淡江大學機構典藏:Item 987654321/93926
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62805/95882 (66%)
Visitors : 3954357      Online Users : 571
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/93926


    Title: Risk management and insurance strategy for utilizing cloud computing services
    Other Titles: 雲端風險管理與保險規劃之研究
    Authors: 郭仁杰;Guo, Ren-Jie
    Contributors: 淡江大學保險學系保險經營碩士班
    高棟梁;Kao, Tong-Liang
    Keywords: 雲端運算;風險管理;德菲法;網路層級分析法;Cloud Computing;Risk management;Delphi study;Analysis Network Process method
    Date: 2013
    Issue Date: 2014-01-23 13:41:12 (UTC+8)
    Abstract: 近年來,在科技及電子設備的快速進步下,傳統電腦設備已無法滿足人們快速成長的服務需求,因而促成雲端服務的崛起。雲端服務具有許多足以取代傳統設備的優點,尤其是以網路即可迅速取得高效率的服務,且以pay-as-you-go的計費方式也有助於企業節省支出,使其在全球廣為發展且漸受人們重視。

    然而,雲端服務仍隱含著數種不同的潛在風險,例如:個人資料的隱私、儲存伺服器的中斷或機密資料遭駭客盜取等等。但目前各國並無專門為雲端服務所設計的保單,能夠完全承保所有的雲端風險,僅能以網路安全險(Network security coverage)或資訊業專業責任保險(Technology professional liability)去做部份承保。因此,本研究之目的為辨識及評估各種雲端服務的潛在風險,以提供企業決策者在風險管理時必要的資訊,並做出最適之風險管理計劃之建議。

    本研究之第一階段會使用德菲法(Delphi Method),透過專家訪談去辨別出雲端服務之潛在風險,並依此做為風險評估之架構;第二階段則是以網路層級分析法(Analysis Network Process method)去辨別出雲端風險在損失頻率與損失幅度上的相對權重;第三階段會依前述得到之損失頻率與幅度,將各雲端風險列在風險管理矩陣中,以方便找出個別雲端風險最合適之應對方法;最後階段則是以歐美地區的專家訪談及保單資料彙整,找出目前此類保單對各雲端風險的承保狀況,並理解現行保單所能提供的保障與企業實際需求之間是否有保障缺口(Gap),及是否能透過保單來處理該雲端風險。

    透過上述方法,我們將11種雲端風險分類到風險矩陣之四個象限後,就能依各象限的損失幅度與頻率找出相應的風險管理方法;另外,透過歐美專家訪談與保單整理之結果,亦能將各風險的實際承保狀況分為高度承保(Highly Insurable)與極少承保(Rarely Insurable)兩種,最終會綜合風險矩陣和承保狀況來彙總判斷各雲端風險最適合之風險管理方法。
    Cloud computing is not only a brand-new conception of information technology, but also a service that can improve people’s life obviously. Enterprises can acquire the cloud services they need directly by internet. The system using pay-as-you-go as payment method also has advantage on both cost-efficiency and flexibility for cloud service users. Therefore, it seems an unavoidable trend that traditional computer facilities will be replaced by cloud computing recently. Cloud services may help the enterprise in many ways, but it also inevitably triggers some loss exposure.

    Unfortunately, there is little objective scientific research focused on identifying and evaluating the loss exposures that result from cloud computing. The major research objective is to identify the loss exposures of cloud computing services using scientific and objective methods, and measure loss exposures with regard to the application of cloud computing. Furthermore, using our finding to suggest essential risk management strategies that can be employed to control or reduce losses attributable to the application of cloud computing.
    In order to reach research’s purposes, the major employed methods are Delphi study, Analysis Network Process method (ANP), and expert interview. This study, first of all, conduct Delphi study and ANP method to identify the potential cloud risks and to find the relative weigh of each risk. Second, by locating the identified loss exposures in the risk management matrix, this research develop appropriate treatments to the risks of cloud computing. Finally, by interview the underwriters of insurance companies in U.S.A and Europe and comparing the identified risks of cloud computing, this study can find the gap between coverage providing and coverage needs. Combining those results, the findings of this study can help the enterprises or cloud users to manage those risks, and offer the insurers sufficient information to design a cloud policy.
    Appears in Collections:[Graduate Institute & Department of Insurance Insurance] Thesis

    Files in This Item:

    File SizeFormat
    index.html0KbHTML380View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback