2015
DOI: 10.17770/etr2015vol3.184
|View full text |Cite
|
Sign up to set email alerts
|

The Myths of and Solutions for Android OS Controlled and Secure Environment

Abstract: <p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…e participants' responses to both set of questionnaires were measured by questions on a five-point Likert scale rating, ranging from strongly agree (5), agree (4), neutral (3), disagree (2), and strongly disagree (1). e mean score of every question was calculated out of five.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…e participants' responses to both set of questionnaires were measured by questions on a five-point Likert scale rating, ranging from strongly agree (5), agree (4), neutral (3), disagree (2), and strongly disagree (1). e mean score of every question was calculated out of five.…”
Section: Discussionmentioning
confidence: 99%
“…Android is today's most popular mobile operating system for smartphones, tablets, and other electronic devices including smart TVs. is popularity and endless use of the Android operating system creates many risks which are not fully recognized [1]. As technology continues to evolve, so also do the opportunities and challenges provide [2].…”
Section: Introductionmentioning
confidence: 99%
“…Where a mobile device has been lost, unauthorized access to encrypted documents is not possible, assuming that the wristband has also not been lost. Our solution does not exclude the usage of other security measures, see, for example (WEB, d); Gorbans, Kulesovs, Straujums, Buls (2015).…”
Section: Programmable Bluetoothmentioning
confidence: 99%
“…Android is today's most popular mobile operating system for both smartphones and tablets, this popularity creates many risks which are not fully recognized [1]. As technology continues to evolve, so also do the opportunities and challenges it provides [2].…”
Section: Introductionmentioning
confidence: 99%