Assessing information security risks in the cloud: A case study of Australian local government authorities
暂无分享,去创建一个
Akemi Takeoka Chatfield | Peter Murray | Anup Shrestha | Omar Ali | A. Chatfield | Omar Ali | Anup Shrestha | Peter Murray
[1] Björn Niehaves,et al. Business process management capabilities in local governments: A multi-method study , 2013, Gov. Inf. Q..
[2] Rami Bahsoon,et al. A Systematic Review of Service Level Management in the Cloud , 2015, ACM Comput. Surv..
[3] L. G. Pee,et al. Interactions among factors influencing knowledge management in public-sector organizations: A resource-based view , 2016, Gov. Inf. Q..
[4] Hsin Hsin Chang,et al. Technical and management perceptions of enterprise information system importance, implementation and benefits , 2006, Inf. Syst. J..
[5] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[6] Erwin Laure,et al. Security and Privacy of Sensitive Data in Cloud Computing: A Survey of Recent Developments , 2015, NeTCoM 2015.
[7] C. Teddlie,et al. Foundations of mixed methods research , 2013 .
[8] Rajkumar Buyya,et al. SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions , 2011, 2011 International Conference on Cloud and Service Computing.
[9] Rossouw von Solms,et al. Information security requirements - Interpreting the legal aspects , 2008, Comput. Secur..
[10] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[11] P. Bentler,et al. Significance Tests and Goodness of Fit in the Analysis of Covariance Structures , 1980 .
[12] John Hulland,et al. Use of causal models in marketing research: A review , 1996 .
[13] V. B. Singh,et al. E-Governance: Past, Present and Future in India , 2012, ArXiv.
[14] Will Venters,et al. A critical review of cloud computing: researching desires and realities , 2012, J. Inf. Technol..
[15] B. Thompson. Exploratory and Confirmatory Factor Analysis: Understanding Concepts and Applications , 2004 .
[16] C. Perry,et al. Convergent interviewing: a starting methodology for an enterprise research program , 2007 .
[17] Kenneth L. Kraemer,et al. Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry , 2005, Inf. Syst. Res..
[18] Paul T. Jaeger,et al. Information policy, information access, and democratic participation: The national and international implications of the Bush administration's information politics , 2007, Gov. Inf. Q..
[19] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[20] Junping Du,et al. Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing , 2013, IET Inf. Secur..
[21] Ray Hackney,et al. Towards an e-Government efficiency agenda: the impact of information and communication behaviour on e-Reverse auctions in public sector procurement , 2007, Eur. J. Inf. Syst..
[22] R. Buyya,et al. Market-Oriented Grid and Utility Computing , 2009 .
[23] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[24] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[25] Paul T. Jaeger,et al. Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .
[26] Data Security and Privacy Protection Issues in Cloud Computing , 2015 .
[27] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[28] Dag I. K. Sjøberg,et al. Confronting the myth of rapid obsolescence in computing research , 2010, Commun. ACM.
[29] M. Patton. Qualitative research and evaluation methods , 1980 .
[30] Hsiu-Fang Hsieh,et al. Three Approaches to Qualitative Content Analysis , 2005, Qualitative health research.
[31] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[32] A. Scupola,et al. The Adoption of Internet Commerce by SMEs in the South of Italy: An Environmental, Technological and Organizational Perspective , 2003 .
[33] Muthu Ramachandran,et al. Towards Achieving Data Security with the Cloud Computing Adoption Framework , 2016, IEEE Transactions on Services Computing.
[34] Colin Robson,et al. Real World Research: A Resource for Social Scientists and Practitioner-Researchers , 1993 .
[35] K. Schermelleh-Engel,et al. Evaluating the Fit of Structural Equation Models: Tests of Significance and Descriptive Goodness-of-Fit Measures. , 2003 .
[36] Zhihai Zhang,et al. An instrument for measuring TQM implementation for Chinese manufacturing companies , 2000 .
[37] Patrick Y. K. Chau,et al. A perception-based model for EDI adoption in small businesses using a technology-organization-environment framework , 2001, Inf. Manag..
