Validation of architectural requirements for tackling cloud computing barriers: Cloud provider perspective
Although researchers and organisations have recognised cloud computing obstacles in the
prior cloud adoption stage, few efforts have been made to investigate and address cloud …
prior cloud adoption stage, few efforts have been made to investigate and address cloud …
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers
Purpose This study aims to argue that user's continued use behavior is contingent upon two
perceptions (ie the app and the provider). This study examines the moderating effects of …
perceptions (ie the app and the provider). This study examines the moderating effects of …
Secure migration to compliant cloud services: A case study
FF Alruwaili, TA Gulliver - Journal of information security and applications, 2018 - Elsevier
Adoption of cloud computing technology in the financial sector is increasing to improve the
efficiency of payment transactions, risk management, and business processes. This is …
efficiency of payment transactions, risk management, and business processes. This is …
Why do users continue to use mobile cloud computing applications? A security-privacy
Mobile cloud computing (MCC) apps are mobile apps that use cloud computing technology
to provide larger storage capacity and simultaneous access from different mobile devices …
to provide larger storage capacity and simultaneous access from different mobile devices …
[PDF][PDF] Mobile cloud-computing applications: A privacy cost-benefit model
HR Nikkhah, R Sabherwal - 2017 - researchgate.net
The increasing use of mobile devices has been accompanied by the development of mobile
cloudcomputing applications (MCC apps) that are multi-platform applications sending the …
cloudcomputing applications (MCC apps) that are multi-platform applications sending the …
Forensic Readiness for Wireless Medical Systems: Designing for User Safety
AK Kyaw - 2019 - openrepository.aut.ac.nz
The focus of this research is on the risks associated with wireless medical systems
(WMedSys) and devices in the healthcare environment. The deployment of wireless …
(WMedSys) and devices in the healthcare environment. The deployment of wireless …