Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference63 articles.
1. Alassafi MO, Alharthi A, Alenezi A, Walters RJ, Wills GB (2016) Investigating the security factors in cloud computing adoption: towards developing an integrated framework. J Internet Technol Secur Trans (JITST) 5(2):486–494
2. Winkler V (2009) Securing the cloud: cloud computer security techniques and tactics. Elsevier
3. Alhussain T, AlGhamdi R, Alkhalaf S, Alfarraj O (2013) Users’ perceptions of mobile phone security: a survey study in the Kingdom of Saudi Arabia. Int J Comput Theory Eng 5(5):793–793
4. Alassafi MO, Hussain RK, Ghashgari G, Walters RJ, Wills GB (2017) Security in organisations: governance, risks and vulnerabilities in moving to the cloud. In: International workshop on enterprise security. Springer, Cham, pp 241–258.
https://doi.org/10.1007/978-3-319-54380-2_11
5. Alkhater N, Wills G, Walters R (2014) Factors Influencing an organisation’s intention to adopt cloud computing in Saudi Arabia. In: 2014 IEEE 6th international conference on cloud computing technology and science. IEEE, pp 1040–1044
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献