參考文獻 |
[1] iThome. 讓員工自帶設備上班?──BYOD的兩難. Retrieved from http://www.ithome.com.tw/article/89297 (Accessed: 20-Jun-2016)
[2] EY. (September 2013). Bring your own device. Retrieved from http://www.ey.com/publication/vwluassets/ey-bring_your_own_device/$file/ey-bring-your-own-device.pdf (Accessed: 20-Jun-2016)
[3] Lookout. (2015). Risky v. Malicious apps: How they’re different & why you need to care about both. Retrieved from https://blog.lookout.com/blog/2015/10/13/risky-malicious-apps/ (Accessed: 20-Jun-2016)
[4] Appthority. (Summer 2014). App Reputation Report.
[5] AppBrain. Number of Android applications. Retrieved from http://www.appbrain.com/stats/number-of-android-apps (Accessed: 20-Jun-2016)
[6] Airwatch-MDM. Retrieved from http://www.air-watch.com/zh- (Accessed: 20-Jun-2016)hant/solutions/mobile-device-management
[7] MobileIron-MAM. Retrieved from https://www.mobileiron.com/en/solutions/mobile-application-management-mam (Accessed: 20-Jun-2016)
[8] Oxford Dictionaries. Retrieved from http://www.oxfordlearnersdictionaries.com/ (Accessed: 20-Jun-2016)
[9] Samsung KNOX. Retrieved from http://www.samsung.com/global/business/mobile/platform/mobile-platform/knox/ (Accessed: 20-Jun-2016)
[10] 維基百科. Retrieved from https://zh.wikipedia.org (Accessed: 20-Jun-2016)
[11] Gartner. (2016). Gartner Mobile App Survey Reveals 24 Percent More Spending on In-App Transactions Than on Upfront App Payments. Retrieved from http://www.gartner.com/newsroom/id/3331117 (Accessed: 20-Jun-2016)
[12] Google. Google Play. Retrieved from https://play.google.com/store. (Accessed: 20-Jun-2016)
[13] Google. Google Play 開發人員. Retrieved from https://support.google.com/googleplay/android-developer/answer/1153481?hl=zh-Hant (Accessed: 20-Jun-2016)
[14] iThome. (2014). FTC控告Amazon的程式內購買機制讓兒童擅自消費. Retrieved from http://www.ithome.com.tw/news/89365 (Accessed: 20-Jun-2016)
[15] iThome. (2014/08/22). F-Secure:手機惡意程式盛行,濫發簡訊程式肆虐. Retrieved from http://www.ithome.com.tw/news/90376 (Accessed: 20-Jun-2016)
[16] keyence. 風險與安全. Retrieved from http://www.keyence.com.tw/ss/products/safetyknowledge/about/ (Accessed: 20-Jun-2016)
[17] Micro, T. (2015). 最新「Ghost Push」變種宛若幽靈,暗中威脅Android 用戶,同一作者發行逾 600 惡意應用程式. Retrieved from http://blog.trendmicro.com.tw/?p=14633 (Accessed: 20-Jun-2016)
[18] T客邦. (2014/07/15). 手機程式內購買爭議多,消保處提醒當心購物方便期. Retrieved from http://www.techbang.com/posts/19044-phone-app-program-to-purchase-form-of-dispute-the-executive-yuan-consumer-protection-department-announced-the-consumer-trap (Accessed: 20-Jun-2016)
[19] Micro, T. (2014). 八成Google Play前 50 大熱門免費 App有山寨版 !. Retrieved from http://www.trendmicro.tw/tw/about-us/newsroom/releases/articles/20140829083222.html (Accessed: 20-Jun-2016)
[20] Micro, T. (2012/04/25). 《山寨版免費Android App》Instagram和Angry Birds Space憤怒鳥星際版/太空版 下載後電信費暴增. Retrieved from http://blog.trendmicro.com.tw/?p=1292 (Accessed: 20-Jun-2016)
[21] virustotal. Retrieved from https://www.virustotal.com/zh-tw/ (Accessed: 20-Jun-2016)
[22] cultofmac. (2014). Uber’s data-sucking Android app is dangerously close to malware. Retrieved from http://www.cultofmac.com/304401/ubers-android-app-literally-malware/ (Accessed: 20-Jun-2016)
[23] Mila. contagio: Take a sample, leave a sample. Mobile malware mini-dump. Retrieved from http://contagiodump.blogspot.tw/2011/03/take-sample-leave-sample-mobile-malware.html (Accessed: 20-Jun-2016)
[24] 安智官網. Retrieved from http://www.anzhi.com/ (Accessed: 20-Jun-2016)
[25] Wang, X., Sun, K., Wang, Y., & Jing, J. (2015). DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. Paper presented at the NDSS.
