Abstract
In the last decade, companies tend to become virtualized. This virtualization is due in large part to developments in the use of mobile platforms and the impact on their infrastructure. The concept of BYOD (Bring Your Own Device) adoption and use of cloud computing are having profound implications for how the technologies are being used, as well as the interaction between individuals and these technologies. In this context, we conducted a study based on a questionnaire about the impact of the use of mobile devices and the cloud in organizations, taking into consideration their use in performing professional and personal tasks. With the questionnaire and its subsequent analysis it was found that organizations have a lack of understanding about almost all of the implications and consequences of the use of mobile devices and the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mobile Marketing Statistics, http://www.smartinsights.com/mobile-marketing/mobile-mrketing-analytics/mobile-marketing-statistics/
Schubert, L., Jeffery, K., Neidecker-Lutz, B.: A Roadmap for Advanced Cloud Technologies under H(2020), http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-expert-group/roadmap-dec2012-vfinal.pdf
Communities Dominate Brands, http://communities-dominate.blogs.com/brands/2012/06/massive-milestones-in-mobile-will-these-numbers-change-your-mobile-strategy.html
Business Insider, http://www.businessinsider.com/2012-03-28/research/31248281_1_ios-android-hard-drive.html
Linthicum, D.: Mobile’s next great leap will happen in the cloud (2014), http://www.infoworld.com/print/236891
Thomson, G.: BYOD: enabling the chaos. Network Security 2012(2), 5–8 (2012)
Mansfield-Devine, S.: Interview: BYOD and the enterprise network. Computer Fraud & Security 2012(4), 14–17 (2012)
Cisco ConnectedWorld Technology Report. Cisco, http://www.cisco.com/en/US/netsol/ns1120/index.html
Mike, P.: The state of information security. Network Security 2012(7), 1–9 (2012)
Verizon, Data Breach Investigation Report (2012), http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012-press_en_xg.pdf
Consumerization, http://en.wikipedia.org/wiki/Consumerization
Scarfò, A.: New security perspectives around BYOD, Seventh International Conference on Broadband, Wireless Computing. In: Communication and Applications, pp. 446–451. IEEE Computer Society (2012), doi:10.1109/BWCCA.2012.79
Romer, H.: Best practices for BYOD security. Computer Fraud & Security 7, 13–15 (2014), http://dx.doi.org/10.1016/S1361-3723
Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A Break in the Clouds: Towards a Cloud Definition, SIGCOMM Comput. Commun. Rev. 39, 50–55 (2008)
Mell, P., Grance, T.: A NIST Definition of Cloud Computing. National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Cota, M.P., Gonçalves, R., Moreira, F.: Cloud Computing Decisions in Real Enterprises. Agile Estimation Techniques and Innovative Approaches to Software Process Improvement, pp. 313–330. Information Science Reference (IGI), Hershey (2014), doi:10.4018/978-1-4666-5182-1.ch018
Lokhande, T.S., Shelke, R.R.: A Review Paper on Cloud Computing Security. International Journal of Advanced Research in Computer Science 4(6), 70–73 (2013)
Farhad, A., Seyed, S., Athula, G.: Cloud Computing: Security and Reliability Issues, Communications of the IBIMA, Article ID 655710, 12 pages (2013), doi:10.5171/2013.655710
Murugaboopathi, G., Chandravathy, C., Vinoth Kumar, P.: Study on Cloud Computing and Security Approaches. International Journal of Soft Computing and Engineering (IJSCE) 3(-1), 212–215 (2013) ISSN: 2231-2307
Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, vol. 8, pp. 24–31. IEEE (2010)
Chen, Y., Paxson, V., Katz, R.H.: What’s New about Cloud Computing Security? EECS Department, University of California, Berkeley (2010)
Gartner, https://l1.osdimg.com/remote-support/dam/pdf/en/bring-your-own-device-the-facts-and-the-future.pdf
Leavitt, N.: Today’s Mobile Security Requires a New Approach, Computer, vol. 46(11), pp. 16–19. IEEE Computer Society, doi:10.1109/MC.2013.400
ISBG, http://newsroom.cisco.com/release/854754/Cisco-Study-IT-Saying-Yes-To-BYOD
Department, U.S.: US Department of Health and Human Services. Health information privacy: breaches affecting 500 or more individuals (data set), http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html
Department, U.S.: US Department of Health and Human Services. Massachusetts provider settles HIPAA case for $1.5 million, http://www.hhs.gov/news/press/2012pres/09/20120917a.html
Jennifer, E.M.: Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage. Journal of Hospital Librarianship 13(3), 197–208 (2013), doi:10.1080/15323269.2013.798768
Luxton, D., Kayl, R., Mishkind, M.: mHealth data security: the need for HIPAA compliant standardization. J Telemed E-Health 18, 284–288 (2012)
Campenhoudt, L.-V., Quivy, R.: Manual de Investigação em Ciências Sociais. Gradiva Publicações (2008) ISBN:9789726622758
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Moreira, F., Cota, M.P., Gonc̨alves, R. (2015). The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations. In: Rocha, A., Correia, A., Costanzo, S., Reis, L. (eds) New Contributions in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 353. Springer, Cham. https://doi.org/10.1007/978-3-319-16486-1_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-16486-1_28
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16485-4
Online ISBN: 978-3-319-16486-1
eBook Packages: Computer ScienceComputer Science (R0)