Journal articles on the topic 'Smartphone Protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Smartphone Protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Potocký, Sebastián, and Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity." Science & Military 17, no. 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.
Full textMuhamad Fadhlan Hasugian and Ratna Januarita. "Perlindungan Hukum Bagi Konsumen yang Dirugikan dalam Penjualan Smartphone Terkait Pemblokiran IMEI Ditinjau dari Undang-Undang No. 8 Tahun 1999 tentang Perlindungan Konsumen." Bandung Conference Series: Law Studies 5, no. 1 (2025): 209–14. https://doi.org/10.29313/bcsls.v5i1.15986.
Full textKameda-Smith, MM, C. Iorio-Morin, SU Ahmed, et al. "P.105 Smartphone and mobile app use among Canadian Neurosurgery residents and fellows." Canadian Journal of Neurological Sciences / Journal Canadien des Sciences Neurologiques 44, S2 (2017): S40. http://dx.doi.org/10.1017/cjn.2017.189.
Full textCitrawathi, Desak Made, I. A. I. Udiantari, and S. W. Warpala. "FITUR EYE PROTECTION PADA LAYAR SMARTPHONE DAPAT MENGURANGI KELELAHAN MATA DAN MEMPERPANJANG DURASI PENGGUNAANNYA PADA SISWA SMP NEGERI 1 SERIRIT." JST (Jurnal Sains dan Teknologi) 8, no. 1 (2019): 94–103. http://dx.doi.org/10.23887/jstundiksha.v8i1.19225.
Full textCitrawathi, Desak Made, I. A. I. Udiantari, and S. W. Warpala. "FITUR EYE PROTECTION PADA LAYAR SMARTPHONE DAPAT MENGURANGI KELELAHAN MATA DAN MEMPERPANJANG DURASI PENGGUNAANNYA PADA SISWA SMP NEGERI 1 SERIRIT." JST (Jurnal Sains dan Teknologi) 8, no. 1 (2019): 94. http://dx.doi.org/10.23887/jst-undiksha.v8i1.19225.
Full textNasution, Fitri Khairani, and Nurussakinah Daulay. "The Influence of Academic Resilience And Student Well-Being on Smartphone Addiction." Jurnal Basicedu 6, no. 3 (2022): 4415–22. http://dx.doi.org/10.31004/basicedu.v6i3.2864.
Full textKraushaar, Judith, and Sabine Bohnet-Joschko. "Smartphone Use and Security Challenges in Hospitals: A Survey among Resident Physicians in Germany." International Journal of Environmental Research and Public Health 19, no. 24 (2022): 16546. http://dx.doi.org/10.3390/ijerph192416546.
Full textMušinbegović, Almina, Harun Alijagic, Amer Hrnjic, and Ali Abd Almisreb. "Security considerations for smartphone devices." Defense and Security Studies 5, no. 2 (2024): 108–14. https://doi.org/10.37868/dss.v5.id274.
Full textPranoto, Hadi, and Eko Budi Setiawan. "Android Smartphone Remote Monitoring Application Using SMS Service." International Journal of New Media Technology 4, no. 2 (2017): 112–19. http://dx.doi.org/10.31937/ijnmt.v4i2.643.
Full textQabalin, Majdi K., Muawya Naser, and Mouhammd Alkasassbeh. "Android Spyware Detection Using Machine Learning: A Novel Dataset." Sensors 22, no. 15 (2022): 5765. http://dx.doi.org/10.3390/s22155765.
Full textBelkhamza, Zakariya, Mohd Adzwin Faris Niasin, and Sidah Idris. "The Effect of Privacy Concerns on the Purchasing Behavior among Malaysian Smartphone Users." International Journal of E-Services and Mobile Applications 8, no. 3 (2016): 38–52. http://dx.doi.org/10.4018/ijesma.2016070103.
Full textSang, Jun, Daxiang Hong, Bing Zhang, Hong Xiang, and Li Fu. "Protection profile for the smartphone operating system." International Journal of Embedded Systems 6, no. 1 (2014): 28. http://dx.doi.org/10.1504/ijes.2014.060923.
Full textFaisal, Mohammad, and Sa’ed Abed. "Cluster-Based Antiphishing (CAP) Model for Smart Phones." Scientific Programming 2021 (July 7, 2021): 1–9. http://dx.doi.org/10.1155/2021/9957323.
Full textToda, Masahiro, Satoko Ezoe, Kanae Mure, and Tatsuya Takeshita. "Smartphone Dependence of University Students and Parental Rearing Attitudes." International Journal of Cyber Behavior, Psychology and Learning 8, no. 1 (2018): 25–32. http://dx.doi.org/10.4018/ijcbpl.2018010102.
Full textJ Kumarasinghe, Pivithuru, Qiubo Huang, and Nilmini Rathnayake. "The Perspectives of University Academics on Their Intention to Purchase Green Smartphones in Sri Lanka." Interdisciplinary Journal of Information, Knowledge, and Management 18 (2023): 369–85. http://dx.doi.org/10.28945/5160.
