Article

Don't cloud your compliance data

Authors:
To read the full-text of this research, you can request a copy directly from the author.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Cloud computing can bring an increased number of benefits to an educational setting (Behrend, Wiebe, London and Johnson, 2011). Enterprises are starting to look into cloud computing technology as a way to cut down on cost and increase profitability (Brandl, 2010). Cloud minimizes institutional expenditures on software and hardware infrastructures. ...
Full-text available
Article
Security remains a major challenge to most emerging technologies (ETs). Although, emerging technologies offer potential benefits which ease systems and human activities, but they also have some security issues that often affect their adoption and usage. Cloud technology has brought a lot of transformations to data storage for both individuals and organizations. Cloud offers flexibility for data storage, access and recovery, but it is not immune to the security challenges associated with other ETs. There have been concerns about data integrity and privacy of cloud customers. Outsourcing data in the cloud exposes the data to several kinds of attacks ranging from data leakage, data tampering, repudiation, Denial of Service (DOS) attack, spoofing identity, and unauthorized access to data. These attacks are often orchestrated by insiders and outsiders, and can compromise the confidentiality and integrity of cloud data. Most educational institutions are digitalizing their data which are ultimately moved to the cloud to be managed by a third party. Considering the sacred nature of educational data, the study examines the implications of cloud security challenges on education. The findings show that security is very significant to the successful migration and implementation of cloud technology in the educational sector. It also shows that the growing security limitations associated with cloud computing technology has the tendency to discourage many educational institutions from adopting cloud services. Therefore, there is need for all stakeholders particularly the cloud vendors to continuously upgrade cloud security system in order to effectively counter both existing and emerging cloud threats. This would go a long way to preserve the integrity and privacy of customers; increase clients‟ trust and patronage, and enhance safer cloud experience.
... Associations getting such The distributed computing model dispenses with the expense of conveying, procuring, and keeping up figuring power. Cloud frameworks improve the capability of associations to build productivity over the decrease in interests in capital resources, IT upkeep prices, n direct work costs (Brendl, 2010). Janakiramm (2010) shared that cloud very well suits growing business people as they can profit by 'versatile' wildlife of Cloud by disbursing for what they truly usage. ...
Full-text available
Article
Cloud computing has caused a significant paradigm shift that has changed the way data and software applications are accessed. It is the set of disciplines, technologies, and business models used to deliver IT capabilities as an on-demand, scalable, elastic service. Although cloud computing offers a number of opportunities and benefits,, there is a need to understand the factors before making decisions about the adoption of cloud computing. The present study proposes and further delves into the cloud computing model, by exploring the impact of factors of cloud computing (based on TAM model) towards the intention of using cloud computing services in future by professionals. Discriminant Analysis through SPSS software was used for the prediction of usage related to cloud computing services considering four factors of the TAM model as independent variables. Our study shows that security, attitude, and usefulness are important predictors of using cloud computing services while ease of use is not a significant predictor. This study can be of help for the organizations which look forward to adopting cloud computing services and also can provide a base to cloud computing service providers to formulate their strategies accordingly.
... Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start and pay for the resources only when there is a rise in service demand. Cloud Computing has been defined in many different ways by many researchers (Bisong and Rahman, 2011) but the most comprehensive definition is by (Brendl, 2010), who defines cloud computing as "collections of IT resources, (servers, databases, and applications) which are available on an on-demand basis, provided by a service company, available through the Internet, and provide resource pooling among multiple users". (2009) classify Cloud Computing and Services into three different layers based on the type of resources provided by the cloud. ...
Full-text available
Article
Cloud computing technology has caused a significant paradigm shift in accessing hardware and software applications. Despite the rapid adoption of cloud computing the difference in perception related to effectiveness of cloud computing may exist due to the size of organization. The study first emphasised on the factors within the technology acceptance model (TAM) that effect the adoption of cloud computing which include Perceived Ease of Use, Perceived Usefulness, Perceived Security and Perceived Attitude. Then, it focuses on understanding the differences in the perception of professionals belonging to organizations of different sizes towards cloud computing. The data was collected from 139 organizations (91 SME and 48 Large Enterprises). The study revealed that a significant difference was observed for factors: Ease of Use and Usefulness, while no significant difference was observed for Security and Attitude Factor. The study will serve as a useful guideline for development of strategies in effective usage of cloud computing.
... Over time, businesses experienced a number of system failures which in turn take a direct effect on their particular most important resource, data and its safety [12]. Businesses are beginning to consider cloud computing technology as a means to reduce expense while maximizing earnings, given that over all sectors administrators are under constant stress to cut back capital resources, cloud techniques provide them with the means to fulfill this aim [13]. ...
Full-text available
Article
Cloud Computing is an attracting technology in the area of information technology as it carries a number of distinct technologies which have established over time. Disaster Recovery (DR) is a system in which can be used to reduce the actual downtime once software or hardware breakdown. Business Continuity (BC) is an important requirement for the majority of organizations. This paper reviews the research literature on the concepts of cloud computing, disaster recovery, and business continuity. A systematic review carried out of the research dealing with the content of cloud computing, disaster recovery, and business continuity, a literature search was conducted on several electronic databases. Studies published from the years 1995 to 2015 were considered and were selected. This review paper helps the information technology industry to clarify how and have a comprehensive idea about the concepts of cloud computing, disaster recovery, and business continuity and their associated benefits and issues.
