Vetting Mobile App Vendors
Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option.
Autor*in: |
Voas, Jeffrey [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Systematik: |
|
---|
Übergeordnetes Werk: |
Enthalten in: Computer - Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970, 48(2015), 6, Seite 69-71 |
---|---|
Übergeordnetes Werk: |
volume:48 ; year:2015 ; number:6 ; pages:69-71 |
Links: |
---|
DOI / URN: |
10.1109/MC.2015.165 |
---|
Katalog-ID: |
OLC1962728102 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1962728102 | ||
003 | DE-627 | ||
005 | 20230714160039.0 | ||
007 | tu | ||
008 | 160206s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1109/MC.2015.165 |2 doi | |
028 | 5 | 2 | |a PQ20160617 |
035 | |a (DE-627)OLC1962728102 | ||
035 | |a (DE-599)GBVOLC1962728102 | ||
035 | |a (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 | ||
035 | |a (KEY)0007916220150000048000600069vettingmobileappvendors | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q DE-600 |
084 | |a SA 3520 |q AVZ |2 rvk | ||
084 | |a 54.00 |2 bkl | ||
100 | 1 | |a Voas, Jeffrey |e verfasserin |4 aut | |
245 | 1 | 0 | |a Vetting Mobile App Vendors |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. | ||
650 | 4 | |a mobile apps | |
650 | 4 | |a mobile app security | |
650 | 4 | |a Performance evaluation | |
650 | 4 | |a mobile app vendors | |
650 | 4 | |a mobile computing | |
650 | 4 | |a Mobile communication | |
650 | 4 | |a security | |
650 | 4 | |a Computer applications | |
650 | 4 | |a Software | |
650 | 4 | |a Network security | |
650 | 4 | |a Mobile applications | |
650 | 4 | |a Testing | |
773 | 0 | 8 | |i Enthalten in |t Computer |d Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970 |g 48(2015), 6, Seite 69-71 |w (DE-627)129296201 |w (DE-600)121237-0 |w (DE-576)014489465 |x 0018-9162 |7 nnns |
773 | 1 | 8 | |g volume:48 |g year:2015 |g number:6 |g pages:69-71 |
856 | 4 | 1 | |u http://dx.doi.org/10.1109/MC.2015.165 |3 Volltext |
856 | 4 | 2 | |u http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 |
856 | 4 | 2 | |u http://search.proquest.com/docview/1692794210 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_30 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_231 | ||
912 | |a GBV_ILN_2002 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2111 | ||
936 | r | v | |a SA 3520 |
936 | b | k | |a 54.00 |q AVZ |
951 | |a AR | ||
952 | |d 48 |j 2015 |e 6 |h 69-71 |
author_variant |
j v jv |
---|---|
matchkey_str |
article:00189162:2015----::etnmbla |
hierarchy_sort_str |
2015 |
bklnumber |
54.00 |
publishDate |
2015 |
allfields |
10.1109/MC.2015.165 doi PQ20160617 (DE-627)OLC1962728102 (DE-599)GBVOLC1962728102 (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 (KEY)0007916220150000048000600069vettingmobileappvendors DE-627 ger DE-627 rakwb eng 004 DE-600 SA 3520 AVZ rvk 54.00 bkl Voas, Jeffrey verfasserin aut Vetting Mobile App Vendors 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing Enthalten in Computer Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970 48(2015), 6, Seite 69-71 (DE-627)129296201 (DE-600)121237-0 (DE-576)014489465 0018-9162 nnns volume:48 year:2015 number:6 pages:69-71 http://dx.doi.org/10.1109/MC.2015.165 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 http://search.proquest.com/docview/1692794210 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_22 GBV_ILN_30 GBV_ILN_32 GBV_ILN_70 GBV_ILN_231 GBV_ILN_2002 GBV_ILN_2004 GBV_ILN_2059 GBV_ILN_2111 SA 3520 54.00 AVZ AR 48 2015 6 69-71 |
spelling |
10.1109/MC.2015.165 doi PQ20160617 (DE-627)OLC1962728102 (DE-599)GBVOLC1962728102 (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 (KEY)0007916220150000048000600069vettingmobileappvendors DE-627 ger DE-627 rakwb eng 004 DE-600 SA 3520 AVZ rvk 54.00 bkl Voas, Jeffrey verfasserin aut Vetting Mobile App Vendors 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing Enthalten in Computer Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970 48(2015), 6, Seite 69-71 (DE-627)129296201 (DE-600)121237-0 (DE-576)014489465 0018-9162 nnns volume:48 year:2015 number:6 pages:69-71 http://dx.doi.org/10.1109/MC.2015.165 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 http://search.proquest.com/docview/1692794210 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_22 GBV_ILN_30 GBV_ILN_32 GBV_ILN_70 GBV_ILN_231 GBV_ILN_2002 GBV_ILN_2004 GBV_ILN_2059 GBV_ILN_2111 SA 3520 54.00 AVZ AR 48 2015 6 69-71 |
allfields_unstemmed |
10.1109/MC.2015.165 doi PQ20160617 (DE-627)OLC1962728102 (DE-599)GBVOLC1962728102 (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 (KEY)0007916220150000048000600069vettingmobileappvendors DE-627 ger DE-627 rakwb eng 004 DE-600 SA 3520 AVZ rvk 54.00 bkl Voas, Jeffrey verfasserin aut Vetting Mobile App Vendors 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing Enthalten in Computer Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970 48(2015), 6, Seite 69-71 (DE-627)129296201 (DE-600)121237-0 (DE-576)014489465 0018-9162 nnns volume:48 year:2015 number:6 pages:69-71 http://dx.doi.org/10.1109/MC.2015.165 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 http://search.proquest.com/docview/1692794210 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_22 GBV_ILN_30 GBV_ILN_32 GBV_ILN_70 GBV_ILN_231 GBV_ILN_2002 GBV_ILN_2004 GBV_ILN_2059 GBV_ILN_2111 SA 3520 54.00 AVZ AR 48 2015 6 69-71 |
