<p><p>This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many ca
IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing
β Scribed by Tobias Ackermann (auth.)
- Publisher
- Gabler Verlag
- Year
- 2013
- Tongue
- English
- Leaves
- 206
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives' Cloud Computing adoption decisions are examined. The bookβs second part presents a mathematical risk quantification framework that can be used to support the IT risk management process of Cloud Computing users. The results support the risk management processes of (potential) adopters, and enable providers to develop targeted strategies to mitigate risks perceived as crucial.β
β¦ Table of Contents
Front Matter....Pages 1-1
Introduction....Pages 1-10
Foundations....Pages 11-25
Evaluation of Perceived IT Security Risks....Pages 27-84
Risk Quantification Framework....Pages 85-125
Recommended Actions....Pages 127-140
Limitations, Summary, and Prospect....Pages 141-149
Back Matter....Pages 8-8
β¦ Subjects
Business Information Systems
π SIMILAR VOLUMES
<P>With cloud computing quickly becoming a standard in todayβs IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environmentsβrequiring a change in how we evaluate risk and protect information, processes, and people.<BR><BR><STRONG>Managin
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential