Introduction
Tobias Ackermann
Additional contact information
Tobias Ackermann: Fachgebiet Wirtschaftsinformatik TU Darmstadt
Chapter Chapter 1 in IT Security Risk Management, 2013, pp 1-10 from Springer
Abstract:
Abstract Over the last couple of decades, the majority of companies have outsourced at least parts of their information systems to external suppliers, and a broad stream of research has been dedicated to the phenomenon of Information Technology Outsourcing (ITO). This development has been reinforced further by the currently much-discussed approach of “Cloud Computing” (Mell and Grance, 2011). Cloud Computing applications can be differentiated as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) applications, depending on the type of capability provided (Vaquero et al., 2009).
Keywords: Cloud Computing; Security Risk; Adoption Decision; Security Investment; Risk Management Process (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-658-01115-4_1
Ordering information: This item can be ordered from
http://www.springer.com/9783658011154
DOI: 10.1007/978-3-658-01115-4_1
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().