EconPapers    
Economics at your fingertips  
 

Governance of IS Security in a Cloud Computing Ecosystem: A Longitudinal Approach

Wafa Bouaynaya ()
Additional contact information
Wafa Bouaynaya: University of Picardy

A chapter in ICT for an Inclusive World, 2020, pp 527-536 from Springer

Abstract: Abstract This research proposes an analysis of IS governance in three phases: pre-adoption, the adoption and post-adoption of cloud computing. This approach aims to highlight the different artefacts and key concepts of security governance in a cloud computing ecosystem. It is necessary to ask the question: Which solution to choose? It is also important to differentiate between three key artefacts: data as an asset, the cloud solution as a system, and the service provider as an actor to understand their relationship with the enterprise.

Keywords: Cloud computing; Security governance SI; Reversibility cloud computing; Data outsourcing (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:lnichp:978-3-030-34269-2_36

Ordering information: This item can be ordered from
http://www.springer.com/9783030342692

DOI: 10.1007/978-3-030-34269-2_36

Access Statistics for this chapter

More chapters in Lecture Notes in Information Systems and Organization from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-01
Handle: RePEc:spr:lnichp:978-3-030-34269-2_36