{"id":"https://openalex.org/W1980690611","doi":"https://doi.org/10.1109/issa.2013.6641036","title":"Security steps for smartphone users","display_name":"Security steps for smartphone users","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W1980690611","doi":"https://doi.org/10.1109/issa.2013.6641036","mag":"1980690611"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2013.6641036","pdf_url":null,"source":{"id":"https://openalex.org/S4306418902","display_name":"Information Security for South Africa","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://mo.co.za/open/smartsteps.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051707011","display_name":"Heloise Pieterse","orcid":"https://orcid.org/0000-0002-2908-4012"},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"government","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Heloise Pieterse","raw_affiliation_strings":["Defence, Peace, Safety & Security, Council for Sci. & Ind. Res., Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Defence, Peace, Safety & Security, Council for Sci. & Ind. Res., Pretoria, South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050926773","display_name":"Martin S. Olivier","orcid":"https://orcid.org/0000-0002-5030-6134"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Martin S Olivier","raw_affiliation_strings":["Department of Computer Science, University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.56852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6309781},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.61544025},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.44745982},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.42693165}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.85494274},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.75270236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6923814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821821},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6309781},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.61544025},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.59980357},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.44745982},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.43731514},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.42693165},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34795004},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23179117},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1852006},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.16657051},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.14027476},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2013.6641036","pdf_url":null,"source":{"id":"https://openalex.org/S4306418902","display_name":"Information Security for South Africa","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.701.9972","pdf_url":"http://mo.co.za/open/smartsteps.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.701.9972","pdf_url":"http://mo.co.za/open/smartsteps.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":4,"referenced_works":["https://openalex.org/W1975808903","https://openalex.org/W2057101384","https://openalex.org/W2103396020","https://openalex.org/W2142145056"],"related_works":["https://openalex.org/W4245250093","https://openalex.org/W4244354662","https://openalex.org/W4200054778","https://openalex.org/W3114159050","https://openalex.org/W2965539362","https://openalex.org/W2777464647","https://openalex.org/W2717179875","https://openalex.org/W2538622067","https://openalex.org/W2484248966","https://openalex.org/W2181494682"],"abstract_inverted_index":{"Smart":[0],"phones":[1,18,40,49],"are":[2,86,90,168],"an":[3,146,201],"important":[4],"asset":[5],"for":[6],"people":[7],"living":[8],"in":[9,32,57,197],"the":[10,36,45,62,77,80,83,87,102,108,130,163,194,198,207,211],"21st":[11],"century.With":[12],"functionality":[13],"similar":[14],"to":[15,41,123,176,191,209],"computers,":[16],"smart":[17,39,48,96,118],"have":[19],"become":[20],"all-in-one":[21],"portable":[22],"devices":[23],"providing":[24],"interconnectivity":[25],"and":[26,76,114,143],"device-to-device":[27],"communication.":[28],"Such":[29],"continuous":[30],"improvement":[31],"capabilities":[33],"will":[34],"cause":[35],"popularity":[37,46],"of":[38,47,61,74,79,82,105,110,132,172,187,200],"constantly":[42],"rise.":[43],"Besides":[44],"there":[50],"has":[51],"also":[52,156],"been":[53],"a":[54,137],"sharp":[55],"increase":[56],"mobile":[58,63,106,111,125,134,159,181],"malware.":[59],"Most":[60],"malware":[64,92,126,182],"recently":[65],"discovered":[66],"target":[67],"Google's":[68],"Android":[69,95,139,147,153],"operating":[70,84],"system.":[71],"The":[72,184],"ease":[73],"modifying":[75],"simplicity":[78],"design":[81],"system":[85],"aspects":[88],"that":[89,170],"drawing":[91],"developers":[93],"towards":[94],"phones.":[97],"This":[98],"study":[99],"focus":[100],"on":[101,145,206],"current":[103,133],"state":[104],"malware,":[107],"adequacy":[109,131],"security":[112,116,135,160,166],"applications":[113,136],"possible":[115,180],"steps":[117,167,196],"phone":[119],"users":[120,171],"can":[121,174],"take":[122],"prevent":[124,177],"attacks.":[127],"To":[128],"evaluate":[129],"malicious":[138],"application":[140,154,202],"is":[141,155,190],"developed":[142],"deployed":[144],"smartphone.":[148],"In":[149],"addition,":[150],"this":[151,188],"new":[152],"evaluated":[157],"against":[158],"applications.":[161],"From":[162],"results":[164],"additional":[165],"identified":[169,195],"smartphones":[173],"follow":[175],"or":[178],"detect":[179],"infections.":[183],"ultimate":[185],"goal":[186],"research":[189],"eventually":[192],"automate":[193],"form":[199],"rather":[203],"than":[204],"depending":[205],"user":[208],"execute":[210],"steps.":[212]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1980690611","counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2024-12-17T18:08:16.581300","created_date":"2016-06-24"}