Full textSmith, Katherine A., Leming Zhou, and Valerie J. M. Watzlaf. "User Authentication in Smartphones for Telehealth." International Journal of Telerehabilitation 9, no. 2 (2017): 3–12. http://dx.doi.org/10.5195/ijt.2017.6226.
Full textBen Ayed, Ahmed. "Permission Request Pattern Recognition in Android Malware Applications." International Journal of Strategic Information Technology and Applications 8, no. 1 (2017): 37–49. http://dx.doi.org/10.4018/ijsita.2017010103.
Full textDickson, Glen. "NBD Nanotechnologies Brings Antimicrobial Protection to Smartphone Screens." Information Display 37, no. 1 (2021): 6–8. http://dx.doi.org/10.1002/msid.1175.
Full textChurk, J. P. "Friendship and Courtship in The Era of Smartphone: Experience from Youths in Higher Learning Institutions in Dodoma Municipality Tanzania." AFRICAN JOURNAL OF APPLIED RESEARCH 8, no. 2 (2022): 356–70. http://dx.doi.org/10.26437/ajar.31.10.2022.25.
Full textNash, Carol. "A Scoping Review of Children, Empowerment, and Smartphone Technology Regarding Social Construction Theory with the Aim of Increasing Self-Direction in Democracies." Social Sciences 13, no. 4 (2024): 196. http://dx.doi.org/10.3390/socsci13040196.
Full textBelkhamza, Zakariya, and Mohd Adzwin Faris Niasin. "The Effect of Privacy Concerns on Smartphone App Purchase in Malaysia: Extending the Theory of Planned Behavior." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 5 (2017): 178. http://dx.doi.org/10.3991/ijim.v11i5.6961.
Full textAzni, A. H., Sakiinah Altaf Hussain, and Najwa Hayaati Mohd Alwi. "Digital Certificate-Based Authentication Model for Enhanced Smartphone Security." Journal of Computing Research and Innovation 10, no. 1 (2025): 64–76. https://doi.org/10.24191/jcrinn.v10i1.496.
Full textRudolphi, Josie, Shelly Campo, Brandi Janssen, Marizen Ramirez, Kai Wang, and Diane Rohlman. "A Test of Social Cognitive Theory to Increase Hearing Protection Use in Swine Buildings." Journal of Agricultural Safety and Health 28, no. 4 (2022): 215–28. http://dx.doi.org/10.13031/jash.15183.
Full textHughes Driscoll, Colleen A., Michael Cleveland, Samuel Gurmu, Sarah Crimmins, and Dina El-Metwally. "Research: Replacing Overhead Paging with Smartphones to Reduce Hospital Noise." Biomedical Instrumentation & Technology 54, no. 4 (2020): 251–57. http://dx.doi.org/10.2345/0899-8205-54.4.251.
Full textMichels, Marius, Vanessa Bonke, and Oliver Musshoff. "Understanding the adoption of smartphone apps in crop protection." Precision Agriculture 21, no. 6 (2020): 1209–26. http://dx.doi.org/10.1007/s11119-020-09715-5.
Full textHendra, Saputra, Zahra Amalia, Faldi Faldi, et al. "Recommendation mobile antivirus for Android smartphones based on malware detection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 3559–66. https://doi.org/10.11591/ijai.v13.i3.pp3559-3566.
Full textEl Majdoub, Asmae, Chaimae Saadi, and Habiba Chaoui. "Mobile Forensics Data Acquisition." ITM Web of Conferences 46 (2022): 02006. http://dx.doi.org/10.1051/itmconf/20224602006.
Full textRiad, Khaled, and Lishan Ke. "RoughDroid: Operative Scheme for Functional Android Malware Detection." Security and Communication Networks 2018 (September 20, 2018): 1–10. http://dx.doi.org/10.1155/2018/8087303.
Full textSawant, Tanuja, Dhrupal Shah, Smita Sontakke, and Prathmesh Gunjgur. "An ML and SMS remote access based model for Anti-theft protection of Android devices." ITM Web of Conferences 32 (2020): 03021. http://dx.doi.org/10.1051/itmconf/20203203021.
Full textSaputra, Hendra, Amalia Zahra, Faldi Faldi, et al. "Recommendation mobile antivirus for Android smartphones based on malware detection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 3559. http://dx.doi.org/10.11591/ijai.v13.i3.pp3559-3566.
Full textZhao, Wei Wei, Zhi Guo Wang, Wei Cao, and Hong Yan Liu. "An Anti-Lost Data Security Storage System for Smartphone Based on Cloud Service." Applied Mechanics and Materials 687-691 (November 2014): 2993–96. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2993.
Full textchun se hak and 황순학. "Electronic Financial Transaction and Consumer Protection in the Smartphone Environment." Journal of Product Research 32, no. 6 (2014): 93–99. http://dx.doi.org/10.36345/kacst.2014.32.6.011.
Full textJu, Xiaoen, and Kang G. Shin. "Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps." Journal of Information Privacy and Security 11, no. 2 (2015): 62–79. http://dx.doi.org/10.1080/15536548.2015.1045372.
Full textBuller, David B., Marianne Berwick, Kathy Lantz, et al. "Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice." JAMA Dermatology 151, no. 5 (2015): 497. http://dx.doi.org/10.1001/jamadermatol.2014.3889.
Full textMoran, Chelsea, and Ella Zetler. "A review of smartphone applications for promoting sun protection practices." Journal of the American Academy of Dermatology 81, no. 2 (2019): 613–15. http://dx.doi.org/10.1016/j.jaad.2018.11.027.
Full textKartadinata, Andriansyah. "Penegakan Hukum Terhadap Tindak Pidana Penjualan Smartphone Ilegal Dalam Perspektif Undang-Undang Nomor 8 Tahun 1999 Tentang Perlindungan Konsumen." Justicia Sains: Jurnal Ilmu Hukum 9, no. 2 (2024): 558–69. https://doi.org/10.24967/jcs.v9i2.3740.
Full textAuliya, Syafira, Lukito Edi Nugroho, and Noor Akhmad Setiawan. "A review on smartphone usage data for user identification and user profiling." Communications in Science and Technology 6, no. 1 (2021): 25–34. http://dx.doi.org/10.21924/cst.6.1.2021.363.
Full textMasciantonio, Marcello G., and Aneta A. Surmanski. "Medical smartphone applications." University of Western Ontario Medical Journal 86, no. 2 (2017): 51–53. http://dx.doi.org/10.5206/uwomj.v86i2.2030.
Full textVasudev, Arpitha. "AI-Powered Privacy Protection Techniques for Smartphones." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49462.
Full textShin, Suk-Jo, Seon-Joo Kim, and In-June Jo. "Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform." Journal of the Korea Contents Association 13, no. 12 (2013): 560–67. http://dx.doi.org/10.5392/jkca.2013.13.12.560.
Full text谭, 美思茵. "Research on the Legal Regulation and Privacy Protection of Smartphone Searches." Open Journal of Legal Science 12, no. 12 (2024): 7170–79. https://doi.org/10.12677/ojls.2024.12121018.
Full textHeinrich, Alexander, Leon Würsching, and Matthias Hollick. "Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 353–71. http://dx.doi.org/10.56553/popets-2024-0082.
Full textde Angel, Valeria, Serena Lewis, Sara Munir, Faith Matcham, Richard Dobson, and Matthew Hotopf. "Using digital health tools for the Remote Assessment of Treatment Prognosis in Depression (RAPID): a study protocol for a feasibility study." BMJ Open 12, no. 5 (2022): e059258. http://dx.doi.org/10.1136/bmjopen-2021-059258.
Full textZainelabdin, Fatima Abdelhadi. "The Negative Effects of Smart Phones on the Jordanian Children from the Perspective of Parents." Journal of Educational and Social Research 10, no. 5 (2020): 139. http://dx.doi.org/10.36941/jesr-2020-0095.
Full textSajikumar, Sariga, N. Ajithkumar, and Gopu Vijayan. "Exploring the Interplay of Privacy Concerns, Mobile Cybersecurity Awareness, and Protective Motivation Behavior." International Journal of Religion 5, no. 5 (2024): 612–19. http://dx.doi.org/10.61707/kqyq0505.
Full textAnindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono. "Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection." EMITTER International Journal of Engineering Technology 8, no. 1 (2020): 102–25. http://dx.doi.org/10.24003/emitter.v8i1.486.
Full textSeok Kim, Bong. "Development of autosensing for self-protection device based IOT." International Journal of Engineering & Technology 7, no. 2.12 (2018): 84. http://dx.doi.org/10.14419/ijet.v7i2.12.11041.
Full textZangana, Hewa M., and Marwan Omar. "Threats, Attacks, and Mitigations of Smartphone Security." Academic Journal of Nawroz University 9, no. 4 (2020): 324. http://dx.doi.org/10.25007/ajnu.v9n4a989.
Full textSkalkos, Andreas, Ioannis Stylios, Maria Karyda, and Spyros Kokolakis. "Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 743–66. http://dx.doi.org/10.3390/jcp1040036.
Full textKARAHİSAR, Tüba. "SMARTPHONE USAGE AND AWARENESS OF PERSONAL DATA PROTECTION: CASE OF COLLAGE STUDENTS." INTERNATIONAL PEER-REVIEWED JOURNAL OF COMMUNICATION AND HUMANITIES RESEARCHES, no. 9 (December 30, 2015): 1. http://dx.doi.org/10.17361/uhive.2015914931.
Full text