Download IT Security Risk Management in the Context of Cloud by André Loske PDF

By André Loske

This paintings provides a brand new viewpoint to the circulation of organizational IT safeguard probability administration literature, person who sheds mild at the value of IT defense danger perceptions. in accordance with a large-scale empirical research of Cloud companies situated in North the US, the research finds that during many instances, the companies’ selection makers considerably underestimate their providers’ IT protection danger publicity, which inhibits the implementation of beneficial safeguarding measures. The paintings additionally demonstrates that even supposing the superiority of IT safeguard danger issues in Cloud adoption is widely known, services simply pay very restricted cognizance to the worries expressed through buyers, which not just motives severe disagreements with the purchasers but additionally significantly inhibits the adoption of the services.

Show description

Read Online or Download IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions PDF

Best information theory books

Information theory: structural models for qualitative data

Krippendorff introduces social scientists to info conception and explains its software for structural modeling. He discusses key issues reminiscent of: find out how to make sure a knowledge conception version; its use in exploratory learn; and the way it compares with different ways reminiscent of community research, course research, chi sq. and research of variance.

Ours To Hack and To Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet

The on-demand financial system is reversing the rights and protections staff fought for hundreds of years to win. usual net clients, in the meantime, continue little keep watch over over their own information. whereas promising to be the nice equalizers, on-line systems have frequently exacerbated social inequalities. Can the net be owned and ruled another way?

Additional resources for IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions

Example text

In particular, we demonstrate the inhibiting effects of unrealistic optimism (UO) in the ITSR perceptions of Cloud providers’ decision makers on the outcome of the providers’ IT security risk management. 1). In this section, we also show the development of the proposed theoretical model of Cloud providers’ IT security risk management. 2), including the proposed approaches to measure UO in the ITSR perceptions of providers’ decision makers. 3). 4). 1 Theoretical Background and Hypotheses Development In this section, we describe the theoretical backgrounds and the development of the comprehensive framework of Cloud providers’ IT security risk management processes, which is based on an infusion of four distinct but related streams of literature and explicates the effects of the subjective risk and coping perceptions of the providers’ decision makers.

The expectation of less associated with the purchase of a product) (Cunningham 1967). , Hammitt 1990; Peter and Ryan 1976; Srinivasan and Ratchford 1991). 2. , Peter and Ryan 1976). Therefore, it has been revealed by various studies at the individual level that the perception of risks strongly determines the formation of adoption intentions and downstream beliefs (Ajzen and Fishbein 1980; Mitchell 1999; Murray and Schlacter 1990). , Gewald and Dibbern 2009; Rotchanakitumnuai and Speece 2003).

2010). Nevertheless, as the members of the group concentrate their resources and share the same infrastructure, the costs of the IT capability provision are oftentimes considerably lower, in comparison with the internal data processing centers of the organizations (Armbrust et al. 2010). 20 2. , private, public, or community Clouds), which are bound together by standardized or proprietary technology that enables data and application portability (Mell and Grance 2011). This combination enables to combine the benefits of the Private Cloud with those of the Public Cloud, for example, by offering data isolation, high availability, and load balancing at the same time (Buyya et al.

Download PDF sample

Rated 4.99 of 5 – based on 38 votes