scispace - formally typeset
Open AccessJournal ArticleDOI

Delegate the smartphone user? Security awareness in smartphone platforms

Reads0
Chats0
TLDR
A prediction model is built to identify users who trust the app repository and is assessed, evaluated and proved to be statistically significant and efficient.
About
This article is published in Computers & Security.The article was published on 2013-05-01 and is currently open access. It has received 238 citations till now. The article focuses on the topics: Cloud computing security & Security through obscurity.

read more

Citations
More filters
Journal ArticleDOI

DroidDetector: Android Malware Characterization and Detection Using Deep Learning

TL;DR: An online deep-learning-based Android malware detection engine (DroidDetector) that can automatically detect whether an app is a malware or not is implemented and shows that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data.
Journal ArticleDOI

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)

TL;DR: Results from 500 Australian employees indicate that knowledge of policy and procedures had a stronger influence on attitude towards policy and procedure than self-reported behaviour, suggesting that training and education will be more effective if it outlines not only what is expected but also provides an understanding of why this is important.
Journal ArticleDOI

Evaluating mobile phone applications for health behaviour change: A systematic review:

TL;DR: This review is unable to suggest a single best practice approach to evaluate mobile health apps, but suggests better ways to assess the quality and effectiveness of apps are needed.
Journal ArticleDOI

The Human Aspects of Information Security Questionnaire (HAIS-Q)

TL;DR: Results indicated that participants who scored more highly on the HAIS-Q had better performance in the phishing experiment, and provided evidence for its convergent validity, which means the HAis-Q can predict an aspect of information security behaviour, and provides evidence for the validity of this instrument.

The Privacy and Security Behaviors of Smartphone App Developers

TL;DR: It is found that smaller companies are less likely to demonstrate positive privacy and security behaviors and third-party tools for ads and analytics are pervasive, and developers aren’t aware of the data collected by these tools.
References
More filters
Book

Statistical Power Analysis for the Behavioral Sciences

TL;DR: The concepts of power analysis are discussed in this paper, where Chi-square Tests for Goodness of Fit and Contingency Tables, t-Test for Means, and Sign Test are used.
Journal ArticleDOI

Coefficient alpha and the internal structure of tests.

TL;DR: In this paper, a general formula (α) of which a special case is the Kuder-Richardson coefficient of equivalence is shown to be the mean of all split-half coefficients resulting from different splittings of a test, therefore an estimate of the correlation between two random samples of items from a universe of items like those in the test.
Book

Applied Logistic Regression

TL;DR: Hosmer and Lemeshow as discussed by the authors provide an accessible introduction to the logistic regression model while incorporating advances of the last decade, including a variety of software packages for the analysis of data sets.
Journal ArticleDOI

Applied Logistic Regression.

TL;DR: Applied Logistic Regression, Third Edition provides an easily accessible introduction to the logistic regression model and highlights the power of this model by examining the relationship between a dichotomous outcome and a set of covariables.
Book

An Introduction to Qualitative Research

Uwe Flick
TL;DR: In this article, the authors present a review of the state-of-the-art in the field of qualitative research, focusing on the state of the art and the future.
Related Papers (5)