Security vulnerabilities in Bluetooth technology as used in IoT

AM Lonzetta, P Cope, J Campbell, BJ Mohd… - Journal of Sensor and …, 2018 - mdpi.com
Bluetooth technology is a key component of wireless communications. It provides a low-
energy and low-cost solution for short-range radio transmissions. Bluetooth, more …

Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination

Z Tu, O Turel, Y Yuan, N Archer - Information & Management, 2015 - Elsevier
The loss and theft of mobile devices is a growing risk that has yet to be addressed in detail
by the IS community. This study extends the literature significantly by examining the roles of …

Why users hack: Conflicting interests and the political economy of software

B Brown, M Vigren, A Rostami, M Glöss - Proceedings of the ACM on …, 2022 - dl.acm.org
It is often assumed that the interests of users and developers coincide, sharing a common
goal of good design. Yet users often desire functionality that goes beyond what designers …

Understanding user's behaviors in coping with security threat of mobile devices Loss and theft

Z Tu, Y Yuan - 2012 45th Hawaii International Conference on …, 2012 - ieeexplore.ieee.org
As mobile devices widely used for personal and business purpose, mobile devices loss and
theft have become one big security threat. In this paper, we analyze the potential risks of …

Mobile and connected device security considerations: A dilemma for small and medium enterprise business mobility?

M Harris, K Patten, E Regan, J Fjermestad - 2012 - aisel.aisnet.org
Business mobility is rapidly becoming an everyday way of doing business. Mobile
technologies, such as smartphones and connected devices, are enabling this business …

Security considerations for IoT in smart buildings

S Krishnan, MS Anjana, SN Rao - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
This paper provides an approach to incorporate security when deploying Internet of Things
(IoT) for Smart Buildings. In the area of wireless networks, there has occurred a dramatic …

An investigation of Bluetooth security threats

M Tan, KA Masagca - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections
with up to seven other Bluetooth-enabled devices, has been widely adopted especially by …

An investigation of students' perception of Bluetooth security

M Tan, K Sagala Aguilar - Information Management & Computer …, 2012 - emerald.com
Purpose–Various research investigations have found that students' awareness of
information security issues continues to be poor and this is indeed a concern especially …

Smart devices for smart cities in India exploring security vulnerabilities of e-waste management

B Debnath, S Das, A Das, A Das - 2019 - papers.ssrn.com
Smart city is an emerging concept in India where Government of India have started initiatives
towards building smart cities through new projects. Given the technological advancement in …

Establishing user trust in automated teller machine integrity

R Petrlic, C Sorge - IET Information Security, 2014 - Wiley Online Library
The authors show that integrity protection as a technical means towards automated teller
machine (ATM) security is not enough to establish trust towards ATM users. The attacks …