IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing
This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives' Cloud Computing adoption decisions are examined. The book’s second part presents a mathematical risk quantification framework that can be used to support the IT risk management process of Cloud Computing users. The results support the risk management processes of (potential) adopters, and enable providers to develop targeted strategies to mitigate risks perceived as crucial.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Evaluation of Perceived IT Security Risks
Risk Quantification Framework
Limitations Summary and Prospect
Other editions - View all
Ackermann Additionally adoption decisions adoption intentions algorithm analyze application assess attacks Benlian and Hess business process Business Process Outsourcing Buxmann calculated Cloud Computing adoption Cloud Computing providers conceptualization confidentiality cost drivers cost values countermeasures customers data transfers Daten decision makers decision support system distribution of potential DPP service effect encryption evaluate expected value expert interviews Figure identified Identity theft individual risk Information Systems intention to increase Journal literature review Measurement Model nomological nomological network nomological validity occurrence probabilities outsourcing overall Pavlou PDFL perceived IT security perceived negative utility perceived risk performance PITSR possible potential losses probability density function Prokein Q-sort Questionnaire reflective indicators related to Cloud risk dimensions risk identification risk items risk management risk management process risk treatment riskant risks of Cloud SaaS security level security risk Table taxonomy überhaupt Unternehmen users validity Value-at-Risk variance vendor lock-in x-axis