Available at: https://www.proquest.com/dissertations-theses/employees-protection-motivations-comply-with/docview/2644338575/se-2.
]Search in Google Scholar
[
Vyas, A. (2022, February 4). 12 rising trends in mobile application development. Maruti Techlabs. Available at: https://marutitech.com/7-trends-of-mobile-application-development/, accessed on March 1, 2022.
]Search in Google Scholar
[
Wang, C.-X., et al. (2023). On the road to 6G: Visions, requirements, key technologies, and testbeds. IEEE Communications Surveys and Tutorials, Vol. 25, Issue 2, 905-974. Available at: https://doi.org/10.1109/comst.2023.3249835.
]Search in Google Scholar
[
Weichbroth, P., & Łysik, Ł. (2020). Mobile security: threats and best practices. Mobile Information Systems, 2020, 1-15. Available at: https://doi.org/10.1155/2020/8828078.
]Search in Google Scholar
[
Yahya, T.B., Jamal, N.M., Sundarakani, B., & Omain, S.Z. (2023). The effects of data security and perceived benefits on mobile phone recycling behaviour and the recycling intention mediation role. Recycling, Vol. 8, Issue 1, 27. Available at: https://doi.org/10.3390/recycling8010027.
]Search in Google Scholar
[
Xiao, X., Wang, Y., & Li, S. (2014). Privacy requirements patterns for mobile operating systems. 2014 IEEE 4th International Workshop on Requirements Patterns (RePa), 39-42. Available at: https://doi.org/10.1109/repa.2014.6894842.
]Search in Google Scholar