Limitations, Summary, and Prospect
Tobias Ackermann
Additional contact information
Tobias Ackermann: Fachgebiet Wirtschaftsinformatik TU Darmstadt
Chapter Chapter 6 in IT Security Risk Management, 2013, pp 141-149 from Springer
Abstract:
Abstract In the following, limitations of this thesis’s research are presented. The quantification of risks in sections 3.5 and 3.6 is based on estimations of IT executives. The values are perceived risks instead of mathematically calculated values. Additionally, most respondents (69%) did not yet use Cloud Computing, and because of relatively low adoption rates in the market, the reported values represent anxieties rather than actual quantifications of facts and experiences. The assessment of risk incorporates both, the occurrence probability of the incident as well as its negative consequences, e. g., the potential losses. Therefore, all estimations should not be taken as fixed values. Instead, they may have to be adapted to each individual scenario.
Keywords: Cloud Computing; Security Risk; Adoption Decision; Business Process Execution Language; Risk Management Process (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-658-01115-4_6
Ordering information: This item can be ordered from
http://www.springer.com/9783658011154
DOI: 10.1007/978-3-658-01115-4_6
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().