An enhanced smartphone security model based on information security management system (ISMS) (English)
- New search for: Park, Jong Hyuk
- New search for: Yi, Ki Jung
- New search for: Jeong, Young-Sik
- New search for: Park, Jong Hyuk
- New search for: Yi, Ki Jung
- New search for: Jeong, Young-Sik
In:
Electronic Commerce Research
;
14
, 3
; 321-348
;
2014
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:An enhanced smartphone security model based on information security management system (ISMS)
-
Contributors:
-
Published in:Electronic Commerce Research ; 14, 3 ; 321-348
-
Publisher:
- New search for: Springer US
- New search for: Springer Science Business Media B.V.
-
Place of publication:Dordrecht
-
Publication date:2014
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.80 / 83.00 / 85.40 / 83.00$jVolkswirtschaft: Allgemeines / 54.80$jAngewandte Informatik / 85.40$jMarketing
- Further information on Basic classification
- New search for: oek 6479
-
Keywords:
-
Classification:
BKL: 54.80 Angewandte Informatik / 83.00 Volkswirtschaft: Allgemeines / 85.40 Marketing / 83.00$jVolkswirtschaft: Allgemeines / 54.80$jAngewandte Informatik / 85.40$jMarketing Local classification FBW: oek 6479 -
Source:
Table of contents – Volume 14, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 215
-
Introduction from the incoming editorChristopher Westland, J. et al. | 2014
- 217
-
Recent advanced applications and services for intelligent ubiquitous environmentsKim, Jongsung / Chao, Han-Chieh / Nguyen, Uyen Trang et al. | 2014
- 223
-
Design of online survey system with an advanced IPA discrimination index for customer satisfaction assessmentLiu, Hsiang-Chuan / Jeng, Bai-Cheng / Mai, Yi-Ting / Jheng, Yu-Du / Lin, Hao-Tung et al. | 2014
- 245
-
Quality evaluation and best service choice for cloud computing based on user preference and weights of attributes using the analytic network processChoi, Cheol-Rim / Jeong, Hwa-Young et al. | 2014
- 271
-
Lightweight secure storage model with fault-tolerance in cloud environmentAhmed, Muhra / Vu, Quang Hieu / Asal, Rasool / Al Muhairi, Hassan / Yeun, Chan Yeob et al. | 2014
- 293
-
Public IT service strategy for social information security in the intelligence all-things environmentYoo, Jinho / Chang, Hangbae et al. | 2014
- 321
-
An enhanced smartphone security model based on information security management system (ISMS)Park, Jong Hyuk / Yi, Ki Jung / Jeong, Young-Sik et al. | 2014
- 349
-
An efficient novel online shopping mechanism based on quantum communicationChou, Yao-Hsin / Lin, Fang-Jhu / Zeng, Guo-Jyun et al. | 2014
- 369
-
Correlating messages from multiple IM networks to identify digital forensic artifactsYasin, Muhammmad / Kausar, Firdous / Aleisa, Eisa / Kim, Jongsung et al. | 2014
- 389
-
IoT sensing framework with inter-cloud computing capability in vehicular networkingWan, Jiafu / Zou, Caifeng / Zhou, Keliang / Lu, Rongshuang / Li, Di et al. | 2014
- 417
-
PSO based time series models applied in exchange rate forecasting for business performance managementChang, Jui-Fang / Huang, Yueh-Min et al. | 2014