P Erceived It S Ecurity R Isks of C Loud

نویسندگان

  • Tobias Ackermann
  • Thomas Widjaja
  • Alexander Benlian
  • Peter Buxmann
چکیده

Despite increasing interest in IT outsourcing (ITO) and the various benefits it promises, Cloud Computing (CC) as the currently most prevalent ITO paradigm still entails serious IT security risks. Little attention has been paid so far to fully and unambiguously capture the complex nature of IT security risks and how to measure it. Against this backdrop, we first propose a comprehensive conceptualization of Perceived IT Security Risks (PITSR) in the CC context that is based on six distinct risk dimensions grounded on an extensive literature review, Q-sorting, and expert interviews. Second, a multiple-indicators and multiple-causes analysis of data collected from 356 organizations is found to support the proposed conceptualization as a second-order aggregate construct. The results of our study contribute to IT security and ITO research, help (potential) adopters to assess risks, and enable CC providers to develop targeted strategies to mitigate risks perceived as crucial.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

S Ecurity F or S Oftware - D Efined ( C Loud , Sdn and Nfv ) I Nfrastructures – I Ssues and C Hallenges

Cloud computing has transformed a large portion of the IT industry through its ability to provision infrastructure resources – computing, networking, storage, and software as services. Software-Defined Networking (SDN) has transformed the physical underlying network infrastructure into programmable and virtualized networks. Network Functions Virtualization (NFV) has transformed physical telecom...

متن کامل

Evidence-based strategies to build community food security.

S S r a s s c u e p t c i ver the past decade, various entities within the United States (15), Canada (6,7), and Europe (6,8) ave applied a food systems approach o build community food security. This pproach to building community food ecurity requires an understanding of ow communities interact with reources in their social and physical enironments over extended periods of ime. It also uses str...

متن کامل

T HE I MPACT OF S ECURITY P RACTICES ON R EGULATORY C OMPLIANCE AND S ECURITY P ERFORMANCE 1 Research - in - Progress

This study examines how a healthcare organization’s security practices (including IT controls, policies, education, and hiring practices) influence their perceived regulatory compliance and security performance. We utilized qualitative and quantitative survey data provided by senior IT managers from 250 healthcare organizations. The data provides a snapshot of patient information security in th...

متن کامل

Amitraz Poisoning; A case study

A m i t r a z, a n i ns e c t i c i d e /a ca ri c i de of the f o r m a m i d i n e p e st i c i d e s group, is a ? 2 a d r e n e r g i c ag on i st a nd of t he a m i d i ne c h e m i ca l f a m il y generally us e d to c o n t r ol animal e c top a r a s i t e s. Poisoning due to am i t r a z i s r a r e and character...

متن کامل

Gb1508+5714: a Radio-loud Quasar with Z=4.30 and the Space Density of High Redshift, Radio{loud Quasars

We report the discovery of a radio loud quasar with a redshift of 4.30. This object, which is the rst radio selected quasar with a redshift greater than four, was discovered during an observational investigation into the evolution of the luminosity function of radio loud quasars. Here we describe results based on a sample of 300, at spectrum radio sources with S 5GHz >200mJy. In this study, rat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012