EconPapers    
Economics at your fingertips  
 

Limitations, Summary, and Prospect

Tobias Ackermann
Additional contact information
Tobias Ackermann: Fachgebiet Wirtschaftsinformatik TU Darmstadt

Chapter Chapter 6 in IT Security Risk Management, 2013, pp 141-149 from Springer

Abstract: Abstract In the following, limitations of this thesis’s research are presented. The quantification of risks in sections 3.5 and 3.6 is based on estimations of IT executives. The values are perceived risks instead of mathematically calculated values. Additionally, most respondents (69%) did not yet use Cloud Computing, and because of relatively low adoption rates in the market, the reported values represent anxieties rather than actual quantifications of facts and experiences. The assessment of risk incorporates both, the occurrence probability of the incident as well as its negative consequences, e. g., the potential losses. Therefore, all estimations should not be taken as fixed values. Instead, they may have to be adapted to each individual scenario.

Keywords: Cloud Computing; Security Risk; Adoption Decision; Business Process Execution Language; Risk Management Process (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-658-01115-4_6

Ordering information: This item can be ordered from
http://www.springer.com/9783658011154

DOI: 10.1007/978-3-658-01115-4_6

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-02
Handle: RePEc:spr:sprchp:978-3-658-01115-4_6