메뉴 건너뛰기




Volumn 10, Issue 2, 2014, Pages 240-255

Leveraged BMIS model for cloud risk control

Author keywords

BMIS; Cloud risk; CSFs; Effective model; Leverage point; Risk control

Indexed keywords

INFORMATION MANAGEMENT;

EID: 84944443421     PISSN: 1976913X     EISSN: 2092805X     Source Type: Journal    
DOI: 10.3745/JIPS.03.0004     Document Type: Article
Times cited : (2)

References (27)
  • 5
    • 84883696842 scopus 로고    scopus 로고
    • Applying BMIS to cloud security
    • in, N. Pohlmann, H. Reimer, and W. Schneider, Eds. Berlin, Germany: Vieweg+Teubner Verlag
    • R. von Rössing, " Applying BMIS to cloud security," in ISSE 2010 Securing Electronic Business Processes, N. Pohlmann, H. Reimer, and W. Schneider, Eds. Berlin, Germany: Vieweg+Teubner Verlag, 2011, pp. 101-112.
    • (2011) ISSE 2010 Securing Electronic Business Processes , pp. 101-112
    • von Rössing, R.1
  • 6
    • 84944444288 scopus 로고    scopus 로고
    • The business model for information security
    • in London, UK
    • S. Sembhi, " The business model for information security," in RSA Conference Europe, London, UK, 2010.
    • (2010) RSA Conference Europe
    • Sembhi, S.1
  • 8
    • 84944443966 scopus 로고    scopus 로고
    • Information Systems Audit and Control Association (ISACA), Available
    • Information Systems Audit and Control Association (ISACA) (2010). An introduction to the business model for information security [Online]. Available: http://www.isaca.org/Knowledge-Center/Research/Documents/Introduction-to-the-Business-Model-for-Information-Security_res_Eng_0109.pdf
    • (2010) An introduction to the business model for information security [Online]
  • 9
    • 84944443536 scopus 로고    scopus 로고
    • Information Systems Audit and Control Association (ISACA), Available [Online]
    • Information Systems Audit and Control Association (ISACA) (2010). ISACA issues new comprehensive business model for information security [Online]. Available: http://www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/ISACA-Issues-New-Comprehensive-Business-Model-for-Information-Security.aspx
    • (2010) ISACA issues new comprehensive business model for information security
  • 10
    • 0000883537 scopus 로고
    • Management information crisis
    • R. D. Daniel, " Management information crisis," Harvard Business Review, vol. 39, no. 5, pp. 111-121, 1961.
    • (1961) Harvard Business Review , vol.39 , Issue.5 , pp. 111-121
    • Daniel, R.D.1
  • 11
    • 0018451997 scopus 로고
    • Chief executives define their own data needs
    • J. F. Rockart, " Chief executives define their own data needs," Harvard Business Review, vol. 57, no. 2, pp. 81-93, 1979.
    • (1979) Harvard Business Review , vol.57 , Issue.2 , pp. 81-93
    • Rockart, J.F.1
  • 12
    • 0011571031 scopus 로고
    • A primer on critical success factors
    • Alfred P. Sloan School of Management, Center for Information Systems Research, Working Paper No. 69
    • C. V. Bullen and J. F. Rockart, " A primer on critical success factors," Alfred P. Sloan School of Management, Center for Information Systems Research, Working Paper No. 69, 1981.
    • (1981)
    • Bullen, C.V.1    Rockart, J.F.2
  • 13
    • 84944444047 scopus 로고    scopus 로고
    • Critical Success Factor [Online]
    • Wikipedia., Available
    • Wikipedia. Critical Success Factor [Online]. Available: http://en.wikipedia.org/wiki/Critical_success_factor#cite_note-4
  • 14
    • 57149133069 scopus 로고    scopus 로고
    • The critical success factor method: establishing a foundation for enterprise security management
    • Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU/SEI-2004-TR-010
    • R. A. Caralli, " The critical success factor method: establishing a foundation for enterprise security management," Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU/SEI-2004-TR-010, 2004.
    • (2004)
    • Caralli, R.A.1
  • 16
    • 84883310301 scopus 로고    scopus 로고
    • Cloud risk: 10 principles and a framework for assessment
    • D. Vohradsky, " Cloud risk: 10 principles and a framework for assessment," ISACA Journal, vol. 5, pp. 31-41, 2012.
    • (2012) ISACA Journal , vol.5 , pp. 31-41
    • Vohradsky, D.1
  • 17
    • 84944443566 scopus 로고    scopus 로고
    • Wikipedia. [Online]. Available
    • Wikipedia. Lever [Online]. Available: http://en.wikipedia.org/wiki/Lever#cite_note-1
    • Lever
  • 18
    • 79952065844 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA), Available
    • Cloud Security Alliance (CSA) (2010). Top Threats to Cloud Computing V1.0 [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
    • (2010) Top Threats to Cloud Computing V1.0 [Online]
  • 22
    • 84944444289 scopus 로고    scopus 로고
    • Gartner: seven cloud-computing security risks
    • [Online]. Available
    • J. Brodkin, " Gartner: seven cloud-computing security risks," InfoWorld News [Online]. Available: http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
    • InfoWorld News
    • Brodkin, J.1
  • 23
    • 84944443523 scopus 로고    scopus 로고
    • Cloud computing data security internet and web system2-term paper
    • unpublished.
    • S. K. B. Tammaiah, " Cloud computing data security internet and web system2-term paper," unpublished.
    • Tammaiah, S.K.B.1
  • 24
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • D. Firesmith, " Specifying reusable security requirements," Journal of Object Technology, vol. 3, no. 1, pp, 61-75, 2004.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 25
    • 84871597858 scopus 로고    scopus 로고
    • Wikipedia. [Online]. Available
    • Wikipedia. Technology [Online]. Available: http://en.wikipedia.org/wiki/Technology
    • Technology
  • 26
    • 84944444290 scopus 로고    scopus 로고
    • Security & standards in the Cloud: building trust through openness and interoperability in the Cloud
    • unpublished.
    • Y. Li, " Security & standards in the Cloud: building trust through openness and interoperability in the Cloud," unpublished.
    • Li, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.