{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:45:38Z","timestamp":1730209538170,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/columbiancc.2016.7750785","type":"proceedings-article","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T21:37:57Z","timestamp":1480023477000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Strategies for minimizing the influence of the use of BYOD and Cloud in organizations: 4CM model"],"prefix":"10.1109","author":[{"given":"Fernando","family":"Moreira","sequence":"first","affiliation":[]},{"given":"Manuel Perez","family":"Cota","sequence":"additional","affiliation":[]},{"given":"Ramiro","family":"Goncalves","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.563802"},{"journal-title":"Research Methods in Anthropology Qualitative and Quantitative Approaches","year":"2006","author":"bernard","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/15323269.2013.798768"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.400"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.79"},{"journal-title":"Massachusetts provider settles HIPAA case for $1 5 million","year":"2012","key":"ref30"},{"journal-title":"Research Methods in Business Studies A Practical Guide","year":"2005","author":"ghauri","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_28"},{"journal-title":"Manual de Investiga&#x00E7;&#x00E3;o em Ci&#x00EA;ncias Sociais","year":"2008","author":"campenhoudt","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2011.0180"},{"journal-title":"2012 Data Breach Investigations Report","year":"0","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.914976"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"journal-title":"A NIST Definition of Cloud Computing","year":"2009","author":"mell","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-291v1"},{"key":"ref14","first-page":"70","article-title":"A Review Paper on Cloud Computing Security","volume":"4","author":"lokhande","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-5182-1.ch018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70007-7"},{"key":"ref17","first-page":"212","article-title":"Study on Cloud Computing and Security Approaches","volume":"3","author":"murugaboopathi","year":"2013","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing 3 0","year":"2011","key":"ref18"},{"journal-title":"Security Authorization-An Approach for Community Cloud Computing Environments","year":"0","author":"bryden","key":"ref19"},{"journal-title":"Health information privacy breaches affecting 500 or more individuals (data set)","year":"2012","key":"ref28"},{"key":"ref4","article-title":"Mobile's next great leap will happen in the cloud","author":"linthicum","year":"2014","journal-title":"Info World"},{"year":"0","key":"ref27"},{"journal-title":"Business Insider","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70031-3"},{"key":"ref29","article-title":"Health breaches: 20.8 million affected","author":"mcgee","year":"2012","journal-title":"Health Info Security"},{"key":"ref5","article-title":"The mobile spy in your pocket","author":"knorr","year":"2014","journal-title":"Infoworld"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70013-2"},{"journal-title":"Cisco ConnectedWorld Technology Report","year":"2011","key":"ref7"},{"journal-title":"Communities Dominate Brands","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70064-8"},{"journal-title":"A Roadmap for Advanced Cloud Technologies under H2020","year":"0","author":"schubert","key":"ref1"},{"journal-title":"The Dark Side of the Cloud IBM Partner Gives Folks Two Weeks to Move Data","year":"0","author":"finley","key":"ref20"},{"key":"ref22","article-title":"Cloud Computing: Security and Reliability Issues","volume":"2013","author":"ahamed","year":"0","journal-title":"Communications of the IBIMA"},{"journal-title":"Controlling Data in the Cloud Outsourcing Computation Without Outsourcing Control","year":"0","author":"chow","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/404328"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"journal-title":"How to rethink security for the new world of IT","year":"2014","author":"mathaisel","key":"ref41"},{"journal-title":"The Top Cyber Security Risks","year":"2009","key":"ref23"},{"journal-title":"What's New about Cloud Computing Security?","year":"2010","author":"chen","key":"ref26"},{"journal-title":"2nd annual mobile technology survey","year":"2012","key":"ref43"},{"journal-title":"OWASP Top 10 Risks","year":"2013","key":"ref25"}],"event":{"name":"2016 IEEE 11th Colombian Computing Conference (CCC)","start":{"date-parts":[[2016,9,27]]},"location":"Popayan, Colombia","end":{"date-parts":[[2016,9,30]]}},"container-title":["2016 IEEE 11th Colombian Computing Conference (CCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7738290\/7750764\/07750785.pdf?arnumber=7750785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:20:29Z","timestamp":1483622429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7750785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/columbiancc.2016.7750785","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}