Grispos, G., Glisson, W.B. and Storer, T. (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,
|
Text
76290.pdf - Accepted Version 350kB |
Publisher's URL: http://aisel.aisnet.org/ecis2013/29
Abstract
Cloud computing is quickly becoming pervasive in today’s globally integrated networks. The cloud offers organizations opportunities to potentially deploy software and data solutions that are accessible through numerous mechanisms, in a multitude of settings, at a reduced cost with increased reliability and scalability. The increasingly pervasive and ubiquitous nature of the cloud creates an environment that is potentially conducive to security risks. While previous discussions have focused on security and privacy issues in the cloud from the end-users perspective, minimal empirical research has been conducted from the perspective of a corporate environment case study. This paper presents the results of an initial case study identifying real-world information security documentation issues for a Global Fortune 500 organization, should the organization decide to implement cloud computing services in the future. The paper demonstrates the importance of auditing policies, standards and guidelines applicable to cloud computing environments along with highlighting potential corporate concerns. Furthermore, the paper provides a foundation for future analysis and research regarding implementation concerns for corporate cloud computing applications and services.
Item Type: | Conference Proceedings |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Storer, Dr Tim and Glisson, Dr William |
Authors: | Grispos, G., Glisson, W.B., and Storer, T. |
College/School: | College of Arts > School of Humanities > Information Studies College of Science and Engineering > School of Computing Science |
Copyright Holders: | Copyright © 2013 The Authors |
Publisher Policy: | Reproduced with the permission of the authors |
University Staff: Request a correction | Enlighten Editors: Update this record