{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:34:19Z","timestamp":1729618459986,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/css.2011.6058568","type":"proceedings-article","created":{"date-parts":[[2011,10,24]],"date-time":"2011-10-24T16:30:29Z","timestamp":1319473829000},"page":"33-38","source":"Crossref","is-referenced-by-count":4,"title":["Ramifications of mobile phone advanced O\/S on security perceptions and practices"],"prefix":"10.1109","author":[{"given":"Iosif","family":"Androulidakis","sequence":"first","affiliation":[]},{"given":"Gorazd","family":"Kandus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"9","article-title":"Surveying Users' Opinions and Trends towards Mobile Payment Issues, Frontiers in Artificial Intelligence and Applications","author":"androulidakis","year":"0","journal-title":"Proceedings of Techniques and Applications for Mobile Commerce - TAMoCo 2008"},{"year":"2009","key":"ref11"},{"year":"2008","key":"ref12"},{"article-title":"Mail and Internet Surveys: The Tailored Design Method","year":"1999","author":"dillman","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/505532.505535","article-title":"Principles of Survey Research Part 1: Turning Lemons into Lemonade","volume":"26","author":"pfleeger","year":"2001","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165495"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.radi.2004.09.002"},{"key":"ref17","first-page":"160","article-title":"On a versatile and costless OMR system","volume":"4","author":"androulidakis","year":"2005","journal-title":"WSEAS Transactions on Computers"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/1402731"},{"year":"2010","key":"ref19"},{"key":"ref4","article-title":"Smartphone Users Oblivious to Security","author":"micro","year":"2009","journal-title":"Trend Micro survey"},{"key":"ref3","first-page":"42","article-title":"Intercepting Mobile Phones","author":"androulidakis","year":"2009","journal-title":"IT security professional magazine"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2005.78"},{"journal-title":"Mobile security the next battleground","article-title":"Goode Intelligence","year":"2009","key":"ref5"},{"journal-title":"Smarter phones bring security risks Study","article-title":"comScore M: Metrics","year":"2008","key":"ref8"},{"key":"ref7","first-page":"8","article-title":"Strategic Marketing Planning for Mobile Commerce Diffusion and Consumer Adoption","author":"vrechopoulos","year":"0","journal-title":"Proceedings of M-Business 2002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019968506856"},{"journal-title":"Synovate survey","article-title":"Global mobile phone survey shows the mobile is a &#x2018;remote control&#x2019; for life","year":"2009","key":"ref1"},{"key":"ref9","first-page":"130","article-title":"Survey Findings towards Awareness of Mobile Phones' Security Issues, Recent Advances in Data Networks, Communications, Computers","author":"androulidakis","year":"0","journal-title":"Proceedings of 7th WSEAS International Conference on Data Networks Communications Computers (DNCOCO &#x2018;08)"},{"year":"2010","key":"ref20"},{"article-title":"The Technical Writer's Handbook. Mill Valley, CA: University Science","year":"1989","author":"young","key":"ref21"}],"event":{"name":"2011 International Workshop on Cyberspace Safety and Security (CSS)","start":{"date-parts":[[2011,9,8]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 Third International Workshop on Cyberspace Safety and Security (CSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044610\/6058554\/06058568.pdf?arnumber=6058568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T04:32:14Z","timestamp":1497933134000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6058568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/css.2011.6058568","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}