... SSAE 16 or ISAE 304 Type II report (cf. [65]); this, however, does not show that the provider is compliant but only that security controls are in place [66]. In addition, an ISO 27001 certification of security management or the demonstration of alignment with ISO 27002 practices is suggested [57]. ...
Conference Paper
Companies and their business processes are subject to many regulations. Today’s business processes are widely supported by IT systems. Therefore these systems play an im portant role in assuring compliance. The need to assure compliance can influence IT out sourcing decisions. We summarize some frameworks that give recommendations on assuring compliance of outsourced activities. For a service provider with many globally acting customers similar audit activities of many auditors would be time-consuming and expensive. To avoid these costs, the American Institute of Certified Public Accountants (AICPA) suggested that an auditor may provide a SAS 70 Audit Report Type II which confirms the existence and effectiveness of internal con trols. Recently, the AICPA replaced the SAS 70 with the attestation standard SSAE 16. Based on frameworks and guidelines we discuss compliance issues in special cases of outsourcing relationships such as Subcontracting and Cloud Computing.
Article
As we know, organizations are systems that affect their surrounding environment and get involved with their environment. Any changes can impact the outcome of any operation and decision in the organization, no matter how small it is or how irrelevant, from the most straightforward operation or process to the most complicated functions and strategic decisions. Migrating to cloud computing is one of the most important enterprise goals. This technology impacts the use of information and communication profoundly. Its main goal is to provide data storage and net computing services that are secure, rapid, and convenient. In this sense, the small and medium enterprise is the most interested since initial investments are avoided, and the technology allows gradual implementation. The present study aims to introduce the advantages of implementing cloud computing in small and medium enterprises. This paper studies cloud computing and its impact on the organization, which was carried out using a qualitative methodology to show the elements that may get impacted the most and the consequences of its adoption. By interviewing 13 managers and experts from four small and medium companies. Qualitative content analysis and open coding were used to analyze the data. Subsequently, five sub-themes were extracted from the central theme of the impact of cloud implementation on operational management in organizations. The sub-themes included information access, communication, collaborative work, and customer and supplier relationships. We found out that migrating into the cloud for organizations is primarily beneficial, with some exceptions, of course, any system or any technology has flaws, but in the case of the cloud technology, the benefits are more cover the flaws, especially if the implementation was well planned and well maintained, and we provide all the conditions needed for the good functioning of this technology.
Full-text available
Article
The current study is intended to provide analysis of the direct and indirect relationships between (E-HRM) strategies and organizational innovation through knowledge repository as a mediation construct. From various previous studies, five (E-HRM) strategies constructs were adopted for this study. These include E- recruitment, e- selection, e-training, e- performance appraisal, and e-compensations, and used the mediating role of a knowledge repository for these constructs to improve organizational innovation. The study applied the smart partial least square (PLS) software to analyse the underlying relationships amongst the most relevant constructs between (E-HRM) strategies, knowledge repositories, and organizational innovation with a total of seven constructs. The results are from top, middle managers (n = 94) working in the Royal Jordanian airline. It was found that there was a strong and statistically positive significant relationship between several (E-HRM) strategies and organizational innovation by using the knowledge repository as a mediation construct.
Chapter
With the significant advances in Information and Communications Technology (ICT) over the last half a century, the Cloud computing paradigm is one of the most discussed topics in the field of ICT today. Additionally, Cloud computing has a critical role in today's business world. Without risk management processes embedded into innovative technology that supports Cloud computing, businesses are setting themselves up for a fall. Hence, in this paper, the authors propose a conceptual model of implementing risk management processes into a Cloud computing environment. It highlights the different processes of risk management (risk identification, risk analysis, risk planning, risk execution, and risk monitoring) and how their existence can affect the Cloud environment to ensure proper protection of data and information in order to ensure Cloud networks and connections are secure.
Full-text available
Conference Paper
Cloud system is the simplest definition of providing computer service on the Internet. Instead of spending your facilities and facilities of information technology to maintain data or software and build it, we use the facilities of other companies so that your company can use data through the Internet. The software and software used may not be secure enough. With Cloud Computing, all your data is stored in the cloud. Theoretically, the stored data is on the cloud and is distributed among several machines. This article tries to explain the methods of establishing security in the cloud system.
Full-text available
Article
With the significant advances in Information and Communications Technology (ICT) over the last half a century, the Cloud computing paradigm is one of the most discussed topics in the field of ICT today. Additionally, Cloud computing has a critical role in today's business world. Without risk management processes embedded into innovative technology that supports Cloud computing, businesses are setting themselves up for a fall. Hence, in this paper, the authors propose a conceptual model of implementing risk management processes into a Cloud computing environment. It highlights the different processes of risk management (risk identification, risk analysis, risk planning, risk execution, and risk monitoring) and how their existence can affect the Cloud environment to ensure proper protection of data and information in order to ensure Cloud networks and connections are secure.
Full-text available
Data
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management. This paper discusses the cloud computing security concerns and the security risk associated with enterprise cloud computing including its threats, risk and vulnerability. Throughout the years, organizations have experienced and will continue to experience in this cloud computing era numerous system losses which will have a direct impact on their most
Full-text available
Article
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management.
ResearchGate has not been able to resolve any references for this publication.