{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:41Z","timestamp":1750306481701,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:00:00Z","timestamp":1443398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,28]]},"DOI":"10.1145\/2815782.2815802","type":"proceedings-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T14:32:43Z","timestamp":1450449163000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Smartphone User Competency Evolution Model"],"prefix":"10.1145","author":[{"given":"Candice","family":"Louw","sequence":"first","affiliation":[{"name":"Academy of Computer Science and Software Engineering, University of Johannesburg, South Africa"}]},{"given":"Sebastiaan","family":"von Solms","sequence":"additional","affiliation":[{"name":"Academy of Computer Science and Software Engineering, University of Johannesburg, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2015,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Top 8 Mobile Operating Systems from 2010 to","author":"StatCounter GlobalStats","year":"2015","unstructured":"StatCounter GlobalStats . Top 8 Mobile Operating Systems from 2010 to 2015 . Retrieved June 1, 2015 from http:\/\/gs.statcounter.com\/#mobile_os-ww-yearly-2010-2015. StatCounter GlobalStats. Top 8 Mobile Operating Systems from 2010 to 2015. Retrieved June 1, 2015 from http:\/\/gs.statcounter.com\/#mobile_os-ww-yearly-2010-2015."},{"key":"e_1_3_2_1_2_1","volume-title":"Top 8 Mobile Operating Systems in South Africa from 2010 to","author":"StatCounter GlobalStats","year":"2015","unstructured":"StatCounter GlobalStats . Top 8 Mobile Operating Systems in South Africa from 2010 to 2015 . Retrieved June 1, 2015 from http:\/\/gs.statcounter.com\/#mobile_os-ZA-yearly-2010-2015. StatCounter GlobalStats. Top 8 Mobile Operating Systems in South Africa from 2010 to 2015. Retrieved June 1, 2015 from http:\/\/gs.statcounter.com\/#mobile_os-ZA-yearly-2010-2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"key":"e_1_3_2_1_4_1","volume-title":"Google play. Retrieved June1","author":"Google","year":"2015","unstructured":"Google . 2015. Google play. Retrieved June1 , 2015 from https:\/\/play.google.com\/store?hl=en. Google. 2015. Google play. Retrieved June1, 2015 from https:\/\/play.google.com\/store?hl=en."},{"key":"e_1_3_2_1_5_1","volume-title":"iTunes. Retrieved","author":"Apple","year":"2015","unstructured":"Apple . 2015. iTunes. Retrieved June 1, 2015 from https:\/\/www.apple.com\/itunes\/charts\/free-apps\/. Apple. 2015. iTunes. Retrieved June 1, 2015 from https:\/\/www.apple.com\/itunes\/charts\/free-apps\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Microsoft. 2015. Windows Phone. Retrieved June 1 2015 from http:\/\/www.windowsphone.com\/en-za\/store.  Microsoft. 2015. Windows Phone. Retrieved June 1 2015 from http:\/\/www.windowsphone.com\/en-za\/store."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1106-70"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133640"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516689"},{"key":"e_1_3_2_1_12_1","volume-title":"The Internet Society","author":"Zhou Y.","year":"2012","unstructured":"Zhou , Y. , Wang , Z. , Zhou , W. , and Jiang , X . 2012. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS , The Internet Society , 2012 . Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. 2012. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS, The Internet Society, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"Abusing Notification Services on Smartphones for Phishing and Spamming. In USENIX Workshop on Offensive Technologies (WOOT)","author":"Xu Z.","year":"2012","unstructured":"Xu , Z. and Zhu , S . 2012 . Abusing Notification Services on Smartphones for Phishing and Spamming. In USENIX Workshop on Offensive Technologies (WOOT) , 2012 . Xu, Z. and Zhu, S. 2012. Abusing Notification Services on Smartphones for Phishing and Spamming. In USENIX Workshop on Offensive Technologies (WOOT), 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516728"},{"volume-title":"Proceedings of the 13th international conference on Information security (ISC'10)","author":"Davi L.","key":"e_1_3_2_1_15_1","unstructured":"Davi , L. , Dmitrienko , A. , Sadeghi , A. , and Winandy , M . 