Works Cited .pdf
Original filename: Works Cited.pdf
This PDF 1.5 document has been generated by MicrosoftÂ® Word 2010, and has been sent on pdf-archive.com on 10/11/2014 at 07:17, from IP address 71.120.x.x.
The current document download page has been viewed 1208 times.
File size: 84 KB (1 page).
Privacy: public file
Download original PDF file
Works Cited.pdf (PDF, 84 KB)
Share on social networks
Link to this file download page
Security and Accessibility
Courter, E. (2012). Mobile security still a race between bad guys and good guys. Credit Union
Times, , 8. Retrieved from
Crosman, P. (2014, Jun 16). First major mobile banking security threat hits the U.S. American
Banker Retrieved from
Harris, T. (2013). MOBILE SOCIAL MEDIA & MASS MOBILIZATION. Scitech
Lawyer, 9(3), 14-15. Retrieved from
Patten, K. P., & Harris, M. A. (2013). The need to address mobile device security in the higher
education IT curriculum. Journal of Information Systems Education, 24(1), 41-52.
Retrieved from http://search.proquest.com/docview/1438693253?accountid=14541
Sixty five percent of global companies see personal mobile devices used at work as a threat:
Report. (2013). Express Computer, Retrieved from
Link to this page
Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..
Use the short link to share your document on Twitter or by text message (SMS)
Copy the following HTML code to share your document on a Website or Blog