EconPapers    
Economics at your fingertips  
 

Governance of IS Security in a Cloud Computing Ecosystem: A Longitudinal Approach

Wafa Bouaynaya ()
Additional contact information
Wafa Bouaynaya: CRIISEA - Centre de Recherche sur les Institutions, l'Industrie et les Systèmes Économiques d'Amiens - UR UPJV 3908 - UPJV - Université de Picardie Jules Verne

Post-Print from HAL

Abstract: This research proposes an analysis of IS governance in three phases: pre-adoption, the adoption and post-adoption of cloud computing. This approach aims to highlight the different artefacts and key concepts of security governance in a cloud computing ecosystem. It is necessary to ask the question: Which solution to choose? It is also important to differentiate between three key artefacts: data as an asset, the cloud solution as a system, and the service provider as an actor to understand their relationship with the enterprise. \textcopyright Springer Nature Switzerland AG 2020.

Date: 2020
References: Add references at CitEc
Citations:

Published in Baghdadi Y., Harfouche A., Musso M. ICT for an Inclusive World, 35, Springer, pp.527--536, 2020, Lecture Notes in Information Systems and Organisation, 978-3-030-34268-5. ⟨10.1007/978-3-030-34269-2_36⟩

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:hal:journl:hal-03678285

DOI: 10.1007/978-3-030-34269-2_36

Access Statistics for this paper

More papers in Post-Print from HAL
Bibliographic data for series maintained by CCSD ().

 
Page updated 2025-03-19
Handle: RePEc:hal:journl:hal-03678285