{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T14:24:44Z","timestamp":1770992684223,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940971","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"145-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Managing smart phone security risks"],"prefix":"10.1145","author":[{"given":"Max","family":"Landman","sequence":"first","affiliation":[{"name":"Kennesaw State University, MS, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Banks L. 2010 May 13. Mobile devices pose security dilemma for CIOs. CIO.com. Retreived June 7 2010 from http:\/\/www.cio.com.au\/article\/346474\/mobile_devices_pose_security_dilemma_cios\/  Banks L. 2010 May 13. Mobile devices pose security dilemma for CIOs. CIO.com . Retreived June 7 2010 from http:\/\/www.cio.com.au\/article\/346474\/mobile_devices_pose_security_dilemma_cios\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734596"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Botha R. A. Furnell S. M. and Clarke N. L. 2009. From desktop to mobile: Examining the security experience. Computers &amp; Security 28 130--137.  Botha R. A. Furnell S. M. and Clarke N. L. 2009. From desktop to mobile: Examining the security experience. Computers &amp; Security 28 130--137.","DOI":"10.1016\/j.cose.2008.11.001"},{"key":"e_1_3_2_1_4_1","unstructured":"Cox J. 2009 November 9. Smartphones on Wi-Fi vulnerable to security attack. NetworkWorld Asia. Retreived June 7 2010 from http:\/\/www.networksasia.net\/content\/smartphones-wi-fi-vulnerable-security-attack?src=related  Cox J. 2009 November 9. Smartphones on Wi-Fi vulnerable to security attack. NetworkWorld Asia . Retreived June 7 2010 from http:\/\/www.networksasia.net\/content\/smartphones-wi-fi-vulnerable-security-attack?src=related"},{"issue":"10","key":"e_1_3_2_1_5_1","first-page":"1","article-title":"March. Mobile browsers do security no favors","volume":"26","author":"Cox J.","year":"2009","journal-title":"Network World"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1742-6847(06)70440-2"},{"key":"e_1_3_2_1_7_1","volume-title":"October. Inside Smartphone Security. InformationWeek, (Oct. 6","author":"Dreger R.","year":"2008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(06)70450-0"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(06)70399-3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1402701.1402714"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Fitzgerald J. 2009. Managing mobile devices. Computer Fraud &amp; Security 2009(4) 18--19.  Fitzgerald J. 2009. Managing mobile devices. Computer Fraud &amp; Security 2009 (4) 18--19.","DOI":"10.1016\/S1361-3723(09)70049-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1754-4548(10)70016-4"},{"key":"e_1_3_2_1_14_1","unstructured":"Goodchild J. 2009 July 15. Network managers beware: more infected devices are coming to connect. NetworkWorld Asia. Retreived June 7 2010 from http:\/\/www.networksasia.net\/content\/network-managers-beware-more-infected-devices-are-coming-connect?src=related  Goodchild J. 2009 July 15. Network managers beware: more infected devices are coming to connect. NetworkWorld Asia . Retreived June 7 2010 from http:\/\/www.networksasia.net\/content\/network-managers-beware-more-infected-devices-are-coming-connect?src=related"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70025-8"},{"key":"e_1_3_2_1_16_1","unstructured":"Jacobsson S. 2010 June 7. iPhone security flaw: Using a PIN won't help you. NetworkWorld Asia. Retreived June 7 2010 from http:\/\/www.networksasia.net\/content\/iphone-security-flaw-using-pin-wont-help-you.  Jacobsson S. 2010 June 7. iPhone security flaw: Using a PIN won't help you. NetworkWorld Asia . Retreived June 7 2010 from http:\/\/www.networksasia.net\/content\/iphone-security-flaw-using-pin-wont-help-you."},{"key":"e_1_3_2_1_17_1","first-page":"800","article-title":"Guidelines on cellphone and PDA security","author":"Janson W.","year":"2008","journal-title":"Recommendations of the National Institute of Standards and Technology NIST Special Publication"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Messmer E.","year":"2010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Nemati H. 2008. Information Security and Ethics: Concepts Methodologies Tools and Applications. Information Science Reference Hershey PA.   Nemati H. 2008. Information Security and Ethics: Concepts Methodologies Tools and Applications. Information Science Reference Hershey PA.","DOI":"10.4018\/978-1-59904-937-3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734595"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70075-2"},{"key":"e_1_3_2_1_22_1","volume-title":"Malware Hidden in Windows Mobile Applications. Eweek. Retrieved","author":"Prince B.","year":"2010"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.2"},{"key":"e_1_3_2_1_24_1","unstructured":"Tabourin P. 2010. Security control and management: Mobile data in a multi-agency\/jurisdiction environment. Law Enforcement Technology 37(2) 72 74--76.  Tabourin P. 2010. Security control and management: Mobile data in a multi-agency\/jurisdiction environment. Law Enforcement Technology 37 (2) 72 74--76."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1402701.1402703"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.76"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Weippl E. R. and Riedl B. 2009. Security Trust and Privacy on Mobile Devices and Multimedia Applications. In I. K. Ibrahim (Ed.) Handbook of Research on Mobile Multimedia Second Edition Information Science Reference Hershey PA 115--131.  Weippl E. R. and Riedl B. 2009. Security Trust and Privacy on Mobile Devices and Multimedia Applications. In I. K. Ibrahim (Ed.) Handbook of Research on Mobile Multimedia Second Edition Information Science Reference Hershey PA 115--131.","DOI":"10.4018\/978-1-60566-046-2.ch009"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","location":"Kennesaw Georgia","acronym":"InfoSecCD '10","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"]},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940971","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:51Z","timestamp":1750249071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940971"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":27,"alternative-id":["10.1145\/1940941.1940971","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940971","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}