Otwarty dostęp

Mobile Technologies at Risk: A Literature Review on the Evolving Challenges and Solutions in Mobile Technology Security


Zacytuj

Al-Khateeb, S., & Agarwal, N. (2016). The rise & fall of #NoBackDoor on Twitter: The apple vs. FBI case. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Available at: https://doi.org/10.1109/asonam.2016.7752334. Search in Google Scholar

Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, Vol. 13, Issue 9, 5700. Available at: https://doi.org/10.3390/app13095700. Search in Google Scholar

Arksey, H., & O’Malley, L. (2005). Scoping studies: towards a methodological framework. International Journal of Social Research Methodology, Vol. 8, Issue 1, 19-32. Search in Google Scholar

Asefa, A., et al. (2022). Does the perception of HIV risk among female sex workers affect HIV prevention behavior? Application of the Health Belief Model (H.B.M.). BMC Public Health, Vol. 22, 1-10. Available at: https://doi.org/10.1186/s12889-022-14046-3. Search in Google Scholar

Black, L., Scala, N.M., Goethals, P.L., & Howard, J. (2018). Values and trends in cybersecurity. In Proceedings of the Institute of Industrial and Systems Engineering Conference. 1820-1825. Orlando, FL: Institute of Industrial and Systems Engineers. Search in Google Scholar

Cao, N. (2022). Research on the influence of wearable equipment on sports under the background of information technology. 2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI). Available at: https://doi.org/10.1109/icceai55464.2022.00185. Search in Google Scholar

Cichonski, P.R., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide: Recommendations of the National Institute of Standards and Technology. Available at: https://doi.org/10.6028/nist.sp.800-61r2. Search in Google Scholar

Coombs, W.T. (2007). Protecting organization reputations during a crisis: The development and application of situational crisis communication theory. Corporate Reputation Review, Vol. 10, Issue 3, 163-176. Available at: https://doi.org/10.1057/palgrave.crr.1550049. Search in Google Scholar

Cybersecurity|NIST. (2023, October 10). NIST. Available at: https://www.nist.gov/cybersecurity. Search in Google Scholar

FBI’s Internet Crime Complaint Center. (2021). Internet crime report 2021. Federal Bureau of Investigation. Available at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf. Search in Google Scholar

Hiremath, S.V., Yang, G., & Mankodiya, K. (2014). Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare. 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH), 304-307. Available at: https://doi.org/10.1109/mobihealth.2014.7015971. Search in Google Scholar

Hunt, R. (2013). Security testing in Android networks - A practical case study. 2013 19th IEEE International Conference on Networks (ICON). Available at: https://doi.org/10.1109/icon.2013.6781950. Search in Google Scholar

International Organization for Standardization. (n.d.). ISO - About us. ISO. Available at: https://www.iso.org/about-us.html, accessed on February 3, 2024. Search in Google Scholar

International Organization for Standardization. (2023, February). ISO/IEC 27035-1:2023. ISO. Available at: https://www.iso.org/standard/78973.html. Search in Google Scholar

Jones, C., Jensen, J.D., Scherr, C.L., Brown, N., Christy, K.R., & Weaver, J. (2014). The health belief model as an explanatory framework in communication research: Exploring parallel, serial, and moderated mediation. Health Communication, Vol. 30, Issue 6, 566-576. Available at: https://doi.org/10.1080/10410236.2013.873363. Search in Google Scholar

Kotwal, P.A., & Singh, A.R. (2012). Evolution and effects of mobile cloud computing, middleware services on cloud, future prospects: A peek into the mobile cloud operating systems. 2012 IEEE International Conference on Computational Intelligence and Computing Research. Available at: https://doi.org/10.1109/iccic.2012.6510270. Search in Google Scholar

Landmann, M. (2010). Managing smartphone security risk. In Proceedings of the 2010 Information Security Curriculum Development Conference, 145-155. Search in Google Scholar

Mobile Security Updates: Understanding the issues. (2021, August 5). Federal Trade Commission. Available at: https://www.ftc.gov/reports/mobile-security-updates-understanding-issues. Search in Google Scholar