2011. Privilege Escalation Attacks on Android . In Proceedings of the 13th international conference on Information security (ISC'10) , Springer-Verlag, Berlin, Heidelberg, 346--360. Davi, L., Dmitrienko, A., Sadeghi, A., and Winandy, M. 2011. Privilege Escalation Attacks on Android. In Proceedings of the 13th international conference on Information security (ISC'10), Springer-Verlag, Berlin, Heidelberg, 346--360."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"e_1_3_2_1_17_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Felt A. P.","year":"2012","unstructured":"Felt , A. P. , Ha , E. Egelman , S. , Haney , A. , Chin , E. , and Wagner , D . 2012 . In Symposium on Usable Privacy and Security (SOUPS) 2012 , July 11 --13, Washington, DC. USA. Felt, A. P., Ha, E. Egelman, S., Haney, A., Chin, E., and Wagner, D. 2012. In Symposium on Usable Privacy and Security (SOUPS) 2012, July 11--13, Washington, DC. USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755732"},{"key":"e_1_3_2_1_19_1","volume-title":"Remove virus from Android phone (Pop-up Ads and Adware). Retrieved","author":"MalwareTips","year":"2015","unstructured":"MalwareTips . Remove virus from Android phone (Pop-up Ads and Adware). Retrieved June 4, 2015 from http:\/\/malwaretips.com\/blogs\/remove-android-virus\/. MalwareTips. Remove virus from Android phone (Pop-up Ads and Adware). Retrieved June 4, 2015 from http:\/\/malwaretips.com\/blogs\/remove-android-virus\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Getting Started with the Amazon Appstore for Android. Retrieved","author":"Amazon","year":"2015","unstructured":"Amazon .com. Getting Started with the Amazon Appstore for Android. Retrieved June 4, 2015 from https:\/\/www.amazon.com\/gp\/feature.html?ie=UTF8&docId=1000626391. Amazon.com. Getting Started with the Amazon Appstore for Android. Retrieved June 4, 2015 from https:\/\/www.amazon.com\/gp\/feature.html?ie=UTF8&docId=1000626391."},{"key":"e_1_3_2_1_21_1","volume-title":"10 Alternative Android App Stores. Retrieved","author":"Chang R.","year":"2015","unstructured":"Chang , R. 2014. 10 Alternative Android App Stores. Retrieved June 4, 2015 from http:\/\/code.tutsplus.com\/articles\/10-alternative-android-app-stores--cms-20999. Chang, R. 2014. 10 Alternative Android App Stores. Retrieved June 4, 2015 from http:\/\/code.tutsplus.com\/articles\/10-alternative-android-app-stores--cms-20999."},{"key":"e_1_3_2_1_22_1","volume-title":"How to root your Android phone or tablet in 2015(and unroot it). Retrieved","author":"Donovan J.","year":"2015","unstructured":"Donovan , J. 2015. How to root your Android phone or tablet in 2015(and unroot it). Retrieved June 8, 2015 from http:\/\/www.digitaltrends.com\/mobile\/how-to-root-android\/. Donovan, J. 2015. How to root your Android phone or tablet in 2015(and unroot it). Retrieved June 8, 2015 from http:\/\/www.digitaltrends.com\/mobile\/how-to-root-android\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the South African Information Security Multi-Conference (SAISMC","author":"Allam S.","year":"2010","unstructured":"Allam , S. and Flowerday , S . 2010. A Model to Measure the Maturity of Smartphone Security at Software Consultancies . In Proceedings of the South African Information Security Multi-Conference (SAISMC 2010 ). Allam, S. and Flowerday, S. 2010. A Model to Measure the Maturity of Smartphone Security at Software Consultancies. In Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)."}],"event":{"name":"SAICSIT '15: The 2015 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists","acronym":"SAICSIT '15","location":"Stellenbosch South Africa"},"container-title":["Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815782.2815802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815782.2815802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,28]]},"references-count":23,"alternative-id":["10.1145\/2815782.2815802","10.1145\/2815782"],"URL":"https:\/\/doi.org\/10.1145\/2815782.2815802","relation":{},"subject":[],"published":{"date-parts":[[2015,9,28]]},"assertion":[{"value":"2015-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}