scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy and consumer risks in cloud computing

Dan Jerker B. Svantesson, +1 more
- 01 Jul 2010 - 
- Vol. 26, Iss: 4, pp 391-397
TLDR
In this article, the privacy and consumer risks that are associated with cloud computing are examined.
About
This article is published in Computer Law & Security Review.The article was published on 2010-07-01 and is currently open access. It has received 211 citations till now. The article focuses on the topics: Information privacy & Privacy software.

read more

Citations
More filters
Proceedings Article

A Privacy-Security Model of Mobile Cloud Computing Applications

TL;DR: Predictors of individuals’ decisions to disclose personal information to MCC apps are studied and a privacy-security model is proposed and the surprising relationships between perceived security, privacy policy, and perceived usefulness are suggested.

Using Cloud Computing Service: A Perspective from Users’ Information Security, Privacy Concern, and Trust

TL;DR: This paper addresses the information security, privacy concern, and trust issues in using Cloud Computing service from end users’ perspective from Theory of Reasoned Action and ethical contract based theory.

Cloud-based solutions for supply chain management: a post-adoption study

TL;DR: The authors examines the post-adoption stage of cloud supply chain solutions from the decision science perspective and intends to provide organizations with practical guidance on how to ensure the efficiency of a Cloud supply chain system and control risks associated with cloud-based solutions.
Book ChapterDOI

Cloud Computing Adoption in Higher Education: An Integrated Theoretical Model

TL;DR: In this article, the authors developed an integrated theoretical model to explore the factors affecting cloud computing adoption at higher education institutions (HEIs) based on the integration of four well-established models, including the technology-organizational-environmental (TOE) framework, the fit viability model (FVM), the diffusion of innovations (DOI), and the institutional theory (INST) The partial least squares-structural equation modeling (PLS-SEM) approach is used to validate the developed model based on survey data collected from 205 academics and IT staff.
Journal ArticleDOI

Information disclosure willingness and mobile cloud computing collaboration apps: the impact of security and assurance mechanisms

TL;DR: Why users disclose information to MCC apps despite privacy concerns is investigated and the effect of security and assurance mechanisms on users’ perceptions and information disclosure is examined to enhance the generalizability and robustness of findings.
Related Papers (5)
Frequently Asked Questions (6)
Q1. What are the contributions mentioned in the paper "Privacy and consumer risks in cloud computing" ?

In this paper, Clarke et al. adopt the definition devised by the second author in an earlier paper and define cloud computing as a service that satisfies all of the following conditions: 1 ) The service is delivered over a telecommunications network ; 2 ) Users rely on the service for access to and/or processing of data ; 3 ) The data is under the legal control of the user ; 4 ) Some of the resources on which the service depends are virtualized, which means that the user has no technical need to be aware which server running on which host is delivering the service, nor 

8The starting point of any privacy discussion regarding cloud computing must be the realisation that several forms of cloud computing are in their infancy. 

While the legal issues facing cloud operators and cloud users stem from the fact that personal data is transferred across jurisdictional borders, applicable privacy regulation typically draws a line between data being transferred within an organisation, and data being transferred between organisations. 

To assess whether the company could do so, it would need to know in which country, or countries, its data would be stored – it would need to know the location of the cloud. 

If they fail to earn the trust of their customers by adopting clear and transparent policies on how their customers’ data will be used, stored, and protected, governments will come under increasing pressure to regulate privacy in the Cloud. 

organisations, businesses and individuals interested in utilising cloud computing products must ensure they are aware of the privacy and security risks associated with using the product and take those risks into account when deciding whether to use it.