<p>This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Addition
IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions
✍ Scribed by André Loske (auth.)
- Publisher
- Springer Vieweg
- Year
- 2015
- Tongue
- English
- Leaves
- 181
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates that even though the prevalence of IT security risk concerns in Cloud adoption is widely recognized, providers only pay very limited attention to the concerns expressed by customers, which not only causes serious disagreements with the customers but also considerably inhibits the adoption of the services.
✦ Table of Contents
Front Matter....Pages I-XXII
Introduction....Pages 1-13
Foundations....Pages 15-33
Part I: The Inhibiting Role of Unrealistic Optimism in Providers’ IT Security Risk Management....Pages 35-92
Part II: Perceptual Incongruences regarding the IT Security Risks as a Barrier to Cloud Adoption....Pages 93-118
Conclusion and Summary of Key Findings....Pages 119-131
Back Matter....Pages 133-167
✦ Subjects
Information Systems and Communication Service; Computer Systems Organization and Communication Networks; Data Structures, Cryptology and Information Theory
📜 SIMILAR VOLUMES
<P>With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.<BR><BR><STRONG>Managin
"Even the world's largest and most sophisticated networks are vulnerable to attack - and so is yours. The scenarios described in IT Security: Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software - as well as the vulnerability caused by poor training, cor
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security
<p>This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords.