Aligning cloud computing security with business strategy
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be helpful for an enterprise. It emphasizes on how cloud computing can be adopted in th...
| Main Authors: | Mohamed Hassan El-Hoby, Hany, A. F. Salah, Mohammed, Suhaimi, Mohd Adam |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Seventh Sense Research Group
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/72057/ http://irep.iium.edu.my/72057/1/Aligning%20cloud%20computing%20security%20with%20business%20strategy.pdf |
Similar Items
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Strategic Alignment between IT and Business Strategy
by: Arafat, Mohamad Adnan
Published: (2007)
by: Arafat, Mohamad Adnan
Published: (2007)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Information technology and business alignment in Malaysian SMEs
by: Suhaimi, Mohd Adam, et al.
Published: (2011)
by: Suhaimi, Mohd Adam, et al.
Published: (2011)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
SLA-based trust model for secure cloud computing
by: Alhamad, Mohammed
Published: (2011)
by: Alhamad, Mohammed
Published: (2011)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
A conceptual model for business and information technology stratetegic alignment from the perspective of small and medium enterprises
by: Alyahya, Majed, et al.
Published: (2013)
by: Alyahya, Majed, et al.
Published: (2013)
Alignment between data warehouse design and business strategy
by: Mior Nazri, Mior Nasir, et al.
Published: (2015)
by: Mior Nazri, Mior Nasir, et al.
Published: (2015)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Business opportunities arising from cloud computing in information technology industry
by: Lee, Ho Cheong, et al.
Published: (2013)
by: Lee, Ho Cheong, et al.
Published: (2013)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
Strategic IT Alignment with Business Strategy:
Service Oriented Architecture Approach
by: Mohammad, Abdi, et al.
Published: (2010)
by: Mohammad, Abdi, et al.
Published: (2010)
IT Adoption in Westports Customer Service and Alignment to Its Business Strategy
by: Vyithelingam, Jananandh
Published: (2008)
by: Vyithelingam, Jananandh
Published: (2008)
Knowledge Transfer Program (KTP) from International Islamic University Malaysia (IIUM): leveraging MyEntrepreneur2Cloud and Network of Mosque (NoM) to obliterate poverty in Malaysia
by: Adrian, Qadhli Jafar, et al.
Published: (2013)
by: Adrian, Qadhli Jafar, et al.
Published: (2013)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Responsibility-value alignment in information security governance
by: Abdul Munir, Rufizah, et al.
Published: (2018)
by: Abdul Munir, Rufizah, et al.
Published: (2018)
Security and accountability for sharing the data stored in the cloud‏
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Business-IT Alignment through Enterprise Architecture in a Strategic Alignment Dimension: A Review
by: Yoppy Mirza, Maulana, et al.
Published: (2023)
by: Yoppy Mirza, Maulana, et al.
Published: (2023)
The alignment between knowledge strategy and business strategy and its influence on business performance / Shamsul Khairul Annuar Nordin
by: Nordin, Shamsul Khairul Annuar
Published: (2015)
by: Nordin, Shamsul Khairul Annuar
Published: (2015)
Does Employee Alignment Affect Business-IT Alignment? An Empirical Analysis
by: Chong, Alain Yee Loong, et al.
Published: (2011)
by: Chong, Alain Yee Loong, et al.
Published: (2011)
A review on cloud computing adoption from the perspectives of providers and clients
by: Suhaimi, Mohd Adam, et al.
Published: (2019)
by: Suhaimi, Mohd Adam, et al.
Published: (2019)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Cloud computing practices and perceived benefits by SMES in Malaysia: some empirical evidence
by: Hussin, Husnayati, et al.
Published: (2019)
by: Hussin, Husnayati, et al.
Published: (2019)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Big Data Processing in Cloud Computing Environments
by: Noraziah, Ahmad, et al.
Published: (2017)
by: Noraziah, Ahmad, et al.
Published: (2017)
Moving toward e-business: customer relationship management alignment in Malaysian small business
by: Mohamed, Norshidah, et al.
Published: (2013)
by: Mohamed, Norshidah, et al.
Published: (2013)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Similar Items
-
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017) -
Strategic Alignment between IT and Business Strategy
by: Arafat, Mohamad Adnan
Published: (2007) -
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014) -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015) -
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)