The Risk Management Strategy of Applying Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 9
Abstract
It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and analyze loss exposures of Cloud Computing by scientific and objective methods which provide the necessary information to administrators in support of decisions of risk management. In conclusion, this study has identified “Social Engineering”, “Cross-Cloud Compatibility” and “Mistakes are made by employees intentionally or accidentally” are high priority risks to be treated. The findings also revealed that people who work in the field of information or Cloud Computing are somehow ignorant of where the risks in Cloud Computing lie due to its novelty and complication.
Authors and Affiliations
Chiang Fan, Tien-Chun Chen
A Novel Unsupervised Abnormal Event Identification Mechanism for Analysis of Crowded Scene
The advancement of visual sensing has introduced better capturing of the discrete information from a complex, crowded scene for assisting in the analysis. However, after reviewing existing system, we find that majority o...
Software Design Principles to Enhance SDN Architecture
SDN as a network architecture emerged on top of existing technologies and knowledge. Through defining the controller as a software program, SDN made a strong connection between networking and software engineering. Tradit...
Restructuring of System Analysis and Design Course with Agile Approach for Computer Engineering/Programming Departments
Today software plays an increasingly important and central role in every aspect of everyday life. The number, size, complexity and application areas of the programs developed continue to grow. Many software products have...
A Survey of Unstructured Text Summarization Techniques
Due to the explosive amounts of text data being created and organizations increased desire to leverage their data corpora, especially with the availability of Big Data platforms, there is not usually enough time to read...
Image based Arabic Sign Language Recognition System
Through history, humans have used many ways of communication such as gesturing, sounds, drawing, writing, and speaking. However, deaf and speaking impaired people cannot use speaking to communicate with others, which may...