Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Justification Of Investment In It Systems, Aidan Farrell
Justification Of Investment In It Systems, Aidan Farrell
The ITB Journal
For a company, capital investment of any sort is weighed up before a decision is made to invest. It is. true that the vast majority of investments for companies can be quantified financially. Investment in Iriformation Technology (IT) and Information Systems (IS) however has proved more complex than other investments as there are ·a large amount of intangible and non-financial benefits associated with this area of expenditure. Investments are traditionally rationalised by outweighing the costs and the benefits. The indirect costs associated with the deployment of IT/IS are equally difficult to put a measure on and hence the traditional methods …
Right Now Is The Wrong Time: And Other Considerations When Presenting Security Warnings, Brock Johanson, Bonnie Anderson
Right Now Is The Wrong Time: And Other Considerations When Presenting Security Warnings, Brock Johanson, Bonnie Anderson
Journal of Undergraduate Research
Neuro Information Security (NeuroIS) focuses on the use of neurological measurements to improve the security of information systems. The BYU NeuroIS lab uses neurological tools and measurements to examine factors that affect security outcomes. Previous work has focused on various factors such as dual task interference (DTI), threat assessment, as well as factors such as habituation and generalization, which have become focus streams of research. The primary point of failure in most security related incidents tends to be users themselves. As such, anything that can be used to overcome neurobiological phenomenon such as those listed above can ultimately lead in …
Mobile Hands: What Your Phone Use Says About You, Parker Williams, Jeff Jenkins
Mobile Hands: What Your Phone Use Says About You, Parker Williams, Jeff Jenkins
Journal of Undergraduate Research
The percentage of individuals using mobile phones to respond to online applications, forms, and surveys is predicted to rapidly increase in the future. As of June 2, 2015, there were an estimated 2.6 billion smartphones in use in the world; by 2020 there will be 6.1 billion smartphones in use. Smartphones will account for roughly 80% of all mobile driven data traffic by 2020 (Lunden, 2015). With the proliferation of smartphones, measuring the fidelity of information gathered from and about the user becomes extremely important. Smartphones are a rich source of behavioral and biometric information, gathering data about how the …
Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m
Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m
Turkish Journal of Electrical Engineering and Computer Sciences
The Android operating system has increased in popularity and has been increasing its shares in the smart phone market. Users can carry out their daily work such as paying bills, being social, and sharing photos through mobile applications. These applications have access to sensitive information about the user, such as location, contacts, call logs, and SMS messages. However, the users have no knowledge of the applications or the personal information these applications have access to. Even if an application is not malware or does not have malicious behavior, it can compromise the security and privacy of the user by accessing …