Author:
the Tank Frank,Harborth David,Veseli Doni Ilrjana
Reference64 articles.
1. Privacy and security in mobile health apps: A review and recommendations;Borja Mart�nez-P�rez;Journal of Medical Systems,2014
2. Shadow it. Management and Control of Unofficial IT;Christopher Rentrop;ICDS,2012
3. A Survey of Data Leakage Detection and Prevention Solutions