Governance of IS Security in a Cloud Computing Ecosystem: A Longitudinal Approach
Wafa Bouaynaya ()
Additional contact information
Wafa Bouaynaya: CRIISEA - Centre de Recherche sur les Institutions, l'Industrie et les Systèmes Économiques d'Amiens - UR UPJV 3908 - UPJV - Université de Picardie Jules Verne
Post-Print from HAL
Abstract:
This research proposes an analysis of IS governance in three phases: pre-adoption, the adoption and post-adoption of cloud computing. This approach aims to highlight the different artefacts and key concepts of security governance in a cloud computing ecosystem. It is necessary to ask the question: Which solution to choose? It is also important to differentiate between three key artefacts: data as an asset, the cloud solution as a system, and the service provider as an actor to understand their relationship with the enterprise. \textcopyright Springer Nature Switzerland AG 2020.
Date: 2020
References: Add references at CitEc
Citations:
Published in Baghdadi Y., Harfouche A., Musso M. ICT for an Inclusive World, 35, Springer, pp.527--536, 2020, Lecture Notes in Information Systems and Organisation, 978-3-030-34268-5. ⟨10.1007/978-3-030-34269-2_36⟩
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:hal:journl:hal-03678285
DOI: 10.1007/978-3-030-34269-2_36
Access Statistics for this paper
More papers in Post-Print from HAL
Bibliographic data for series maintained by CCSD ().