The concepts of cloud computing and the use of Big Data have become two of the hottest topics in the world of corporate information systems in recent years. Organizations are always interested in initiatives that allow them to pay less attention to the more mundane areas of information system management, such as maintenance, capacity management, and storage management, and free up time and resources to concentrate on more strategic and tactical issues that are commonly perceived as being of higher value. Being able to mine and manipulate large and disparate datasets, without necessarily needing to pay excessive attention to the storage and management of all the data that are being used, sounds in theory like an ideal situation. A moment’s consideration reveals, however, that the use of cloud computing services, like the use of outsourcing facilities, is not necessarily a panacea. Management will always retain responsibility for the confidentiality, integrity, and availability of its applications and data, and being able to develop the confidence that these issues have been addressed. Similarly, the use of Big Data approaches offers many advantages to the creative and the visionary, but such activities do require an appropriate understanding of risk and control issues.
[1]
J. Manyika.
Big data: The next frontier for innovation, competition, and productivity
,
2011
.
[2]
Athanasios V. Vasilakos,et al.
Big data: From beginning to future
,
2016,
Int. J. Inf. Manag..
[3]
P. Mell,et al.
The NIST Definition of Cloud Computing
,
2011
.
[4]
Ronald L. Krutz,et al.
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
,
2010
.
[5]
日本規格協会.
情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001
,
2005
.
[6]
Solange Ghernaouti-Helie,et al.
Optimizing Security Efficiency through Effective Risk Management
,
2011,
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
[7]
Donn B. Parker,et al.
Toward a New Framework for Information Security
,
2015
.