A. Behl and K. Behl, An analysis of cloud computing security issues, 2012 World Congress on Information and Communication Technologies, pp.109-114, 2012.

J. W. Creswell, Research design : qualitative, quantitative, and mixed methods approaches

A. N. Duc, R. Jabangwe, P. Paul, and P. Abrahamsson, Security Challenges in IoT Development: A Software Engineering Perspective, Proceedings of the XP2017 Scientific Workshops. pp. 11:1-11:5. XP '17, 2017.

M. Felderer, M. Bchler, M. Johns, A. D. Brucker, R. Breu et al., Chapter One -Security Testing: A Survey, Advances in Computers, vol.101, pp.1-51, 2016.

,

S. Furnell, Handheld hazards: The rise of malware on mobile devices, Computer Fraud & Security, issue.5, pp.70210-70214, 2005.

A. Gandomi and M. Haider, Beyond the hype: Big data concepts, methods, and analytics, vol.35, pp.137-144

T. Hess, C. Matt, A. Benlian, and F. Wiesbck, Options for formulating a digital transformation strategy 15/2, pp.123-139

, InfoQ: Guide to digital transformation. define, price, and plan a digital transformation

, ISACA: State of Cybersecurity: Implications for 2016 -An ISACA and RSA Conference Survey, 2016.

G. C. Kane, D. Palmer, A. N. Phillips, D. Kiron, and N. Buckley, Strategy, not technology, drives digital transformation, 2015.

F. Koushanfar, A. Sadeghi, and H. Seudie, EDA for secure and dependable cybercars: Challenges and opportunities, DAC Design Automation Conference, pp.220-228, 2012.

D. Laney, 3d data management: Controlling data volume, velocity, and variety | BibSonomy

C. Lankshear and M. Knobel, Digital Literacies: concepts, policies and practices, vol.30

C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang et al., MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud, IEEE Transactions on Computers, vol.64, issue.9, pp.2609-2622, 2015.

Y. Masuda, S. Shirasaka, S. Yamamoto, and T. Hardjono, Risk management for digital transformation in architecture board: A case study on global enterprise, 2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI), pp.255-262

C. Matt, T. Hess, and A. Benlian, Digital transformation strategies, vol.57, pp.339-343

G. Mcgraw and B. Potter, Software Security Testing, IEEE Security and Privacy, vol.2, issue.5, pp.81-85, 2004.

I. Mohamed and D. Patel, Android vs iOS security: A comparative study, 12th International Conference on Information Technology -New Generations, pp.725-730, 2015.

B. Morel, Artificial Intelligence and the Future of Cybersecurity, Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp.93-98, 2011.

H. Muccini, A. D. Francesco, and P. Esposito, Software testing of mobile applications: Challenges and future research directions, 2012 7th International Workshop on Automation of Software Test (AST), pp.29-35, 2012.

,

A. Nguyen-duc, K. Khalid, S. Shahid-bajwa, and T. Lnnestad, Minimum viable products for internet of things applications: Common pitfalls and practices, vol.11, p.50

J. Oberheide and F. Jahanian, When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. pp. 43-48. HotMobile '10, 2010.

,

L. Okman, N. Gal-oz, Y. Gonen, E. Gudes, and J. Abramov, Security Issues in NoSQL Databases, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.541-547, 2011.

C. Okoli, A guide to conducting a standalone systematic literature review, vol.37
URL : https://hal.archives-ouvertes.fr/hal-01574600

N. Penning, M. Hoffman, J. Nikolai, and Y. Wang, Mobile malware security challeges and cloud-based detection, 2014 International Conference on Collaboration Technologies and Systems (CTS). pp, pp.181-188, 2014.

G. Petracca, Y. Sun, T. Jaeger, and A. Atamli, AuDroid: Preventing attacks on audio channels in mobile devices, Proceedings of the 31st Annual Computer Security Applications Conference, pp.181-190, 2015.

M. L. Polla, F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices, IEEE Communications Surveys Tutorials, vol.15, issue.1, pp.446-471, 2013.

, Ponemon: Cost of a Data Breach Study: Global overview, Tech. rep., IBM, 2018.

K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, vol.16, issue.1, pp.69-73, 2012.

M. Rostami, F. Koushanfar, and R. Karri, A Primer on Hardware Security: Models, Methods, and Metrics. Proceedings of the IEEE, vol.102, pp.1283-1295, 2014.

A. Sadeghi, C. Wachsmann, and M. Waidner, Security and privacy challenges in industrial Internet of Things, 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp.1-6, 2015.

S. Sagiroglu and D. Sinanc, Big data: A review, 2013 International Conference on Collaboration Technologies and Systems (CTS), pp.42-47

(. Sharing and L. L. Llis), FIPS Pub 199: Standards for Security Categorization of Federal Information and Information Systems, 2004.

J. Singer, S. E. Sim, and T. C. Lethbridge, Software engineering data collection for field studies, Guide to Advanced Empirical Software Engineering, pp.9-34

X. Sun and C. Wang, The Research of Security Technology in the Internet of Things, Advances in Computer Science, Intelligent System and Environment, pp.113-119, 2011.

C. S. Teoh and A. K. Mahmood, National cyber security strategies for digital economy, 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp.1-6

D. S. Terzi, R. Terzi, and S. Sagiroglu, A survey on security and privacy issues in big data, 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp.202-207, 2015.

N. Welch and D. B. Kruschwitz, Embracing digital technology

J. Wu, L. Ping, X. Ge, Y. Wang, and J. Fu, Cloud Storage as the Infrastructure of Cloud Computing, 2010 International Conference on Intelligent Computing and Cognitive Informatics, pp.380-383, 2010.

,