2014
DOI: 10.1016/j.ijinfomgt.2013.11.006
|View full text |Cite
|
Sign up to set email alerts
|

A framework of cloud-based virtual phones for secure intelligent information management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 6 publications
0
4
0
1
Order By: Relevance
“…The growing importance of virtual systems has resulted in the generation of research interests amongst practitioners and academics in various aspects of virtual systems including its usage, benefits and relevance of the system to individuals, businesses and the community. In this paper smart phones are selected as the focus of research because this device is increasingly emerging as a personal and business tool in terms of data management, email communication and internet access (Daponte, Vito, Picariello, & Riccio, 2013;Chappel & Paliwal, 2014;Zhang, Mao, Rau, Choe, Bela, & Wang, 2013;Ding, Chien, Hung, Lin, Kuo, Hsu, & Chung, 2013). The virtual device is a convergence of regular mobile phone, and personal digital assistants (PDA), and is positioned as a notebook computer (Chang, Chen & Zhou, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…The growing importance of virtual systems has resulted in the generation of research interests amongst practitioners and academics in various aspects of virtual systems including its usage, benefits and relevance of the system to individuals, businesses and the community. In this paper smart phones are selected as the focus of research because this device is increasingly emerging as a personal and business tool in terms of data management, email communication and internet access (Daponte, Vito, Picariello, & Riccio, 2013;Chappel & Paliwal, 2014;Zhang, Mao, Rau, Choe, Bela, & Wang, 2013;Ding, Chien, Hung, Lin, Kuo, Hsu, & Chung, 2013). The virtual device is a convergence of regular mobile phone, and personal digital assistants (PDA), and is positioned as a notebook computer (Chang, Chen & Zhou, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…BYOD and mobile applications involve security issues not only threatening their adoption and diffusion ( Balapour, Nikkhah, & Sabherwal, 2020 ) but also increasing the threats to organizational data, for several reasons. First, hyperconnected BYOD tools increase the complexity of network protection because they can connect to several types of networks (cellular networks, Wi-Fi, Bluetooth and NFC), ( Breitinger, Tully-Doyle, & Hassenfeldt, 2020 ; McLeod & Dolezel, 2018 ; Palanisamy et al, 2020 ) and to cloud computing resources, thereby increasing the risks ( Ding et al, 2014 ; Gupta, Seetharaman, & Raj, 2013 ; Lian, Yen, & Wang, 2014 ; Morrow, 2012 ; Sultan, 2014 ). Smartphones and tablets are increasingly connected to applications, storage or other digital services, resulting in greater risks ( Mustafa & Kar, 2019 ).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…In terms of connectivity, if the speed of Internet connections underwent dramatical acceleration, 1 the range of networks now includes hi-speed Wi-Fi, Bluetooth and NFC. 2 Elaborated applications can operate on personal devices, ranging from emails to critical business applications, such as CRM and ERPs ( Ding et al, 2014 ). In addition, access to cloud-based applications and storage has reinforced even more the variety and sophistication of applications.…”
Section: Introductionmentioning
confidence: 99%
“…Neste contexto, todas as informações devem estar armazenadas em ambientes de computação na nuvem, ou seja, em ambientes de informação remotos. O processo de validação de teorias e aplicações é bastante comum na área de gestão da informação (DING et al 2014;MAASS & VARSHNEY, 2012), sendo algo típico no método DSR (GREGOR, HEVNER, 2013), tendo em vista o seu caráter pragmático. O SI desenvolvido para demonstrar a GICVA consiste em um sistema de armazenamento de informações, baseado em dois contextos, quais sejam, o econômico-financeiro e o de saúde.…”
Section: Elementos Tecnológicosunclassified