Cyber-security concerns with cloud computing: Business value creation and performance perspectives
| dc.contributor.author | Yeboah-Boateng E.O. | |
| dc.date.accessioned | 2025-03-06T18:11:43Z | |
| dc.date.accessioned | 2025-03-06T21:52:11Z | |
| dc.date.issued | 2018 | |
| dc.description.abstract | Information is modeled into virtual objects to create value for its owner. The value chain involves stakeholders with varied responsibilities in the cyber-market. Cloud computing emerged out of virtualization, distributed and grid computing, and has altered the value creation landscape, through strategic and sensitive information management. It offers services that use resources in a utility fashion. The flexible, cost-effective service models are opportunities for SMEs. Whilst using these tools for value-creation is imperative, a myriad of security concerns confront both providers and end-users. Vulnerabilities and threats are key concerns, so that value created is strategically aligned with corporate vision, appropriated and sustained. What is the extent of impact? Expert opinions were elicited of 4 C-level officers and 10 security operatives. Shared technology issues, malicious insiders and service hijacking are considered major threats. Also, an intuitive strategic model for Value-Creation Cloud-based Cyber-security is proposed as guidance in fostering IT-enabled initiatives. � 2018 by IGI Global. All rights reserved. | |
| dc.identifier.doi | 10.4018/978-1-5225-5634-3.ch049 | |
| dc.identifier.isbn | 978-152255635-0; 1522556346; 978-152255634-3 | |
| dc.identifier.uri | http://162.250.124.58:4000/handle/123456789/529 | |
| dc.publisher | IGI Global | |
| dc.source | Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications | |
| dc.title | Cyber-security concerns with cloud computing: Business value creation and performance perspectives | |
| dc.type | Book chapter |
