Manager Journal
    Facebook Twitter Instagram
    Manager Journal Manager Journal
    • Home
    • Archive
      • 2025
        • 2025, Vol. 41, Issue 1, May
        • 2025, Vol. 42, Issue 2, December
      • 2024
        • 2024, Vol. 39, Issue 1, May
        • 2024, Vol. 40, Issue 2, December
      • 2023
        • 2023, Vol. 37, Issue 1, May
        • 2023, Vol. 38, Issue 2, December
      • 2022
        • 2022, Vol. 35, Issue 1, May
        • 2022, Vol. 36, Issue 2, December
      • 2021
        • 2021, Vol. 33, Issue 1, May
        • 2021, Vol. 34, Issue 2, December
      • 2020
        • 2020, Vol. 31, Issue 1, May
        • 2020, Vol. 32, Issue 2, December
      • 2005-2019
        • 2019
          • 2019, Vol. 29, Issue 1, May
          • 2019, Vol. 30, Issue 2, December
        • 2018
          • 2018, Vol. 27, Issue 1, May
          • 2018, Vol. 28, Issue 2, December
        • 2017
          • 2017, Vol. 25, Issue 1, May
          • 2017, Vol. 26, Issue 2, December
        • 2016
          • 2016, Vol. 23, Issue 1, May
          • 2016, Vol. 24, Issue 2, December
        • 2015
          • 2015, Vol. 21, Issue 1, May
          • 2015, Vol. 22, Issue 2, December
        • 2014
          • 2014, Vol. 19, Issue 1, May
          • 2014, Vol. 20, Issue 2, December
    • Our Authors
    • Journal Information
      • Authors Guidelines
      • Open Acces
      • Indexing
      • Aims and scope
      • Editorial Board
      • Activity Report
    • Submit a manuscript
    Manager Journal
    Home»2015»Mobile Connectivity and Security Issues for Cloud Informatic Systems
    2015

    Mobile Connectivity and Security Issues for Cloud Informatic Systems

    Cosmin Cătălin OlteanuBy Cosmin Cătălin OlteanuApril 28, 2021Updated:November 1, 2021No Comments1 Min Read

     Pages: 199-203

    Introduction. If we walk on the street, or just if we go to the mall, we will see that every one of us is addicted to technology and mobile devices. Today, a mobile phone, called smartphone is more than just a device we use. These devices are now more often, called personal companion. On these devices we have a lot of personal information and many more.

    Aim of the study. The main purpose of the paper is to illustrate the importance of new software tools that can be used with mobile devices to make them more secure for the use of day to day business software. Many companies are using mobile applications to access some components to ERP’s or CRM’s remotely. Even the new come, cloud Informatic Systems are using more remote devices than ever. This is why we need to secure somehow these mobile applications.

    Keywords: secure mobile applications, security of mobile devices, ERP’s and CRM’s mobile components security

    Full text sources
    ERP’s and CRM’s mobile components security secure mobile applications security of mobile devices
    Cosmin Cătălin Olteanu

    Related Posts

    Leadership and New Technologies. New Security Issues for Management of Internet Connectivity and Remote Control in Automotive Industry

    April 28, 2021

    Leadership vs. Management From Competitive Intelligence Perspective

    April 28, 2021

    Cognitive Evolution and Revolution

    April 28, 2021

    Tangible and Intangible Within The Organization’s Potential

    April 28, 2021
    Add A Comment

    Leave A Reply Cancel Reply

    Recent Posts
    • Fiscal Challenges in Public Debt Management – a Romanian Perspective
    • Ethical Marketing In The Ai Era – A Strategic Necessity For Modern Companies
    • Review of Informality and Housing using Science Mapping Review Methodology: A Bibliometric Analysis.
    • Cultural effects over turnover intentions
    • Bank Digitalization And Challenges Of Implemented Central Bank Digital Currencies (Cbdcs)
    Recent Comments

      Type above and press Enter to search. Press Esc to cancel.