[26] Armando, A., Costa, G., Merlo, A., & Verderame, L. (2014). Enabling byod through secure meta-market. Paper presented at the Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks.
[27] Johnson, N. L., Cross, M., & Piltzecker, T. (2002). Security+ Study Guide and DVD Training System.
[28] Maiwald, E. (2003). Fundamentals of network security: Dreamtech press.
[29] Chang, J. M., Ho, P.-C., & Chang, T.-C. (2014). Securing BYOD. IT Professional, 16(5), 9-11.
[30] Ocano, S. G., Ramamurthy, B., & Wang, Y. (2015). Remote Mobile Screen (RMS): an approach for secure BYOD environments. Paper presented at the Computing, Networking and Communications (ICNC), 2015 International Conference on.
[31] Aung, Z., & Zaw, W. (2013). Permission-based android malware detection. International Journal of Scientific and Technology Research, 2(3), 228-234.
[32] Moonsamy, V., Rong, J., Liu, S., Li, G., & Batten, L. (2013). Contrasting permission patterns between clean and malicious android applications. Paper presented at the International Conference on Security and Privacy in Communication Systems.
[33] Xiong, P., Wang, X., Niu, W., Zhu, T., & Li, G. (2014). Android malware detection with contrasting permission patterns. China Communications, 11(8), 1-14.
[34] Sarma, B. P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., & Molloy, I. (2012). Android permissions: a perspective combining risks and benefits. Paper presented at the Proceedings of the 17th ACM symposium on Access Control Models and Technologies.
[35] Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., & Zhang, X. (2014). Exploring permission-induced risk in Android applications for malicious application detection. IEEE Transactions on Information Forensics and Security, 9(11), 1869-1882.
[36] Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A. Prevenhueber, O. (2011). Android market analysis with activation patterns. Paper presented at the International Conference on Security and Privacy in Mobile Information and Communication Systems.
[37] Takahashi, T., Ban, T., Mimura, T., & Nakao, K. (2015). Fine-Grained Risk Level Quantication Schemes Based on APK Metadata. Paper presented at the International Conference on Neural Information Processing.
[38] Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T., & Hoffmann, J. (2013). Mobile-sandbox: having a deeper look into android applications. Paper presented at the Proceedings of the 28th Annual ACM Symposium on Applied Computing.
[39] Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., & Wu, K.-P. (2012). Droidmat: Android malware detection through manifest and API calls tracing. In Proc. of Asia Joint Conference on Information Security (Asia JCIS), 2012
[40] Wang, Y., Watson, B., Zheng, J., & Mukkamala, S. (2015). ARP-Miner: Mining Risk Patterns of Android Malware. In International Workshop on Multi-disciplinary Trends in Artificial Intelligence
[41] Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., & Rieck, K. (2014). DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. Paper presented at the NDSS.
[42] Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R. Molloy, I. (2012). Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 2012 ACM conference on Computer and communications security
[43] Miller, K. W., Voas, J. M., & Hurlburt, G. F. (2012). BYOD : Security and Privacy Considerations. IT Professional, 14(5), 53-55.
[44] Singh, N. (2012). BYOD genie is out of the bottle–“Devil or angel”. Journal of Business Management & Social Sciences Research, 1(3), 1-12.
[45] 李佩芸. (2015). 企業實施 BYOD 之安全政策管理平台設計與雛型實作 國立中央大學資訊管理所.
[46] 陶嘉仁. (2012). Android 程式權限分析. 國立交通大學資訊工程所.
[47] 黄洁, 谭博, & 谭成翔. (2015). 用户友好的 Android 隐私监管机制. Journal of Computer Application计算机应用, 35(3) , 751-755. |