Skip to main content

The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations

  • Conference paper
Book cover New Contributions in Information Systems and Technologies

Abstract

In the last decade, companies tend to become virtualized. This virtualization is due in large part to developments in the use of mobile platforms and the impact on their infrastructure. The concept of BYOD (Bring Your Own Device) adoption and use of cloud computing are having profound implications for how the technologies are being used, as well as the interaction between individuals and these technologies. In this context, we conducted a study based on a questionnaire about the impact of the use of mobile devices and the cloud in organizations, taking into consideration their use in performing professional and personal tasks. With the questionnaire and its subsequent analysis it was found that organizations have a lack of understanding about almost all of the implications and consequences of the use of mobile devices and the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 369.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mobile Marketing Statistics, http://www.smartinsights.com/mobile-marketing/mobile-mrketing-analytics/mobile-marketing-statistics/

  2. Schubert, L., Jeffery, K., Neidecker-Lutz, B.: A Roadmap for Advanced Cloud Technologies under H(2020), http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-expert-group/roadmap-dec2012-vfinal.pdf

  3. Communities Dominate Brands, http://communities-dominate.blogs.com/brands/2012/06/massive-milestones-in-mobile-will-these-numbers-change-your-mobile-strategy.html

  4. Business Insider, http://www.businessinsider.com/2012-03-28/research/31248281_1_ios-android-hard-drive.html

  5. Linthicum, D.: Mobile’s next great leap will happen in the cloud (2014), http://www.infoworld.com/print/236891

  6. Thomson, G.: BYOD: enabling the chaos. Network Security 2012(2), 5–8 (2012)

    Article  Google Scholar 

  7. Mansfield-Devine, S.: Interview: BYOD and the enterprise network. Computer Fraud & Security 2012(4), 14–17 (2012)

    Article  Google Scholar 

  8. Cisco ConnectedWorld Technology Report. Cisco, http://www.cisco.com/en/US/netsol/ns1120/index.html

  9. Mike, P.: The state of information security. Network Security 2012(7), 1–9 (2012)

    Article  Google Scholar 

  10. Verizon, Data Breach Investigation Report (2012), http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012-press_en_xg.pdf

  11. Consumerization, http://en.wikipedia.org/wiki/Consumerization

  12. Scarfò, A.: New security perspectives around BYOD, Seventh International Conference on Broadband, Wireless Computing. In: Communication and Applications, pp. 446–451. IEEE Computer Society (2012), doi:10.1109/BWCCA.2012.79

    Google Scholar 

  13. Romer, H.: Best practices for BYOD security. Computer Fraud & Security 7, 13–15 (2014), http://dx.doi.org/10.1016/S1361-3723

    Article  Google Scholar 

  14. Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A Break in the Clouds: Towards a Cloud Definition, SIGCOMM Comput. Commun. Rev. 39, 50–55 (2008)

    Article  Google Scholar 

  15. Mell, P., Grance, T.: A NIST Definition of Cloud Computing. National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

  16. Cota, M.P., Gonçalves, R., Moreira, F.: Cloud Computing Decisions in Real Enterprises. Agile Estimation Techniques and Innovative Approaches to Software Process Improvement, pp. 313–330. Information Science Reference (IGI), Hershey (2014), doi:10.4018/978-1-4666-5182-1.ch018

    Google Scholar 

  17. Lokhande, T.S., Shelke, R.R.: A Review Paper on Cloud Computing Security. International Journal of Advanced Research in Computer Science 4(6), 70–73 (2013)

    Google Scholar 

  18. Farhad, A., Seyed, S., Athula, G.: Cloud Computing: Security and Reliability Issues, Communications of the IBIMA, Article ID 655710, 12 pages (2013), doi:10.5171/2013.655710

    Google Scholar 

  19. Murugaboopathi, G., Chandravathy, C., Vinoth Kumar, P.: Study on Cloud Computing and Security Approaches. International Journal of Soft Computing and Engineering (IJSCE) 3(-1), 212–215 (2013) ISSN: 2231-2307

    Google Scholar 

  20. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, vol. 8, pp. 24–31. IEEE (2010)

    Google Scholar 

  21. Chen, Y., Paxson, V., Katz, R.H.: What’s New about Cloud Computing Security? EECS Department, University of California, Berkeley (2010)

    Google Scholar 

  22. Gartner, https://l1.osdimg.com/remote-support/dam/pdf/en/bring-your-own-device-the-facts-and-the-future.pdf

  23. Leavitt, N.: Today’s Mobile Security Requires a New Approach, Computer, vol. 46(11), pp. 16–19. IEEE Computer Society, doi:10.1109/MC.2013.400

    Google Scholar 

  24. ISBG, http://newsroom.cisco.com/release/854754/Cisco-Study-IT-Saying-Yes-To-BYOD

  25. Department, U.S.: US Department of Health and Human Services. Health information privacy: breaches affecting 500 or more individuals (data set), http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html

  26. Department, U.S.: US Department of Health and Human Services. Massachusetts provider settles HIPAA case for $1.5 million, http://www.hhs.gov/news/press/2012pres/09/20120917a.html

  27. Jennifer, E.M.: Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage. Journal of Hospital Librarianship 13(3), 197–208 (2013), doi:10.1080/15323269.2013.798768

    Article  Google Scholar 

  28. Luxton, D., Kayl, R., Mishkind, M.: mHealth data security: the need for HIPAA compliant standardization. J Telemed E-Health 18, 284–288 (2012)

    Article  Google Scholar 

  29. Campenhoudt, L.-V., Quivy, R.: Manual de Investigação em Ciências Sociais. Gradiva Publicações (2008) ISBN:9789726622758

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fernando Moreira .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Moreira, F., Cota, M.P., Gonc̨alves, R. (2015). The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations. In: Rocha, A., Correia, A., Costanzo, S., Reis, L. (eds) New Contributions in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 353. Springer, Cham. https://doi.org/10.1007/978-3-319-16486-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16486-1_28

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16485-4

  • Online ISBN: 978-3-319-16486-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics