Validation of architectural requirements for tackling cloud computing barriers: Cloud provider perspective

B Alghamdi, LE Potter, S Drew - Procedia Computer Science, 2021 - Elsevier
Although researchers and organisations have recognised cloud computing obstacles in the
prior cloud adoption stage, few efforts have been made to investigate and address cloud …

Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers

HR Nikkhah, V Grover, R Sabherwal - Information & Computer …, 2024 - emerald.com
Purpose This study aims to argue that user's continued use behavior is contingent upon two
perceptions (ie the app and the provider). This study examines the moderating effects of …

Secure migration to compliant cloud services: A case study

FF Alruwaili, TA Gulliver - Journal of information security and applications, 2018 - Elsevier
Adoption of cloud computing technology in the financial sector is increasing to improve the
efficiency of payment transactions, risk management, and business processes. This is …

Why do users continue to use mobile cloud computing applications? A security-privacy

HR Nikkhah, V Grover, R Sabherwal - 2018 - aisel.aisnet.org
Mobile cloud computing (MCC) apps are mobile apps that use cloud computing technology
to provide larger storage capacity and simultaneous access from different mobile devices …

[PDF][PDF] Mobile cloud-computing applications: A privacy cost-benefit model

HR Nikkhah, R Sabherwal - 2017 - researchgate.net
The increasing use of mobile devices has been accompanied by the development of mobile
cloudcomputing applications (MCC apps) that are multi-platform applications sending the …

Forensic Readiness for Wireless Medical Systems: Designing for User Safety

AK Kyaw - 2019 - openrepository.aut.ac.nz
The focus of this research is on the risks associated with wireless medical systems
(WMedSys) and devices in the healthcare environment. The deployment of wireless …