My Account Log in

1 option

Research anthology on securing mobile technologies and applications / Information Resource Management Association, USA.

EBSCOhost Academic eBook Collection (North America) Available online

EBSCOhost Academic eBook Collection (North America)
Format:
Book
Contributor:
Information Resources Management Association, contributor.
Language:
English
Subjects (All):
Mobile computing--Security measures.
Mobile computing.
Cell phone systems--Security measures.
Cell phone systems.
Computer crimes--Prevention.
Computer crimes.
Physical Description:
52 PDFs (2 volumes (837 pages))
Place of Publication:
Hershey, PA : IGI Global, [2021]
System Details:
Mode of access: World Wide Web.
Summary:
"This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the spread of fake news both within a human and technological context"-- Provided by publisher.
Contents:
Volume I. Section 1. Cyber attacks, threat detection, and security frameworks. Chapter 1. Smartphone security and forensic analysis ; Chapter 2. Mobile agent communication, security concerns, and approaches: an insight into different kinds of vulnerabilities a mobile agent could be subjected to and measures to control them ; Chapter 3. Recent advances delivered in mobile cloud computing's security and management challenges ; Chapter 4. Identification of cryptographic vulnerability and malware detection in android ; Chapter 5. Android botnets: a proof-of-concept using hybrid analysis approach ; Chapter 6. Preserving security of mobile anchors against physical layer attacks: a resilient scheme for wireless node localization ; Chapter 7. A framework for various attack identification in MANET using multi-granular rough set ; Chapter 8. A systematic study and analysis of security issues in mobile ad-hoc networks ; Chapter 9. A survey of efficient trust management schemes in mobile ad-hoc network: reliable trust management framework of MANET ; Chapter 10. Communiqué issues in MANET and VANET protocols with network security disquiet ; Chapter 11. Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment ; Chapter 12. Simple screen locking method using randomly generated number grid on image ; Chapter 13. Phishing attacks in mobile platforms ; Chapter 14. A novel approach to detect spam and smishing SMS using machine learning techniques ; Chapter 15. Feature based approach for detection of smishing messages in the mobile environment ; Chapter 16. Securing communication 2FA using post-quantic cryptosystem: case of QC-MDPC- mceliece cryptosystem
Section 2. Data protection, privacy, and user risk awareness. Chapter 17. Smartphone confrontational applications and security issues ; Chapter 18. Theft preventive measures for interconnected personal computer devices as proactive physical security of data ; Chapter 19. Mobile cyber information leakage: users' attitudes and information protection strategies ; Chapter 20. Protection of the communication and digital security of mobile phones as a fundamental right to privacy: a study of the jurisprudence of the Brazilian superior court of justice ; Chapter 21. Achieving secure and privacy-preserving in mobile social networks
Volume II. Chapter 22. User identity hiding method of android ; Chapter 23. Biometric systems in mobile devices: a study ; Chapter 24. Cell phone security: user awareness of security issues and mobile device management ; Chapter 25. Importance of information security and strategies to prevent data breaches in mobile devices ; Chapter 26. Mobile phone usage patterns, security concerns, and security practices of digital generation ; Chapter 27. Expectations and experiences of implementing a mobile secure communication application ; Chapter 28. Smart phone security practices: item analysis of mobile security behaviors of college students ; Chapter 29. Awareness, knowledge, and ability of mobile security among young mobile phone users ; Chapter 30. Coping strategies and paradoxes related to BYOD information security threats in France
Section 3. Security issues for apps, mobile banking, and mobile payment. Chapter 31. Threats and vulnerabilities of mobile applications ; Chapter 32. Techniques for analysis of mobile malware ; Chapter 33. Native vs. hybrid mobile applications as society enters the Internet of things ; Chapter 34. Android application security ; Chapter 35. A hybrid approach to detect the malicious applications in android-based smartphones using deep learning ; Chapter 36. Towards privacy risk analysis in android applications using machine learning approaches ; Chapter 37. How do mobile applications for cancer communicate about their privacy practices?: an analysis of privacy policies ; Chapter 38. How relevant are risk perceptions, effort, and performance expectancy in mobile banking adoption? ; Chapter 39. The mediating role of perceived value in the effect of multi-dimensional risk in mobile banking ; Chapter 40. An investigation into permissions requested by mobile banking on android platform ; Chapter 41. Mobile commerce technologies and management ; Chapter 42. A study of e-commerce transaction risk assessment model in mobile Internet ; Chapter 43. LD based framework to mitigate threats in mobile based payment system ; Chapter 44. Identity authentication security management in mobile payment systems.
Notes:
Description based on print version record.
"Critical Explorations" -- taken from front cover.
Includes bibliographical references and index.
ISBN:
1-7998-8602-6
1-7998-8601-8
OCLC:
1249470470

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account