Arpaci, 2016 - Google Patents
Understanding and predicting students' intention to use mobile cloud storage servicesArpaci, 2016
View PDF- Document ID
- 10816065649288660561
- Author
- Arpaci I
- Publication year
- Publication venue
- Computers in Human Behavior
External Links
Snippet
The challenges of mobile devices such as limited bandwidth, computing, and storage have led manufacturers and service providers to develop new value-added mobile services. To address these limitations, mobile cloud computing, which offers on-demand services …
- 238000005516 engineering process 0 abstract description 13
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arpaci | Understanding and predicting students' intention to use mobile cloud storage services | |
Almaiah et al. | Investigating the main determinants of mobile cloud computing adoption in university campus | |
Yimam et al. | A survey of compliance issues in cloud computing | |
Hu et al. | Detecting and resolving privacy conflicts for collaborative data sharing in online social networks | |
Jones et al. | A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation | |
US10242232B1 (en) | Adaptive model for database security and processing | |
Wirtz et al. | Cyberterrorism and cyber attacks in the public sector: How public administration copes with digital threats | |
Anthony Jnr | Exploring data driven initiatives for smart city development: empirical evidence from techno-stakeholders’ perspective | |
Tancock et al. | A privacy impact assessment tool for cloud computing | |
US20230153447A1 (en) | Automatic generation of security labels to apply encryption | |
Alnemr et al. | A data protection impact assessment methodology for cloud | |
Guo et al. | Cloud computing for healthcare research information sharing | |
Tazi et al. | Sok: Evaluating privacy and security vulnerabilities of patients’ data in healthcare | |
US9426163B2 (en) | Collaboration space with event-trigger configuration views | |
Ghazinour et al. | A model to protect sharing sensitive information in smart watches | |
Govindarajan et al. | Forecasting cyber security threats landscape and associated technical trends in telehealth using bidirectional encoder representations from Transformers (Bert) | |
Macharia | Cloud computing risk: a decision-making framework | |
Tawfique et al. | Decision to migrate to the Cloud: A focus on security from the consumer perspective | |
Wellstead | Trusting datification through labification | |
Pigola et al. | Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats | |
Houser et al. | Formal Mental Models for Human-Centered Cybersecurity | |
Sanga et al. | Applying Kolb learning experiential theory with cloud computing in higher education institutions: Tanzania | |
Osei-Bryson et al. | Special issue on cyber-security for development | |
Georgiou et al. | Security and Privacy Issues for Intelligent Cloud-Based Health Systems | |
Reid | Improving HIPAA Compliance Efforts with Modern Cloud Technologies |