References
- A. Charlesworth, "The ascent of smartphone," Institution of Engineering and Technology, pp. 32-33, Feb, 2009.
- B. Bae, W, Kim, C. Ahn, S. l. Lee and K. I. Sohng, "Development of a T-DMB extended WIPI plat-form for interactive mobile broadcasting services," Consumer Electronics, IEEE Trans., pp. 1167-1172, Jnu. 2006.
- S. Ryan, C. J. Kolodgy and S. D. Drake, "World wide Mobile Security 2010-2014 Forecast and Analysis," IDC #222348, Volume:1, Mar. 2010.
- C. H. Lin, J. C. Liu, H. C. Huang and T. C. Yang, "A Defending Mechanism against DDoS Based on Registration and Authentication," 2008 The 9th Intemational Conference for Young Computer Scientists, pp. 2192-2197, Apr. 2008.
- R. C. Basole, "Visualization of interfirm relations in a converging mobile ecosystem," Journal of Information Technology, pp. 144-159, Jun. 2009.
- Y. Zhiyu, Z. Linwei and L. Wenna, "Study on security strategy of wireless Smart Office system," First International Workshop on Education Technology and Computer Science, pp. 495-498, Mar. 2009.
- D. Keely, "A security strategy for mobile e-business," Security and Services organization of IBM Global Services, JuI. 2001.
- D. Eschenbrucher, J. Mellberg, S. Niklander, M. Naslund, P. Palm and B. Sahlin, "Security architectures for mobile networks," Ericsson review No.2, pp. 68-81, Feb. 2004.
- E. Bones, P. Hasvold, and E. Henriksen "Risk analysis of information security in a mobile instant messaging and presence system for healthcare," International Journal of Medical Information, pp. 677-687, Jun. 2006.
- G. A. Jacoby, S. Mosley, "Mobile Security Using Separated Deep Packet Inspection," 5th IEEE Consumer Communications and Networking Conference, pp. 482-487, Jan. 2008.
- M. Decker, "A Security Model for Mobile Processes," Mobile Business, ICMB '08. 7th International Conference, pp. 211-220, Jul. 2008.
- Aagedal. J. O., D. Braber. F., Dimitrakos. T., Gran, B. A., Raptis. D., Stolen. K., "Model-based Risk Assessment to Improve Enterprise Security," 6th IEEE International Enterprise Distributed Object Computing Conference, pp. 51-62, Sep. 2002.
- M. Ekstedt, T. Sommestad, "Enterprise Architecture Models for Cyber Security Analysis," IEEE PES Power Systems Conference Exhibition, pp. 1-6, Oct. 2009.
- C. Cares, X. Franch, "Selecting Smart Office Devices using a Goal-Oriented Approach," Research Challenges in Information Science, pp. 143-154, Apr. 2009.
- M. C. WU, B. UNHELKAR , "Extending Enterprise Architecture with Mobility," Vehicular Technology Conference, IEEE, pp. 2829-2833, May. 2008.
- Standards Australia, "AS/NZS 4360: Risk Management," Standards Association of Australia, AS/NZS 4360, 1999.