[38] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[39] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[40] Jun-jie Wang,et al. Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.
[41] Myeonggil Choi,et al. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations , 2015 .
[42] Peter E.D. Love,et al. Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies , 2017, Information Systems Frontiers.
[43] Michael D. Myers,et al. Qualitative Research in Information Systems , 1997, MIS Q..
[44] Sevgi Özkan,et al. e-Government adoption model based on theory of planned behavior: Empirical validation , 2011, Gov. Inf. Q..
[45] Mcdp Mathieu Weggeman,et al. Determinants of the Level of Knowledge Application: A Knowledge‐Based and Information‐Processing Perspective* , 2005 .
[46] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[47] Christopher G. Reddick,et al. Why e-government projects fail? An analysis of the Healthcare.gov website , 2016, Gov. Inf. Q..
[48] Zahir Irani,et al. Evaluating the use and impact of Web 2.0 technologies in local government , 2015, Gov. Inf. Q..
[49] Ragib Hasan,et al. Verifiable Data Redundancy in the Cloud , 2016, 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom).
[50] B. Byrne. A Primer of Lisrel: Basic Applications and Programming for Confirmatory Factor Analytic Models , 1989 .
[51] E. B. Zechmeister,et al. Research Methods in Psychology. , 1990 .
[52] Samuel J. Best,et al. The Effect of Risk Perceptions on Online Political Participatory Decisions , 2008 .
[53] Mary Tate,et al. A Descriptive Literature Review and Classification of Cloud Computing Research , 2012, Commun. Assoc. Inf. Syst..
[54] Christian Leuprecht,et al. Beyond the Castle Model of cyber-risk and cyber-security , 2016, Gov. Inf. Q..
[55] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[56] Rex B. Kline,et al. Principles and Practice of Structural Equation Modeling , 1998 .
[57] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[58] C. D. J. Waters. Quantitative Methods for Business , 1997 .
[59] Monica J. Garfield,et al. The Adoption and Use of GSS in Project Teams: Toward More Participative Processes and Outcomes , 2003, MIS Q..
[60] B. Byrne. Structural Equation Modeling with LISREL, PRELIS, and SIMPLIS: Basic Concepts, Applications, and Programming , 1998 .
[61] Kenneth J. Knapp,et al. Key issues in data center security: An investigation of government audit reports , 2011, Gov. Inf. Q..
[62] P. Bentler,et al. Evaluating model fit. , 1995 .
[63] R. Chenail,et al. Values in Qualitative and Quantitative Research , 2009 .
[64] Xuejie Zhang,et al. Information Security Risk Management Framework for the Cloud Computing Environments , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[65] Marijn Janssen,et al. Challenges for adopting cloud-based software as a service (saas) in the public sector , 2011, ECIS.
[66] Gordon B. Davis,et al. Testing the Determinants of Microcomputer Usage via a Structural Equation Model , 1995, J. Manag. Inf. Syst..
[67] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[68] Dimitrios Zissis,et al. Securing e-Government and e-Voting with an open cloud computing architecture , 2011, Gov. Inf. Q..
[69] Steven Johnson,et al. Everything Bad Is Good for You , 2005 .
[70] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[71] Marijn Janssen,et al. Connecting cloud infrastructures with shared services , 2010, DG.O.
[72] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[73] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[74] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[75] Hennie A. Kruger,et al. A prototype for assessing information security awareness , 2006, Comput. Secur..
[76] Geoff Walsham,et al. Doing interpretive research , 2006, Eur. J. Inf. Syst..
[77] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[78] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[79] Thomas F. Stafford,et al. Online tax payment systems as an emergent aspect of governmental transformation , 2011, Eur. J. Inf. Syst..
[80] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[81] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[82] B. Tabachnick,et al. Using Multivariate Statistics , 1983 .
[83] Brent Lagesse,et al. Challenges in securing the interface between the cloud and pervasive systems , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[84] Viswanath Venkatesh,et al. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..
[85] Tiago Oliveira,et al. Understanding e-business adoption across industries in European countries , 2010, Ind. Manag. Data Syst..
