2019
DOI: 10.2139/ssrn.3360869
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cloud Computing Through IT Governance

Abstract: Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers what the business needs and the business is able to deliver what the market needs. IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 37 publications
(14 reference statements)
0
4
0
Order By: Relevance
“…K. Brandis et al developed a framework to show the effect of using standards in cloud computing in mitigating risks according to five aspects which are legal, organizational, technical, cultural, and financial in order to use the cloud without risk in these aspects [25]. S. M. Faizi et al divided cloud computing security domains into storage, software, network security, trust management, Internet and services, compliance, legal, and virtualization [26]. M. Al-Ruithe et al provided a strategy for determining the critical success factors (CSF) in implementing cloud services that include (1) organizational (defining the responsibilities, business, and IT alignment), ( 2) technological (automation of data integration life-cycle, having data metrics), (3) strategic points of control, (4) training and awareness of data stakeholders, and ( 5) monitoring the compliance [27].…”
Section: Concerns In Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations
“…K. Brandis et al developed a framework to show the effect of using standards in cloud computing in mitigating risks according to five aspects which are legal, organizational, technical, cultural, and financial in order to use the cloud without risk in these aspects [25]. S. M. Faizi et al divided cloud computing security domains into storage, software, network security, trust management, Internet and services, compliance, legal, and virtualization [26]. M. Al-Ruithe et al provided a strategy for determining the critical success factors (CSF) in implementing cloud services that include (1) organizational (defining the responsibilities, business, and IT alignment), ( 2) technological (automation of data integration life-cycle, having data metrics), (3) strategic points of control, (4) training and awareness of data stakeholders, and ( 5) monitoring the compliance [27].…”
Section: Concerns In Cloud Computingmentioning
confidence: 99%
“…Thus, in this step, CC's auditor will define all risks that relate to these layers. Risk areas are categorized into eight domains (storage, software, network security, trust management, Internet services, compliance, legal, and virtualization) [26]. So determining risks must cover these domains in the CSP's side.…”
Section: Proposed Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent multiple case studies conducted to assess the scope and depth of cybersecurity risk [26] and threat communications delivered to an extremely vulnerable patient population, semistructured interviews were held with cardiac medical device specialists across the United States. These cardiac medical devices experts were intimately involved in the care and patient safety of cardiac implantable electronic devices (CIED) patients who used home monitoring systems to connect their implantable cardioverter-defibrillator (ICD) and pacemaker (PM) devices, typically through the cloud [23], to their physician's offices or device clinic. The case study examined the question: How are the cybersecurity risks [30] and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies?…”
Section: Introductionmentioning
confidence: 99%