allfieldsGer |
10.1109/MC.2015.165 doi PQ20160617 (DE-627)OLC1962728102 (DE-599)GBVOLC1962728102 (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 (KEY)0007916220150000048000600069vettingmobileappvendors DE-627 ger DE-627 rakwb eng 004 DE-600 SA 3520 AVZ rvk 54.00 bkl Voas, Jeffrey verfasserin aut Vetting Mobile App Vendors 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing Enthalten in Computer Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970 48(2015), 6, Seite 69-71 (DE-627)129296201 (DE-600)121237-0 (DE-576)014489465 0018-9162 nnns volume:48 year:2015 number:6 pages:69-71 http://dx.doi.org/10.1109/MC.2015.165 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 http://search.proquest.com/docview/1692794210 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_22 GBV_ILN_30 GBV_ILN_32 GBV_ILN_70 GBV_ILN_231 GBV_ILN_2002 GBV_ILN_2004 GBV_ILN_2059 GBV_ILN_2111 SA 3520 54.00 AVZ AR 48 2015 6 69-71 |
allfieldsSound |
10.1109/MC.2015.165 doi PQ20160617 (DE-627)OLC1962728102 (DE-599)GBVOLC1962728102 (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 (KEY)0007916220150000048000600069vettingmobileappvendors DE-627 ger DE-627 rakwb eng 004 DE-600 SA 3520 AVZ rvk 54.00 bkl Voas, Jeffrey verfasserin aut Vetting Mobile App Vendors 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing Enthalten in Computer Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970 48(2015), 6, Seite 69-71 (DE-627)129296201 (DE-600)121237-0 (DE-576)014489465 0018-9162 nnns volume:48 year:2015 number:6 pages:69-71 http://dx.doi.org/10.1109/MC.2015.165 Volltext http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 http://search.proquest.com/docview/1692794210 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_22 GBV_ILN_30 GBV_ILN_32 GBV_ILN_70 GBV_ILN_231 GBV_ILN_2002 GBV_ILN_2004 GBV_ILN_2059 GBV_ILN_2111 SA 3520 54.00 AVZ AR 48 2015 6 69-71 |
language |
English |
source |
Enthalten in Computer 48(2015), 6, Seite 69-71 volume:48 year:2015 number:6 pages:69-71 |
sourceStr |
Enthalten in Computer 48(2015), 6, Seite 69-71 volume:48 year:2015 number:6 pages:69-71 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computer |
authorswithroles_txt_mv |
Voas, Jeffrey @@aut@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
129296201 |
dewey-sort |
14 |
id |
OLC1962728102 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1962728102</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230714160039.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/MC.2015.165</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1962728102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1962728102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0007916220150000048000600069vettingmobileappvendors</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SA 3520</subfield><subfield code="q">AVZ</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Voas, Jeffrey</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Vetting Mobile App Vendors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile apps</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile app security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile app vendors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Testing</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer</subfield><subfield code="d">Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970</subfield><subfield code="g">48(2015), 6, Seite 69-71</subfield><subfield code="w">(DE-627)129296201</subfield><subfield code="w">(DE-600)121237-0</subfield><subfield code="w">(DE-576)014489465</subfield><subfield code="x">0018-9162</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:48</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:69-71</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/MC.2015.165</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1692794210</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_30</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_231</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">SA 3520</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">48</subfield><subfield code="j">2015</subfield><subfield code="e">6</subfield><subfield code="h">69-71</subfield></datafield></record></collection>
|
author |
Voas, Jeffrey |
spellingShingle |
Voas, Jeffrey ddc 004 rvk SA 3520 bkl 54.00 misc mobile apps misc mobile app security misc Performance evaluation misc mobile app vendors misc mobile computing misc Mobile communication misc security misc Computer applications misc Software misc Network security misc Mobile applications misc Testing Vetting Mobile App Vendors |
authorStr |
Voas, Jeffrey |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)129296201 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0018-9162 |
topic_title |
004 DE-600 SA 3520 AVZ rvk 54.00 bkl Vetting Mobile App Vendors mobile apps mobile app security Performance evaluation mobile app vendors mobile computing Mobile communication security Computer applications Software Network security Mobile applications Testing |
topic |
ddc 004 rvk SA 3520 bkl 54.00 misc mobile apps misc mobile app security misc Performance evaluation misc mobile app vendors misc mobile computing misc Mobile communication misc security misc Computer applications misc Software misc Network security misc Mobile applications misc Testing |
topic_unstemmed |
ddc 004 rvk SA 3520 bkl 54.00 misc mobile apps misc mobile app security misc Performance evaluation misc mobile app vendors misc mobile computing misc Mobile communication misc security misc Computer applications misc Software misc Network security misc Mobile applications misc Testing |
topic_browse |
ddc 004 rvk SA 3520 bkl 54.00 misc mobile apps misc mobile app security misc Performance evaluation misc mobile app vendors misc mobile computing misc Mobile communication misc security misc Computer applications misc Software misc Network security misc Mobile applications misc Testing |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Computer |
hierarchy_parent_id |
129296201 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Computer |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)129296201 (DE-600)121237-0 (DE-576)014489465 |
title |
Vetting Mobile App Vendors |
ctrlnum |
(DE-627)OLC1962728102 (DE-599)GBVOLC1962728102 (PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0 (KEY)0007916220150000048000600069vettingmobileappvendors |
title_full |
Vetting Mobile App Vendors |
author_sort |
Voas, Jeffrey |
journal |
Computer |
journalStr |
Computer |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
69 |
author_browse |
Voas, Jeffrey |
container_volume |
48 |
class |
004 DE-600 SA 3520 AVZ rvk 54.00 bkl |
format_se |
Aufsätze |
author-letter |
Voas, Jeffrey |
doi_str_mv |
10.1109/MC.2015.165 |
dewey-full |
004 |
title_sort |
vetting mobile app vendors |
title_auth |
Vetting Mobile App Vendors |
abstract |
Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. |
abstractGer |
Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. |
abstract_unstemmed |
Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_22 GBV_ILN_30 GBV_ILN_32 GBV_ILN_70 GBV_ILN_231 GBV_ILN_2002 GBV_ILN_2004 GBV_ILN_2059 GBV_ILN_2111 |
container_issue |
6 |
title_short |
Vetting Mobile App Vendors |
url |
http://dx.doi.org/10.1109/MC.2015.165 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174 http://search.proquest.com/docview/1692794210 |
remote_bool |
false |
ppnlink |
129296201 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1109/MC.2015.165 |
up_date |
2024-07-04T04:10:56.679Z |
_version_ |
1803620195165536256 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1962728102</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230714160039.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/MC.2015.165</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1962728102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1962728102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c2031-a94a5935b122343f55780973b5527273dd2fe31bc1ea74a8a833f094eb76a8db0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0007916220150000048000600069vettingmobileappvendors</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SA 3520</subfield><subfield code="q">AVZ</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Voas, Jeffrey</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Vetting Mobile App Vendors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Vetting a mobile app vendor's processes via a questionnaire is a poor substitute for vetting the app itself, but situations often arise when it's the only or most practical option.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile apps</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile app security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile app vendors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Testing</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer</subfield><subfield code="d">Los Alamitos, Calif. : IEEE Computer Soc. Publ. Off., 1970</subfield><subfield code="g">48(2015), 6, Seite 69-71</subfield><subfield code="w">(DE-627)129296201</subfield><subfield code="w">(DE-600)121237-0</subfield><subfield code="w">(DE-576)014489465</subfield><subfield code="x">0018-9162</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:48</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:69-71</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/MC.2015.165</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7122174</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1692794210</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_30</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_231</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">SA 3520</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">48</subfield><subfield code="j">2015</subfield><subfield code="e">6</subfield><subfield code="h">69-71</subfield></datafield></record></collection>
|
score |
7.400298 |