Risk Evaluation Using Nominal Group Technique for Cloud Computing Risk Assessment in Healthcare

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the nominal group technique to involve young people in an evidence synthesis which explored ‘risk’ in inpatient mental healthcare

PLAIN LANGUAGE SUMMARY We conducted a review of research on the topic of 'risk' in hospital based mental health care for young people aged 11-18. We wanted to include a contribution from young people alongside other stakeholders with expertise to guide the research team in decisions made setting parameters for the review. To achieve this, we held a stakeholder group meeting. We used the nominal...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Educational Motivation Improvement Strategies for Postgraduate Students: Nominal Group Technique

Introduction: One of the most important factors in studentschr('39') learning process is academic motivation that can affect different aspects of studentschr('39') performance in educational environments and directly affects their academic success. Motivation is also considered as the key to learnerschr('39') learning. The main goal of this study is to provide ways to increase educational motiv...

متن کامل

A Research for Cloud Computing Security Risk Assessment

In order to solve the problem of the complexity of the process and the accuracy of evaluation results in cloud computing security risk assessment, the hierarchical holographic modeling method is applied to cloud computing risk identification phase, so as to clearly capture the cloud computing risk factors through a comprehensive analysis of cloud computing security domains. Moreover, with cloud...

متن کامل

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Advanced Science, Engineering and Information Technology

سال: 2020

ISSN: 2460-6952,2088-5334

DOI: 10.18517/ijaseit.10.1.10169