[go: up one dir, main page]

Palanisamy et al., 2023 - Google Patents

Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China

Palanisamy et al., 2023

Document ID
480409921154662662
Author
Palanisamy R
Shi Y
Publication year
Publication venue
Information & Computer Security

External Links

Snippet

Purpose The purpose of this paper is to rank the users' attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on MCC security as a whole. Design/methodology/approach Hypotheses were …
Continue reading at www.emerald.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30598Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination

Similar Documents

Publication Publication Date Title
US12381876B2 (en) Anomaly-based mitigation of access request risk
US11888870B2 (en) Multitenant sharing anomaly cyberattack campaign detection
US11783062B2 (en) Risk-based access to computing environment secrets
US20230308460A1 (en) Behavior detection and verification
Weichbroth et al. Mobile security: Threats and best practices
US11310257B2 (en) Anomaly scoring using collaborative filtering
US8776180B2 (en) Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US20240054227A1 (en) Identification of a resource attack path by connecting code, configuration, and telemetry
US20220247776A1 (en) Analyzing and addressing security threats in network resources
US11973796B2 (en) Dangling domain detection and access mitigation
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
US10938849B2 (en) Auditing databases for security vulnerabilities
Haimes et al. Assessing systemic risk to cloud‐computing technology as complex interconnected systems of systems
Park et al. An empirical study on the influential factors affecting continuous usage of mobile cloud service
Palanisamy et al. Users’ attitude on perceived security of enterprise systems mobility: an empirical study
Palanisamy et al. Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China
Bertino et al. Web services threats, vulnerabilities, and countermeasures
Aldea et al. Software vulnerabilities integrated management system
Rahman et al. Towards a taxonomy of challenges in security control implementation
Di et al. Influencing user’s behavior concerning android privacy policy: an overview
Pönkänen Zero trust guidelines for enterprises
Onwuzurike Measuring and Mitigating Security and Privacy Issues on Android Applications
Zhang et al. SELinux-based operating system security research
Fay A deep dive into Avivore
Elsayed Advancing Security Services for Cloud Applications