Risk perception and risk management in cloud computing: Results from a case study of Swiss companies
Nathalie Brender,Iliya Markov +1 more
Reads0
Chats0
TLDR
This article elaborates on the most important risks inherent to the cloud such as information security, regulatory compliance, data location, investigative support, provider lock-in and disaster recovery.About:
This article is published in International Journal of Information Management.The article was published on 2013-10-01 and is currently open access. It has received 176 citations till now. The article focuses on the topics: Cloud computing security & Cloud computing.read more
Citations
More filters
Journal ArticleDOI
Mobile cloud computing
TL;DR: This paper provides an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud Computing, and presents a taxonomy based on the key issues in this area, and discusses the different approaches taken to tackle these issues.
Journal ArticleDOI
Examining cloud computing adoption intention, pricing mechanism, and deployment model
TL;DR: This study uses the technology–organization–environment (TOE) framework of innovation diffusion theory to develop a cloud service adoption model that deals with not only adoption intention, but also pricing mechanisms and deployment models.
Journal ArticleDOI
Technological, organisational and environmental factors influencing managers’ decision to adopt cloud computing in the UK
TL;DR: Four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK and those key factors include competitive pressure, complexity, technology readiness and trading partner pressure.
Journal ArticleDOI
Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computing
Stephan Schneider,Ali Sunyaev +1 more
TL;DR: The results indicate that CC researchers should draw from research on ITO decision making but re-examine ITO concepts in the light of the peculiarities of CC, such as the differences between software and infrastructure services, the self-service procurement of cloud services, or the evolving role of IT departments.
Journal ArticleDOI
Predicting e-readiness at firm-level: An analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms
TL;DR: This paper is one of the early studies that predict dimensions of technology readiness index (TRI) through the determinants of technology-organization-environment (TOE) framework and among the first attempts to link prominent technology adoption models to e-maintenance technology as a novel form of enterprise innovations.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Book
Risk and Culture: An Essay on the Selection of Technological and Environmental Dangers
Mary Douglas,Aaron Wildavsky +1 more
Journal ArticleDOI
Cloud computing for education: A new dawn?
TL;DR: It is argued in this article that cloud computing is likely to be one of those opportunities sought by the cash-strapped educational establishments in these difficult times and could prove to be of immense benefit (and empowering in some situations) to them due to its flexibility and pay-as-you-go cost structure.
Book ChapterDOI
Cloud Computing: Benefits, Risks and Recommendations for Information Security
TL;DR: The presentation “Cloud Computing: Benefits, risks and recommendations for information security” will cover some the most relevant information security implications of cloud computing from the technical, policy and legal perspective.
Journal ArticleDOI
Data Security in the World of Cloud Computing
TL;DR: To ensure that decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.