REFERENCES
- Android. (2014). Platform versions. Retrieved from http://developer.android.com/about/dashboards/index.html
- Apple. (2014). Developer support center. Retrieved from https://developer.apple.com/support/appstore/
- Arxan. (2012). State of security in the app economy: “Mobile apps under attack”. Retrieved from http://www.arxan.com/assets/1/7/state-of-security-app-economy.pdf
- Bradbury, D. (2011). Hacking Wi-Fi the easy way. Network Security, 2011(2), 9 –12.
- Cisco. (2014). Cisco 2014 annual security report. Retrieved from https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf
- Comscore. (2012). iPhones have significantly higher rates of Wi-Fi utilization than Android phones in the U.S. and U.K. Retrieved from http://www.comscore.com/Insights/Press_Releases/2012/4/iPhones_Have_Significantly_Higher_Rates_of_Wi--Fi_Utilization
- Coninsync. (2013). Why you should avoid saving passwords on your smartphone? Retrieved from http://ww4.coninsync.com/
- CSI. (2011). 2010/2011 Computer Crime and Security Survey. InformationWeek. Retrieved from http://reports.informationweek.com/abstract/21/7377/Security/research-2010-2011-csi-survey.html
- Federal Bureau of Investigation (FBI). (2013). Smartphone users should be aware of malware targeting mobile devices and the safety measures to help avoid compromise. Retrieved from http://www.fbi.gov/sandiego/press-releases/2012/smartphone-users-should-be-aware-of-malware-targeting-mobile–devices-and-the-safety-measures-to-help-avoid-compromise
- Gartner. (2014). Gartner says mobile app stores will see annual downloads reach 102 billion in 2013. Retrieved from http://www.gartner.com/newsroom/id/2592315
- Gold, S. (2011). Cracking wireless networks. Network Security, 2011(11), 14 –18.
- Greenberg, A. (2012). Google gets serious about android security, now auto-scans app market for malware. Forbes. Retrieved from http://www.forbes.com/sites/andygreenberg/2012/02/02/google-gets-serious-about-android-security-now-auto-scans-app-market-for-malware/
- Greenberg, A. (2013). Evasi0n is the most popular jailbreak ever: Nearly seven million iOS devices hacked in four days. Forbes. Retrieved from http://www.forbes.com/sites/andygreenberg/2013/02/08/evasi0n-is-the-most-popular-jailbreak-ever-nearly-seven-million-ios-devices-hacked-in-four–days/
- Harris, M., & Patten, K. (2014). Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management & Computer Security, 22(1), 97 –114.
- He, W. (2013). A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, 21(5), 381 –400.
- IBM (2013). IBM x-force: Ahead of the threat—overview. Retrieved from http://www-03.ibm.com/security/xforce/
- Imgraben, J., Engelbrecht, A., & Choo, K. K. R. (2014). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour & Information Technology, 33(12), 1347 –1360.
- InfoSec (2013). InfoSec: Protecting mobile devices. Retrieved from http://www.infosec.gov.hk/textonly/english/yourself/handheld.html
- Kingsley-Hughes, A. (2013a). Does jailbreaking or rooting devices, and BYOD mix? Retrieved from ZDNet at: http://www.zdnet.com/does-jailbreaking-or-rooting-devices-and-byod-mix7000011069/
- Kingsley-Hughes, A. (2013b). Should I jailbreak my iPhone? And other jailbreaking questions answered. Retrieved from http://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-other-jailbreaking-questions-answered/
- La Polla, M., Martinelli, F., & Sgandurra, D. (2013). A survey on security for mobile devices. Communications Surveys & Tutorials, IEEE, 15(1), 446 –471.
- Lessin, J. E., & Ante, S. E. (2013, March 4). Apps rocket toward $25 billion in sales. Wall Street Journal. Retrieved from http://online.wsj.com/news/articles/SB10001424127887323293704578334401534217878
- Lookout (2011). Lookout mobile threat report 2011. Retrieved from https://www.lookout.com/resources/reports/mobile-threat-report
- Lookout (2012). State of mobile security 2012. from https://www.lookout.com/resources/reports/state-of-mobile-security-2012
- Lookout (2013). 2013 mobile threat predictions. Retrieved from https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/
- Mansfield-Devine, S. (2012a). Android architecture: Attacking the weak points. Network Security, 2012(10), 5 –12.
- Mansfield-Devine, S. (2012b). Paranoid Android: Just how insecure is the most popular mobile platform? Network Security, 2012(9), 5 –10.
- Mansfield-Devine, S. (2013). Security review: The past year. Computer Fraud & Security, 2013(1), 5 –11.
- McAfee (2012). 10 quick tips to mobile security. Retrieved from http://images.mcafee.com/en-us/advicecenter/pdf/MobileeGuide_Jan2012.pdf
- Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47 –66.
- SANS (2012). SANS mobility/BYOD security survey. Retrieved from https://www.sans.org/reading_room/analysts_program/mobility-sec-survey.pdf
- Shih, D., Lin, B., Chiang, H. & Shih, M. (2008). Security aspects of mobile phone virus: A critical survey. Industrial Management & Data Systems, 108, 478 –494.
- Shinder, D. (2010). Pros and cons of jailbreaking or rooting your smartphone. TechRepublic. Retrieved from http://www.techrepublic.com/blog/smartphones/pros-and-cons-of-jailbreaking-or-rooting-your-smartphone/1460
- Slusky, L., & Partow-Navid, P. (2012). Students information security practices and awareness. Journal of Information Privacy & Security, 8(4), 3 –26.
- Statcounter (2014). Top 8 mobile operating systems in the United States from Jan 2013 to Jan 2014. StatCounter Global Stats. Retrieved from http://gs.statcounter.com/#mobile_os-ww-monthly-201301-201401
- Strohmeyer, R. (2011). Why I get apps from Amazon, not Google. PC World. Retrieved from http://www.pcworld.com/article/239270/why_i_get_apps_from_amazon_not_google.html
- Tan, M., & Aguilar, K.S. (2012). An investigation of students’ perception of Bluetooth security. Information Management & Computer Security, 20(5), 364 –381.
- Tenable Network Security (2012). Mobile device vulnerability management flagged as top concern for security professionals in 2012. Retrieved from http://www.tenable.com/press-releases/mobile-device-vulnerability-management-flagged-as-top-concern-for-security