Cloud Computing And The Insider Literature Review

PAGES
5
WORDS
1595
Cite

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the organization and organizations need to establish amicable means of dealing with the situation. This problem has to be solved within the organization because it gets out of hand when those associated with it opt to do it outside the confines of the organization. From the integrated literature review, it is evident that employee satisfaction is a heads-up for the journey towards curbing threats offered by insiders. This is because such problems are generated internally, and consequently, it is logical enough to seek solutions to the same problems internally to be able to get a clear direction.

...

(2011). A Risk Assessment Framework for Evaluating Software-as -- a -Service (SaaS) Cloud Services Before Adoption. Ann Arbor: ProQuest.
Himmel, M. (2012). Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks. Ann Arbor: ProQuest.

Letort, D.B. (2012). Factors influencing F/OSS Cloud Computing Software Product Success: A quantitative study. Ann Arbor: ProQuest LLC.

Omondi, J. (2012). An analysis of security, cost-effectiveness and IT compliance factors influencing cloud adoption by its managers . Ann Arbor: ProQuest.

ThankGod, E.K. (2012). Predicting cloud computing technology adoption by organizations: an empirical integration of technology acceptance model and theory of planned behavior. Ann Arbor: ProQuest.

Wayne, A.J. (2012). An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments. Ann Arbor: ProQuest.

Sources Used in Documents:

References

Bernard, L. (2011). A Risk Assessment Framework for Evaluating Software-as -- a -Service (SaaS) Cloud Services Before Adoption. Ann Arbor: ProQuest.

Himmel, M. (2012). Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks. Ann Arbor: ProQuest.

Letort, D.B. (2012). Factors influencing F/OSS Cloud Computing Software Product Success: A quantitative study. Ann Arbor: ProQuest LLC.

Omondi, J. (2012). An analysis of security, cost-effectiveness and IT compliance factors influencing cloud adoption by its managers . Ann Arbor: ProQuest.


Cite this Document:

"Cloud Computing And The Insider" (2013, March 25) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/cloud-computing-and-the-insider-86960

"Cloud Computing And The Insider" 25 March 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/cloud-computing-and-the-insider-86960>

"Cloud Computing And The Insider", 25 March 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/cloud-computing-and-the-insider-86960

Related Documents

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Cloud Computing
PAGES 10 WORDS 3424

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Many people know that they are not educated enough in the complicated technologies that are seen in cloud computing and insider threats. As such, it is often a general consensus of the people to not trust such technologies they cannot clearly define. Using a systems-oriented approach will allow the current research to dive into these opinions and help uncover what societal structures are leading to this general sense of

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.