[86] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[87] Eric Hand,et al. Head in the clouds , 2007, Nature.
[88] A. Onwuegbuzie,et al. Mixed Methods Research: A Research Paradigm Whose Time Has Come , 2004 .
[89] Saudi Arabia,et al. Cloud Based E-Government: Benefits and Challenges , 2013 .
[90] W. Zikmund. Business Research Methods , 1984 .
[91] J. Hair. Multivariate data analysis , 1972 .
[92] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[93] Paul De Hert,et al. The new General Data Protection Regulation: Still a sound system for the protection of individuals? , 2016, Comput. Law Secur. Rev..
[94] Iliya Markov,et al. Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..
[95] Bo Fan,et al. Exploring open government data capacity of government agency: Based on the resource-based theory , 2018, Gov. Inf. Q..
[96] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[97] Jason W Beckstead,et al. Factor analysis as a tool for survey analysis using a professional role orientation inventory as an example. , 2004, Physical therapy.
[98] The Role of Information Technology in the Business Sector , 2014 .
[99] Sheena Asthana,et al. Allocating resources for health and social care: the significance of rurality. , 2003, Health & social care in the community.
[100] H. Russell Johnston,et al. Developing Capabilities to Use Information Strategically , 1988, MIS Q..
[101] Jasmeet Singh,et al. Cloud Data Security using Authentication and Encryption Technique , 2013 .
[102] Emanouil I. Atanassov,et al. Security issues of the combined usage of Grid and Cloud resources , 2012, 2012 Proceedings of the 35th International Convention MIPRO.
[103] William C. Barker,et al. Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories , 2008 .
[104] T. Brown,et al. Exploratory Factor Analysis: A Five-Step Guide for Novices , 2010 .
[105] Michael Grimsley,et al. e-Government information systems: Evaluation-led design for public value and client trust , 2007, Eur. J. Inf. Syst..
[106] Jeffrey Soar,et al. Perceived potential for value creation from cloud computing: a study of the Australian regional government sector , 2018, Behav. Inf. Technol..
[107] Kenneth A. Bollen,et al. Structural Equations with Latent Variables , 1989 .
[108] Dong-Hee Shin,et al. User centric cloud service model in public sectors: Policy implications of cloud services , 2013, Gov. Inf. Q..
[109] Avinash Sonule,et al. Development of servers in cloud computing to solve issues related to security and backup , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[110] Michael Hall,et al. Security and Control in the Cloud , 2010, Inf. Secur. J. A Glob. Perspect..
[111] Barbara M. Byrne,et al. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[112] Abdulaziz Aljabre. Cloud Computing for Increased Business Value , 2012 .
[113] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[114] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[115] D L Morgan,et al. Practical Strategies for Combining Qualitative and Quantitative Methods: Applications to Health Research , 1998, Qualitative health research.
[116] A. Onwuegbuzie,et al. Toward a Definition of Mixed Methods Research , 2007 .
[117] Xiaohua Zhu,et al. The failure of an early episode in the open government data movement: A historical case study , 2017, Gov. Inf. Q..
[118] Jeffrey C. Carrico,et al. Licensed to ILL , 2004 .
[119] Shuhua Monica Liu,et al. Special issue on internet plus government: New opportunities to solve public problems? , 2018, Gov. Inf. Q..
[120] Kathryn E. Newcomer,et al. Handbook of Practical Program Evaluation , 2010 .
[121] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[122] Saad Mubeen,et al. Management of Service Level Agreements for Cloud Services in IoT: A Systematic Mapping Study , 2018, IEEE Access.
[123] Serge Gutwirth,et al. Computers, Privacy and Data Protection: an Element of Choice , 2011 .
[124] Daniel Perez González,et al. Cloud computing in industrial SMEs: identification of the barriers to its adoption and effects of its application , 2013, Electron. Mark..
[125] R. Udayakumar,et al. Cloud Security and Compliance - A Semantic Approach in End to End Security , 2017 .
