{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:45Z","timestamp":1742912505284,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319164854"},{"type":"electronic","value":"9783319164861"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16486-1_28","type":"book-chapter","created":{"date-parts":[[2015,3,25]],"date-time":"2015-03-25T11:45:52Z","timestamp":1427283952000},"page":"275-284","source":"Crossref","is-referenced-by-count":2,"title":["The Influence of the Use of Mobile Devices and the Cloud Computing in Organizations"],"prefix":"10.1007","author":[{"given":"Fernando","family":"Moreira","sequence":"first","affiliation":[]},{"given":"Manuel P\u00e9rez","family":"Cota","sequence":"additional","affiliation":[]},{"given":"Ramiro","family":"Gonc\u0328alves","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Mobile Marketing Statistics, \n                      http:\/\/www.smartinsights.com\/mobile-marketing\/mobile-mrketing-analytics\/mobile-marketing-statistics\/"},{"key":"28_CR2","unstructured":"Schubert, L., Jeffery, K., Neidecker-Lutz, B.: A Roadmap for Advanced Cloud Technologies under H(2020), \n                      http:\/\/cordis.europa.eu\/fp7\/ict\/ssai\/docs\/cloud-expert-group\/roadmap-dec2012-vfinal.pdf"},{"key":"28_CR3","unstructured":"Communities Dominate Brands, \n                      http:\/\/communities-dominate.blogs.com\/brands\/2012\/06\/massive-milestones-in-mobile-will-these-numbers-change-your-mobile-strategy.html"},{"key":"28_CR4","unstructured":"Business Insider, \n                      http:\/\/www.businessinsider.com\/2012-03-28\/research\/31248281_1_ios-android-hard-drive.html"},{"key":"28_CR5","unstructured":"Linthicum, D.: Mobile\u2019s next great leap will happen in the cloud (2014), \n                      http:\/\/www.infoworld.com\/print\/236891"},{"issue":"2","key":"28_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(12)70013-2","volume":"2012","author":"G. Thomson","year":"2012","unstructured":"Thomson, G.: BYOD: enabling the chaos. Network Security\u00a02012(2), 5\u20138 (2012)","journal-title":"Network Security"},{"issue":"4","key":"28_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(12)70031-3","volume":"2012","author":"S. Mansfield-Devine","year":"2012","unstructured":"Mansfield-Devine, S.: Interview: BYOD and the enterprise network. Computer Fraud & Security\u00a02012(4), 14\u201317 (2012)","journal-title":"Computer Fraud & Security"},{"key":"28_CR8","unstructured":"Cisco ConnectedWorld Technology Report. Cisco, \n                      http:\/\/www.cisco.com\/en\/US\/netsol\/ns1120\/index.html"},{"issue":"7","key":"28_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1353-4858(12)70058-2","volume":"2012","author":"P. Mike","year":"2012","unstructured":"Mike, P.: The state of information security. Network Security\u00a02012(7), 1\u20139 (2012)","journal-title":"Network Security"},{"key":"28_CR10","unstructured":"Verizon, Data Breach Investigation Report (2012), \n                      http:\/\/www.verizonbusiness.com\/resources\/reports\/rp_data-breach-investigations-report-2012-press_en_xg.pdf"},{"key":"28_CR11","unstructured":"Consumerization, \n                      http:\/\/en.wikipedia.org\/wiki\/Consumerization"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Scarf\u00f2, A.: New security perspectives around BYOD, Seventh International Conference on Broadband, Wireless Computing. In: Communication and Applications, pp. 446\u2013451. IEEE Computer Society (2012), doi:10.1109\/BWCCA.2012.79","DOI":"10.1109\/BWCCA.2012.79"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S1361-3723(14)70007-7","volume":"7","author":"H. Romer","year":"2014","unstructured":"Romer, H.: Best practices for BYOD security. Computer Fraud & Security\u00a07, 13\u201315 (2014), \n                      http:\/\/dx.doi.org\/10.1016\/S1361-3723","journal-title":"Computer Fraud & Security"},{"key":"28_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"L.M. Vaquero","year":"2008","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A Break in the Clouds: Towards a Cloud Definition, SIGCOMM Comput. Commun. Rev.