Yazid et al., 2012
| Publication | Publication Date | Title |
|---|---|---|
| Pell et al. | Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy | |
| Muslukhov et al. | Understanding users' requirements for data protection in smartphones | |
| Kim | Online social media networking and assessing its security risks | |
| Smith et al. | Electronic Monitoring in the Workplace | |
| Cottrill | Location privacy: Who protects? | |
| Cha et al. | A data-driven security risk assessment scheme for personal data protection | |
| Sarre | Metadata retention as a means of combatting terrorism and organised crime: A perspective from Australia | |
| Gaire et al. | Crowdsensing and privacy in smart city applications | |
| Toapanta et al. | Impact on administrative processes by cyberattacks in a public organization of Ecuador | |
| Kala | Critical role of cyber security in global economy | |
| Lee Jr et al. | A broader view of perceived risk during internet transactions | |
| Witman et al. | The 2020 Twitter Hack--So Many Lessons to Be Learned. | |
| Bispham et al. | An exploratory study of cybersecurity in working from home: problem or enabler? | |
| Zevenbergen et al. | Ethical privacy guidelines for mobile connectivity measurements | |
| Yazid et al. | Enhancement of asset value classification for mobile devices | |
| Atawneh et al. | A Security Framework for Addressing Privacy Issues in the Zoom Conference System. | |
| Harshanath | Privacy & Security in Mobile Devices, Social Network Services and Social Reform | |
| PH12014501888B1 (en) | Systems and methods for encrypted mobile voice communications | |
| Koohang et al. | SECURITY POLICIES AND DATA PROTECTION OF MOBILE DEVICES IN THE WORKPLACE. | |
| Jung et al. | South Korean Cyber Security Threats, Governance Measures, and Implications for SMEs | |
| Vishnevskaya et al. | Analysis of methods of illegal personal data distribution of messengers, social networks and search engines users | |
| Harshanath | Detection and protection related to data sharing technologies | |
| Cooper | An analysis of New Zealand Intelligence and Security Agency powers to intercept private communications: Necessary and proportionate? | |
| Zulkefli et al. | The “bring your own device”(BYOD) security metrics taxonomy | |
| Harshanath | Privacy and security data-sharing technologies for tampering protection and detection |