Have a personal or library account? Click to login
Mobile Technologies at Risk: A Literature Review on the Evolving Challenges and Solutions in Mobile Technology Security Cover

Mobile Technologies at Risk: A Literature Review on the Evolving Challenges and Solutions in Mobile Technology Security

Open Access
|Jun 2024

References

  1. Al-Khateeb, S., & Agarwal, N. (2016). The rise & fall of #NoBackDoor on Twitter: The apple vs. FBI case. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Available at: https://doi.org/10.1109/asonam.2016.7752334.
  2. Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, Vol. 13, Issue 9, 5700. Available at: https://doi.org/10.3390/app13095700.
  3. Arksey, H., & O’Malley, L. (2005). Scoping studies: towards a methodological framework. International Journal of Social Research Methodology, Vol. 8, Issue 1, 19-32.
  4. Asefa, A., et al. (2022). Does the perception of HIV risk among female sex workers affect HIV prevention behavior? Application of the Health Belief Model (H.B.M.). BMC Public Health, Vol. 22, 1-10. Available at: https://doi.org/10.1186/s12889-022-14046-3.
  5. Black, L., Scala, N.M., Goethals, P.L., & Howard, J. (2018). Values and trends in cybersecurity. In Proceedings of the Institute of Industrial and Systems Engineering Conference. 1820-1825. Orlando, FL: Institute of Industrial and Systems Engineers.
  6. Cao, N. (2022). Research on the influence of wearable equipment on sports under the background of information technology. 2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI). Available at: https://doi.org/10.1109/icceai55464.2022.00185.
  7. Cichonski, P.R., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide: Recommendations of the National Institute of Standards and Technology. Available at: https://doi.org/10.6028/nist.sp.800-61r2.
  8. Coombs, W.T. (2007). Protecting organization reputations during a crisis: The development and application of situational crisis communication theory. Corporate Reputation Review, Vol. 10, Issue 3, 163-176. Available at: https://doi.org/10.1057/palgrave.crr.1550049.
  9. Cybersecurity|NIST. (2023, October 10). NIST. Available at: https://www.nist.gov/cybersecurity.
  10. FBI’s Internet Crime Complaint Center. (2021). Internet crime report 2021. Federal Bureau of Investigation. Available at: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf.
  11. Hiremath, S.V., Yang, G., & Mankodiya, K. (2014). Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare. 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH), 304-307. Available at: https://doi.org/10.1109/mobihealth.2014.7015971.
  12. Hunt, R. (2013). Security testing in Android networks - A practical case study. 2013 19th IEEE International Conference on Networks (ICON). Available at: https://doi.org/10.1109/icon.2013.6781950.
  13. International Organization for Standardization. (n.d.). ISO - About us. ISO. Available at: https://www.iso.org/about-us.html, accessed on February 3, 2024.
  14. International Organization for Standardization. (2023, February). ISO/IEC 27035-1:2023. ISO. Available at: https://www.iso.org/standard/78973.html.
  15. Jones, C., Jensen, J.D., Scherr, C.L., Brown, N., Christy, K.R., & Weaver, J. (2014). The health belief model as an explanatory framework in communication research: Exploring parallel, serial, and moderated mediation. Health Communication, Vol. 30, Issue 6, 566-576. Available at: https://doi.org/10.1080/10410236.2013.873363.
  16. Kotwal, P.A., & Singh, A.R. (2012). Evolution and effects of mobile cloud computing, middleware services on cloud, future prospects: A peek into the mobile cloud operating systems. 2012 IEEE International Conference on Computational Intelligence and Computing Research. Available at: https://doi.org/10.1109/iccic.2012.6510270.
  17. Landmann, M. (2010). Managing smartphone security risk. In Proceedings of the 2010 Information Security Curriculum Development Conference, 145-155.
  18. Mobile Security Updates: Understanding the issues. (2021, August 5). Federal Trade Commission. Available at: https://www.ftc.gov/reports/mobile-security-updates-understanding-issues.
  19. Nicas, J., & Benner, K. (2020, January 7). FBI Asks Apple to Help Unlock Two iPhones. The New York Times. Available at: https://www.nytimes.com/2020/01/07/technology/apple-fbi-iphone-encryption.html, accessed on February 28, 2022.
  20. NIST. (2024, January 24). NIST. Available at: https://www.nist.gov/.
  21. Novac, O.C., et al. (2017a). Comparative study of Google Android, Apple iOS, and Microsoft Windows Phone mobile operating systems. 2017 14th International Conference on Engineering of Modern Electric Systems (EMES). Available at: https://doi.org/10.1109/emes.2017.7980403.
  22. Ohlhausen, M.K., & McSweeny, T. (2018). Mobile security updates: Understanding the issues. Federal Trade Commission, 1-134. Available at: http://www/ftc.gov.
  23. Oludayo, O.I., Kikelomo, A.A., Adedeji, A.A., & Ayodeji, A.A. (2023). A review of smartphone security challenges and prevention. International Research Journal of Innovations in Engineering and Technology, Vol. 7, Issue 5, 234235. Available at: https://doi.org/10.47001/irjiet/2023.705030.
  24. Owsley, B. (2017). Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it? Health and Technology, Vol. 7, Issue 4, 369-376. Available at: https://doi.org/10.1007/s12553-017-0192-4.
  25. Pigola, A., & Da Costa, P.R. (2023). Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats. Communications of the Association for Information Systems, Vol. 53, Issue 1, 1099-1135. Available at: https://doi.org/10.17705/1cais.05347.
  26. Rakhmatov, D. (2021). Mobile technologies in higher education. Mental Enlightenment Scientific-Methodological Journal, 2021, Vol. 2, 182-196. Available at: https://doi.org/10.51348/tziuj2021s21.
  27. Saldana, J.J. II. (2023). The effect of cybersecurity training on government employee’s knowledge of cybersecurity issues and practices (Order No. 30314775). ProQuest One Academic. (2844501501). Available at: https://www.proquest.com/dissertations-theses/effect-cybersecurity-training-on-government/docview/2844501501/se-2.
  28. Scortzaru, A. (2022). The moderating effect of personalization on the influence of consumer privacy concerns on mobile technology adoption (Order No. 29326882). ProQuest One Academic. (2716536834). Available at: https://www.proquest.com/dissertations-theses/moderating-effect-personalization-on-influence/docview/2716536834/se-2.
  29. Smith, J.D. (2022). Employees’ protection motivations to comply with bring your own device security policies: A quantitative study (Order No. 29059869). ProQuest One Academic. (2644338575). Available at: https://www.proquest.com/dissertations-theses/employees-protection-motivations-comply-with/docview/2644338575/se-2.
  30. Vyas, A. (2022, February 4). 12 rising trends in mobile application development. Maruti Techlabs. Available at: https://marutitech.com/7-trends-of-mobile-application-development/, accessed on March 1, 2022.
  31. Wang, C.-X., et al. (2023). On the road to 6G: Visions, requirements, key technologies, and testbeds. IEEE Communications Surveys and Tutorials, Vol. 25, Issue 2, 905-974. Available at: https://doi.org/10.1109/comst.2023.3249835.
  32. Weichbroth, P., & Łysik, Ł. (2020). Mobile security: threats and best practices. Mobile Information Systems, 2020, 1-15. Available at: https://doi.org/10.1155/2020/8828078.
  33. Yahya, T.B., Jamal, N.M., Sundarakani, B., & Omain, S.Z. (2023). The effects of data security and perceived benefits on mobile phone recycling behaviour and the recycling intention mediation role. Recycling, Vol. 8, Issue 1, 27. Available at: https://doi.org/10.3390/recycling8010027.
  34. Xiao, X., Wang, Y., & Li, S. (2014). Privacy requirements patterns for mobile operating systems. 2014 IEEE 4th International Workshop on Requirements Patterns (RePa), 39-42. Available at: https://doi.org/10.1109/repa.2014.6894842.
DOI: https://doi.org/10.2478/bsaft-2024-0016 | Journal eISSN: 3100-5098 | Journal ISSN: 3100-508X
Language: English
Page range: 151 - 162
Published on: Jun 7, 2024
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2024 Miranda Stanfield, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.