Springer, Electronic Commerce Research, 3(13), p. 237-241, 2013
DOI: 10.1007/s10660-013-9114-3
Full text: Download
To enhance the security of mobile devices, enterprises are developing and adopting mobile device management systems. However, if a mobile device management system is exploited, mobile devices and the data they contain will be compromised. Therefore, ...