{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:31:19Z","timestamp":1743100279515,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642401596"},{"type":"electronic","value":"9783642401602"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40160-2_11","type":"book-chapter","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T23:17:24Z","timestamp":1377040644000},"page":"125-139","source":"Crossref","is-referenced-by-count":1,"title":["Assessing the Suitability of Current Smartphone Platforms for Mobile Government"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Zefferer","sequence":"first","affiliation":[]},{"given":"Sandra","family":"Kreuzhuber","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Teufl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Zefferer, T., Teufl, P.: Opportunities and Forthcoming Challenges of Smartphone-based m-Government Services. Megatrends in eGovernment - European Journal of ePractice (2011)"},{"key":"11_CR2","unstructured":"Schwartz, M.: Zeus Botnet Eurograbber Steals $47 Million. InformationWeekSecurity (2012), \n                    \n                      http:\/\/www.informationweek.com\/security\/attacks\/zeus-botnet-eurograbber-steals-47-millio\/240143837"},{"key":"11_CR3","unstructured":"Yanqing, G.: E-Government: Definition, Goals, Benefits and Risks. In: Management and Service Science MASS 2010 International Conference, pp. 9\u201312 (2010)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security Privacy Magazine\u00a07, 50\u201357 (2009)","journal-title":"IEEE Security Privacy Magazine"},{"key":"11_CR5","unstructured":"Woods, S.: Bring Your Own Device (BYOD) Increasingly Important to Small Business Budgets. Technorati (2013), \n                    \n                      http:\/\/technorati.com\/business\/small-business\/article\/bring-your-own-device-byod-increasingly"},{"key":"11_CR6","unstructured":"Enck, W., Octeau, D., Mcdaniel, P., Chaudhuri, S.: A Study of Android Application Security. USENIX Security, 935\u2013936 (August 2011)"},{"key":"11_CR7","unstructured":"Lookout Mobile Security: 2011 Mobile Threat Report (2011), \n                    \n                      https:\/\/www.lookout.com\/resources\/reports\/mobile-threat-report"},{"key":"11_CR8","unstructured":"Microsoft: Windows Phone 8 security and encryption (2013), \n                    \n                      http:\/\/www.windowsphone.com\/en-US\/business\/security"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H., Mcdaniel, P., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73\u201384 (2010)","DOI":"10.1145\/1866307.1866317"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.: Android Permissions: User Attention, Comprehension, and Behavior. Science and Technology, 1\u201316 (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"11_CR11","first-page":"663","volume-title":"Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, SIGCSE 2012","author":"M. Rogers","year":"2012","unstructured":"Rogers, M., Goadrich, M.: A hands-on comparison of iOS vs. android. In: Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, SIGCSE 2012, pp. 663\u2013663. ACM, New York (2012)"},{"key":"11_CR12","volume-title":"Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, COM.Geo 2011","author":"R. Renner","year":"2011","unstructured":"Renner, R., Moran, M., Hemani, Z., Thomas, E., Pio, H.S., Vargas, A.: A comparison of mobile GIS development options on smart phone platforms. In: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications, COM.Geo 2011. ACM, New York (2011)"}],"container-title":["Lecture Notes in Computer Science","Technology-Enabled Innovation for Democracy, Government and Governance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40160-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T15:37:51Z","timestamp":1558021071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40160-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642401596","9783642401602"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40160-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}