The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations

In the last decade, companies tend to become virtualized. This virtualization is due in large part to developments in the use of mobile platforms and the impact on their infrastructure. The concept of BYOD (Bring Your Own Device) adoption and use of cloud computing are having profound implications for how the technologies are being used, as well as the interaction between individuals and these technologies. In this context, we conducted a study based on a questionnaire about the impact of the use of mobile devices and the cloud in organizations, taking into consideration their use in performing professional and personal tasks. With the questionnaire and its subsequent analysis it was found that organizations have a lack of understanding about almost all of the implications and consequences of the use of mobile devices and the cloud.

[1]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[2]  Mike Potts The state of information security , 2012, Netw. Secur..

[3]  Hormazd Romer,et al.  Best practices for BYOD security , 2014 .

[4]  Gordon Thomson BYOD: enabling the chaos , 2012, Netw. Secur..

[5]  Jennifer E. Moyer Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage , 2013 .

[6]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[7]  P. Vinoth Kumar,et al.  Study on Cloud Computing and Security Approaches , 2013 .

[8]  Steve Mansfield-Devine,et al.  Interview: BYOD and the enterprise network , 2012 .

[9]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[10]  Seyed A Shahrestani,et al.  Cloud Computing: Security and Reliability Issues , 2013 .

[11]  Luis Rodero-Merino,et al.  A break in the clouds: towards a cloud definition , 2008, CCRV.

[12]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[13]  Miss. Trupti S. Lokhande,et al.  A Review Paper on Cloud Computing Security , 2013 .

[14]  D. Luxton,et al.  mHealth data security: the need for HIPAA-compliant standardization. , 2012, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[15]  Ramiro Gonçalves,et al.  Cloud Computing Decisions in Real Enterprises , 2014 .

[16]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[17]  Antonio Scarfò,et al.  New Security Perspectives around BYOD , 2012, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications.

[18]  Neal Leavitt Today's Mobile Security Requires a New Approach , 2013, Computer.

[19]  Keith Jeffery,et al.  A ROADMAP FOR ADVANCED CLOUD TECHNOLOGIES UNDER H 2020 Recommendations by the Cloud Expert Group , 2012 .