淡江大學機構典藏:Item 987654321/110006
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 62805/95882 (66%)
造訪人次 : 3886912      線上人數 : 545
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/110006


    題名: Risk Management Strategies for the Use of Cloud Computing
    作者: Fan, Chiang Ku;Chiang, Chen-Mei Fan;Kao, Tong Liang
    關鍵詞: Cloud computing;risk management;risk identification;risk evaluation;Delphi method;analytic network process
    日期: 2012-11-01
    上傳時間: 2017-03-17 02:10:33 (UTC+8)
    出版者: Modern Education and Computer Science Publisher
    摘要: Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic network process were employed to identify and evaluate risks of cloud computing. This research finds all solutions for "contract or agreements", "cross-cloud compatibility" and "social engineering" can only reduce the risks of recurrence (risk frequency) but not eliminate recurrences. In other words, risk is inevitable, but risks with severe consequences may be heavy burdens. Purchasing insurance, if possible, is also strongly recommended.
    關聯: International Journal of Computer Network and Information Security 12, pp.50-58
    DOI: 10.5815/ijcnis.2012.12.05
    顯示於類別:[風險管理與保險學系] 期刊論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML168檢視/開啟
    Risk Management Strategies for the Use of Cloud Computing.pdf812KbAdobe PDF0檢視/開啟

    在機構典藏中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