A study on the influence of information security in selecting smart-phone |
Ahn, Jong-Chang
(Hanyang University)
Lee, Seung-Won (Hanyang University) Lee, Ook (Hanyang University) Cho, Sung-Phil (Hanyang University) |
1 | Woongyeol Cheon, Jiyeon Kim, Youngsook Lee, Dongho Won, "Samrtphone security threats and responding technology analysis," Journal of The Korea Society of Computer and Information, 16(2), pp. 153-163, Feb. 2011. |
2 | Heyonook Kim, "Smartphone technology development and security technology trends," Telecommunications Review, 21(2), pp. 219-241, Mar. 2011. |
3 | Hyeonah Park, Jaetag Choi, Jongin Lim, Donghun Lee, "Analytical study on the individual information threats in mobile environments," Review of KIISC, 17(4), pp. 56-73, Aug. 2007. |
4 | Seunghyeon Seo, Kilsoo Cheon, "Samrtphone security threats and responding technology," TTA Journal, 132, pp. 44-48, Nov./Dec. 2010. |
5 | Dongho Kang, Jinhee Han, Youn- keyong Lee, Yourngsub Cho, Seong-wan Han, Jeongyeo Kim, Heonsook Cho, "Samrtphone security threats and corresponding technology," Electronics and Telecommunications Trends, 25(23), pp. 72-80, Jun. 2010. |
6 | Kiyoung Kim, Dongho Kang, "Smartphone security technology in open mobile environments," Review of KIISC, 19(5), pp. 21-28, Oct. 2009. |
7 | Dong-Her Shih, Binshan Lin, Hsiu-Sen Chiang, and Ming-Hung Shih, "Security aspects of mobile phone virus: a critical survey," Industrial Management & Data Systems, vol. 108, no. 4. pp. 478-494, 2008. |
8 | Gilbert A. Churchill, and Jr.,J. Paul Peter, "Research design effects on the reliability of rating scales: a meta analysis," Journal of Marketing Research, vol. 11, pp. 360-375, Nov. 1984. |
9 | A. H. Van de Van, and D. L. Ferry, Measuring and assessing organization, Wiley Inter science, New York, 1980. |
10 | Mincheol Shin, The basic managerial and economic statistics, Changmin publisher, Seoul, Mar. 2010. |