[126] M. Grimmer,et al. The mix of qualitative and quantitative research in major marketing journals, 1993‐2002 , 2007 .
[127] Tim Storer,et al. Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization , 2013, ECIS.
[128] Paul T. Jaeger,et al. Transparency and technological change: Ensuring equal and sustained public access to government information , 2010, Gov. Inf. Q..
[129] E. Rogers. Diffusion of Innovations , 1962 .
[130] Kenneth L. Kraemer,et al. Review: Information Technology and Organizational Performance: An Integrative Model of IT Business Value , 2004, MIS Q..
[131] Matthew N. O. Sadiku,et al. Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.
[132] Jennifer Caroline Greene,et al. Defining and describing the paradigm issue in mixed‐method evaluation , 1997 .
[133] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[134] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[135] Michele Bush Kimball. Mandated state-level open government training programs , 2011, Gov. Inf. Q..
[136] M. Al-Hariri,et al. Impact of students' use of technology on their learning achievements in physiology courses at the University of Dammam , 2016, Journal of Taibah University Medical Sciences.
[137] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[138] Kenneth L. Kraemer,et al. Information Technology Payoff in E-Business Environments: An International Perspective on Value Creation of E-Business in the Financial Services Industry , 2004, J. Manag. Inf. Syst..
[139] Yikai Liang,et al. Exploring the determinant and influence mechanism of e-Government cloud adoption in government agencies in China , 2017, Gov. Inf. Q..
[140] Zheng Yan,et al. Factors affecting response rates of the web survey: A systematic review , 2010, Comput. Hum. Behav..
[141] Jeffrey Soar,et al. Challenges and issues that are perceived to influence cloud computing adoption in local government councils , 2017, 2017 IEEE 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[142] R. P. McDonald,et al. Goodness-of-fit indexes in confirmatory factor analysis : The effect of sample size , 1988 .
[143] C. Perry,et al. Qualitative Marketing Research , 2001 .
[144] K. Brazil,et al. Revisiting the Quantitative-Qualitative Debate: Implications for Mixed-Methods Research , 2002, Quality & quantity.
[145] Nils Urbach,et al. Structural Equation Modeling in Information Systems Research Using Partial Least Squares , 2010 .
[146] Eduardo B. Fernández,et al. A survey of compliance issues in cloud computing , 2016, Journal of Internet Services and Applications.
[147] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[148] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[149] Keith Punch,et al. Introduction to Social Research: Quantitative and Qualitative Approaches , 1998 .
[150] Andy P. Field,et al. Discovering Statistics Using SPSS , 2000 .
[151] Athanasios V. Vasilakos,et al. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..
[152] Marijn Janssen,et al. Building Cybersecurity Awareness: The need for evidence-based framing strategies , 2017, Gov. Inf. Q..
[153] B MilesMatthew,et al. Qualitative Data Analysis , 2009, Approaches and Processes of Social Science Research.
[154] R. Henson,et al. Use of Exploratory Factor Analysis in Published Research , 2006 .
[155] Liesbet van Zoonen,et al. Privacy concerns in smart cities , 2016, Gov. Inf. Q..
[156] Bo Ai,et al. The issues of cloud computing security in high-speed railway , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[157] Karl G. Jöreskog,et al. Lisrel 8: Structural Equation Modeling With the Simplis Command Language , 1993 .
[158] Jan Schilling. On the Pragmatics of Qualitative Assessment , 2006 .
[159] Zaigham Mahmood,et al. Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.
[160] Jeffrey Soar,et al. An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments , 2016, J. Inf. Secur. Appl..
[161] Irit Hadar,et al. Applying ontology-based rules to conceptual modeling: a reflection on modeling decision making , 2007, Eur. J. Inf. Syst..
[162] G. Gaskell,et al. Individual and Group Interviewing , 2000 .
[163] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[164] Sanjay Kumar Madria,et al. Challenges in Secure Sensor-Cloud Computing , 2011, Secure Data Management.
[165] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[166] V. T. Raja,et al. Protecting the privacy and security of sensitive customer data in the cloud , 2012, Comput. Law Secur. Rev..