\u00a039, 50\u201355 (2008)","journal-title":"Commun. Rev."},{"key":"28_CR15","unstructured":"Mell, P., Grance, T.: A NIST Definition of Cloud Computing. National Institute of Standards and Technology, \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Cota, M.P., Gon\u00e7alves, R., Moreira, F.: Cloud Computing Decisions in Real Enterprises. Agile Estimation Techniques and Innovative Approaches to Software Process Improvement, pp. 313\u2013330. Information Science Reference (IGI), Hershey (2014), doi:10.4018\/978-1-4666-5182-1.ch018","DOI":"10.4018\/978-1-4666-5182-1.ch018"},{"issue":"6","key":"28_CR17","first-page":"70","volume":"4","author":"T.S. Lokhande","year":"2013","unstructured":"Lokhande, T.S., Shelke, R.R.: A Review Paper on Cloud Computing Security. International Journal of Advanced Research in Computer Science\u00a04(6), 70\u201373 (2013)","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Farhad, A., Seyed, S., Athula, G.: Cloud Computing: Security and Reliability Issues, Communications of the IBIMA, Article ID 655710, 12 pages (2013), doi:10.5171\/2013.655710","DOI":"10.5171\/2013.655710"},{"key":"28_CR19","unstructured":"Murugaboopathi, G., Chandravathy, C., Vinoth Kumar, P.: Study on Cloud Computing and Security Approaches. International Journal of Soft Computing and Engineering (IJSCE)\u00a03(-1), 212\u2013215 (2013) ISSN: 2231-2307"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, vol.\u00a08, pp. 24\u201331. IEEE (2010)","DOI":"10.1109\/MSP.2010.186"},{"key":"28_CR21","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: What\u2019s New about Cloud Computing Security? EECS Department, University of California, Berkeley (2010)"},{"key":"28_CR22","unstructured":"Gartner, \n                      https:\/\/l1.osdimg.com\/remote-support\/dam\/pdf\/en\/bring-your-own-device-the-facts-and-the-future.pdf"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Leavitt, N.: Today\u2019s Mobile Security Requires a New Approach, Computer, vol.\u00a046(11), pp. 16\u201319. IEEE Computer Society, doi:10.1109\/MC.2013.400","DOI":"10.1109\/MC.2013.400"},{"key":"28_CR24","unstructured":"ISBG, \n                      http:\/\/newsroom.cisco.com\/release\/854754\/Cisco-Study-IT-Saying-Yes-To-BYOD"},{"key":"28_CR25","unstructured":"Department, U.S.: US Department of Health and Human Services. Health information privacy: breaches affecting 500 or more individuals (data set), \n                      http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/breachnotificationrule\/breachtool.html"},{"key":"28_CR26","unstructured":"Department, U.S.: US Department of Health and Human Services. Massachusetts provider settles HIPAA case for $1.5 million, \n                      http:\/\/www.hhs.gov\/news\/press\/2012pres\/09\/20120917a.html"},{"issue":"3","key":"28_CR27","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/15323269.2013.798768","volume":"13","author":"E.M. Jennifer","year":"2013","unstructured":"Jennifer, E.M.: Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage. Journal of Hospital Librarianship\u00a013(3), 197\u2013208 (2013), doi:10.1080\/15323269.2013.798768","journal-title":"Journal of Hospital Librarianship"},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1089\/tmj.2011.0180","volume":"18","author":"D. Luxton","year":"2012","unstructured":"Luxton, D., Kayl, R., Mishkind, M.: mHealth data security: the need for HIPAA compliant standardization. J Telemed E-Health\u00a018, 284\u2013288 (2012)","journal-title":"J Telemed E-Health"},{"key":"28_CR29","unstructured":"Campenhoudt, L.-V., Quivy, R.: Manual de Investiga\u00e7\u00e3o em Ci\u00eancias Sociais. Gradiva Publica\u00e7\u00f5es (2008) ISBN:9789726622758"}],"container-title":["Advances in Intelligent Systems and Computing","New Contributions in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16486-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T10:37:23Z","timestamp":1675852643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16486-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164854","9783319164861"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16486-1_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}