淡江大學機構典藏:Item 987654321/110006
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62805/95882 (66%)
Visitors : 3881186      Online Users : 336
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/110006


    Title: Risk Management Strategies for the Use of Cloud Computing
    Authors: Fan, Chiang Ku;Chiang, Chen-Mei Fan;Kao, Tong Liang
    Keywords: Cloud computing;risk management;risk identification;risk evaluation;Delphi method;analytic network process
    Date: 2012-11-01
    Issue Date: 2017-03-17 02:10:33 (UTC+8)
    Publisher: Modern Education and Computer Science Publisher
    Abstract: Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic network process were employed to identify and evaluate risks of cloud computing. This research finds all solutions for "contract or agreements", "cross-cloud compatibility" and "social engineering" can only reduce the risks of recurrence (risk frequency) but not eliminate recurrences. In other words, risk is inevitable, but risks with severe consequences may be heavy burdens. Purchasing insurance, if possible, is also strongly recommended.
    Relation: International Journal of Computer Network and Information Security 12, pp.50-58
    DOI: 10.5815/ijcnis.2012.12.05
    Appears in Collections:[Graduate Institute & Department of Insurance Insurance] Journal Article

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML168View/Open
    Risk Management Strategies for the Use of Cloud Computing.pdf812KbAdobe PDF0View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback