{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:33:32Z","timestamp":1725701612648},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334474"},{"type":"electronic","value":"9783642334481"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33448-1_9","type":"book-chapter","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T14:13:55Z","timestamp":1346163235000},"page":"62-66","source":"Crossref","is-referenced-by-count":1,"title":["PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security"],"prefix":"10.1007","author":[{"given":"Iosif","family":"Androulidakis","sequence":"first","affiliation":[]},{"given":"Gorazd","family":"Kandus","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"comScore M: Metrics: Smarter phones bring security risks: Study (2008)"},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.istr.2007.05.001","volume":"12","author":"A. Leung","year":"2007","unstructured":"Leung, A., Sheng, Y., Cruickshank, H.: The security challenges for mobile ubiquitous services. Information Security Technical Report\u00a012(3), 162\u2013171 (2007)","journal-title":"Information Security Technical Report"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Androulidakis, I., Kandus, G.: A Survey on Saving Personal Data in the Mobile Phone. Proceedings of Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 633\u2013638 (2011)","DOI":"10.1109\/ARES.2011.98"},{"key":"9_CR4","unstructured":"Allam, S.: Model to measure the maturity of smartphone security at software consultancies. Thesis. University of Fort Hare (2009)"},{"key":"9_CR5","unstructured":"McAfee: Mobile Security Report 2008 (2008)"},{"key":"9_CR6","unstructured":"Trend Micro: Smartphone Users Oblivious to Security. Trend Micro survey (2009)"},{"key":"9_CR7","unstructured":"CPP: Mobile phone theft hotspots. CPP survey (2010)"},{"key":"9_CR8","unstructured":"ITwire: One-third of Aussies lose mobile phones: survey. ITwire article (2010)"},{"key":"9_CR9","unstructured":"ABI Research, Study: Enterprises Need to Address Cell Phone Security (2009)"},{"key":"9_CR10","unstructured":"TechRepublic: Survey respondents say companies are lax on mobile security. TechRepublic article (2007)"},{"key":"9_CR11","unstructured":"Darkreading: Survey: 54 Percent Of Organizations Plan To Add Smartphone Antivirus This Year. Darkreading article (2010)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K., Bauer, L., Cranor, L., Hong, J., McLaren, B., Reiter, M., Sadeh, N.: User-Controllable Security and Privacy for Pervasive Computing. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, HotMobile 2007 (2007)","DOI":"10.1109\/WMCSA.2007.4389552"},{"issue":"5","key":"9_CR14","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.clsr.2010.07.001","volume":"26","author":"N.J. King","year":"2010","unstructured":"King, N.J., Jessen, P.W.: Profiling the mobile customer \u2013 Privacy concerns when behavioral advertisers target mobile phones. Computer Law & Security Review\u00a026(5), 455\u2013478 (2010)","journal-title":"Computer Law & Security Review"},{"key":"9_CR15","unstructured":"Goode Intelligence: Mobile security the next battleground (2009)"},{"key":"9_CR16","unstructured":"National Cyber Security Alliance (NCSA): Schools Lacking Cyber Security and Safety Education (2009)"},{"key":"9_CR17","unstructured":"Cable & Wireless: Workers lack mobile phone etiquette (2009)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-642-03655-2_57","volume-title":"Human-Computer Interaction \u2013 INTERACT 2009","author":"F. Keukelaere De","year":"2009","unstructured":"De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.E.: Adaptive Security Dialogs for Improved Security Behavior of Users. In: Gross, T., Gulliksen, J., Kotz\u00e9, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol.\u00a05726, pp. 510\u2013523. Springer, Heidelberg (2009)"},{"key":"9_CR19","series-title":"LNICST","first-page":"212","volume-title":"ICGS3\/e-Democracy 2011","author":"I. Androulidakis","year":"2012","unstructured":"Androulidakis, I., Kandus, G.: Feeling Secure vs. Being Secure the Mobile Phone User Case. In: Jahankhani, H., et al. (eds.) ICGS3\/e-Democracy 2011. LNICST, vol.\u00a099, pp. 212\u2013219. Springer, Heidelberg (2012)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Hakila, J., Chatfield, C.: Personal customization of mobile phones: a case study. In: Proceedings of NordiCHI, pp. 409\u2013412 (2006)","DOI":"10.1145\/1182475.1182524"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Global Security, Safety and Sustainability &amp; e-Democracy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33448-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:09:49Z","timestamp":1620130189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33448-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334474","9783642334481"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33448-1_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}