In:
Advanced Materials Research, Trans Tech Publications, Ltd., Vol. 628 ( 2012-12), p. 380-385
Abstract:
There is little objective, scientific research focused on evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic hierarchy process were employed to identify and evaluate risks of cloud computing. The findings of this study are: (1) Loss exposures attributable to Jurisdiction, Burglary, Natural disaster, Normal wear and tear or malfunctions are characterized by high frequency but relatively low severity. (2) Loss exposures attributable to Privacy, Damaged or spoiled by employees intentionally or accidentally, and System vulnerability can be addressed through insurance. (3) Risks generated through Agreement or contract, Social engineering, Mistakes made by employees intentionally or accidentally, and Cross-cloud compatibility are characterized by both high frequency and severity.
Type of Medium:
Online Resource
ISSN:
1662-8985
DOI:
10.4028/www.scientific.net/AMR.628
DOI:
10.4028/www.scientific.net/AMR.628.380
Language:
Unknown
Publisher:
Trans Tech Publications, Ltd.
Publication Date:
2012
detail.hit.zdb_id:
2265002-7
Bookmarklink