Return to Article Details Analysis of user behavior and authorization methods in context of mobile devices security Download Download PDF