Governance of IS Security in a Cloud Computing Ecosystem: A Longitudinal Approach
Wafa Bouaynaya ()
Additional contact information
Wafa Bouaynaya: University of Picardy
A chapter in ICT for an Inclusive World, 2020, pp 527-536 from Springer
Abstract:
Abstract This research proposes an analysis of IS governance in three phases: pre-adoption, the adoption and post-adoption of cloud computing. This approach aims to highlight the different artefacts and key concepts of security governance in a cloud computing ecosystem. It is necessary to ask the question: Which solution to choose? It is also important to differentiate between three key artefacts: data as an asset, the cloud solution as a system, and the service provider as an actor to understand their relationship with the enterprise.
Keywords: Cloud computing; Security governance SI; Reversibility cloud computing; Data outsourcing (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:lnichp:978-3-030-34269-2_36
Ordering information: This item can be ordered from
http://www.springer.com/9783030342692
DOI: 10.1007/978-3-030-34269-2_36
Access Statistics for this chapter
More chapters in Lecture Notes in Information Systems and Organization from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().