Nicas, J., & Benner, K. (2020, January 7). FBI Asks Apple to Help Unlock Two iPhones. The New York Times. Available at: https://www.nytimes.com/2020/01/07/technology/apple-fbi-iphone-encryption.html, accessed on February 28, 2022. Search in Google Scholar

NIST. (2024, January 24). NIST. Available at: https://www.nist.gov/. Search in Google Scholar

Novac, O.C., et al. (2017a). Comparative study of Google Android, Apple iOS, and Microsoft Windows Phone mobile operating systems. 2017 14th International Conference on Engineering of Modern Electric Systems (EMES). Available at: https://doi.org/10.1109/emes.2017.7980403. Search in Google Scholar

Ohlhausen, M.K., & McSweeny, T. (2018). Mobile security updates: Understanding the issues. Federal Trade Commission, 1-134. Available at: http://www/ftc.gov. Search in Google Scholar

Oludayo, O.I., Kikelomo, A.A., Adedeji, A.A., & Ayodeji, A.A. (2023). A review of smartphone security challenges and prevention. International Research Journal of Innovations in Engineering and Technology, Vol. 7, Issue 5, 234235. Available at: https://doi.org/10.47001/irjiet/2023.705030. Search in Google Scholar

Owsley, B. (2017). Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it? Health and Technology, Vol. 7, Issue 4, 369-376. Available at: https://doi.org/10.1007/s12553-017-0192-4. Search in Google Scholar

Pigola, A., & Da Costa, P.R. (2023). Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats. Communications of the Association for Information Systems, Vol. 53, Issue 1, 1099-1135. Available at: https://doi.org/10.17705/1cais.05347. Search in Google Scholar

Rakhmatov, D. (2021). Mobile technologies in higher education. Mental Enlightenment Scientific-Methodological Journal, 2021, Vol. 2, 182-196. Available at: https://doi.org/10.51348/tziuj2021s21. Search in Google Scholar

Saldana, J.J. II. (2023). The effect of cybersecurity training on government employee’s knowledge of cybersecurity issues and practices (Order No. 30314775). ProQuest One Academic. (2844501501). Available at: https://www.proquest.com/dissertations-theses/effect-cybersecurity-training-on-government/docview/2844501501/se-2. Search in Google Scholar

Scortzaru, A. (2022). The moderating effect of personalization on the influence of consumer privacy concerns on mobile technology adoption (Order No. 29326882). ProQuest One Academic. (2716536834). Available at: https://www.proquest.com/dissertations-theses/moderating-effect-personalization-on-influence/docview/2716536834/se-2. Search in Google Scholar

Smith, J.D. (2022). Employees’ protection motivations to comply with bring your own device security policies: A quantitative study (Order No. 29059869). ProQuest One Academic. (2644338575). Available at: https://www.proquest.com/dissertations-theses/employees-protection-motivations-comply-with/docview/2644338575/se-2. Search in Google Scholar

Vyas, A. (2022, February 4). 12 rising trends in mobile application development. Maruti Techlabs. Available at: https://marutitech.com/7-trends-of-mobile-application-development/, accessed on March 1, 2022. Search in Google Scholar

Wang, C.-X., et al. (2023). On the road to 6G: Visions, requirements, key technologies, and testbeds. IEEE Communications Surveys and Tutorials, Vol. 25, Issue 2, 905-974. Available at: https://doi.org/10.1109/comst.2023.3249835. Search in Google Scholar

Weichbroth, P., & Łysik, Ł. (2020). Mobile security: threats and best practices. Mobile Information Systems, 2020, 1-15. Available at: https://doi.org/10.1155/2020/8828078. Search in Google Scholar

Yahya, T.B., Jamal, N.M., Sundarakani, B., & Omain, S.Z. (2023). The effects of data security and perceived benefits on mobile phone recycling behaviour and the recycling intention mediation role. Recycling, Vol. 8, Issue 1, 27. Available at: https://doi.org/10.3390/recycling8010027. Search in Google Scholar

Xiao, X., Wang, Y., & Li, S. (2014). Privacy requirements patterns for mobile operating systems. 2014 IEEE 4th International Workshop on Requirements Patterns (RePa), 39-42. Available at: https://doi.org/10.1109/repa.2014.6894842. Search in Google Scholar