𝔖 Scriptorium
✦   LIBER   ✦

📁

IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions

✍ Scribed by André Loske (auth.)


Publisher
Springer Vieweg
Year
2015
Tongue
English
Leaves
181
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates that even though the prevalence of IT security risk concerns in Cloud adoption is widely recognized, providers only pay very limited attention to the concerns expressed by customers, which not only causes serious disagreements with the customers but also considerably inhibits the adoption of the services.

✦ Table of Contents


Front Matter....Pages I-XXII
Introduction....Pages 1-13
Foundations....Pages 15-33
Part I: The Inhibiting Role of Unrealistic Optimism in Providers’ IT Security Risk Management....Pages 35-92
Part II: Perceptual Incongruences regarding the IT Security Risks as a Barrier to Cloud Adoption....Pages 93-118
Conclusion and Summary of Key Findings....Pages 119-131
Back Matter....Pages 133-167

✦ Subjects


Information Systems and Communication Service; Computer Systems Organization and Communication Networks; Data Structures, Cryptology and Information Theory


📜 SIMILAR VOLUMES


IT Security Risk Management: Perceived I
✍ Tobias Ackermann (auth.) 📂 Library 📅 2013 🏛 Gabler Verlag 🌐 English

<p>This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Addition

Managing Risk and Security in Outsourcin
✍ Frank Siepmann 📂 Library 📅 2013 🏛 Auerbach Publications 🌐 English

<P>With cloud computing quickly becoming a standard in today’s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments—requiring a change in how we evaluate risk and protect information, processes, and people.<BR><BR><STRONG>Managin

IT Security: Risking the Corporation
✍ Linda McCarthy 📂 Library 📅 2003 🏛 Prentice Hall 🌐 English

"Even the world's largest and most sophisticated networks are vulnerable to attack - and so is yours. The scenarios described in IT Security: Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software - as well as the vulnerability caused by poor training, cor

IT Security Risk Control Management: an
✍ Pompon, Raymond 📂 Library 📅 2016 🏛 Apress 🌐 English

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security

IT Security Risk Control Management: An
✍ Raymond Pompon 📂 Library 📅 2016 🏛 Apress 🌐 English

<p>This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals.  Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords.