A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments
碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === Globally soaring price of the most materials have resulted in a substantial increase in operation costs of enterprises. The emerging cloud computing integrating technologies like virtualization, service management automation and standardization can bring con...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/90862437881368860760 |
id |
ndltd-TW-099SHU05396017 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099SHU053960172016-04-11T04:22:22Z http://ndltd.ncl.edu.tw/handle/90862437881368860760 A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments 企業導入雲端運算環境的資訊安全因素之研究 Chih-Ling Chang 張至伶 碩士 世新大學 資訊管理學研究所(含碩專班) 99 Globally soaring price of the most materials have resulted in a substantial increase in operation costs of enterprises. The emerging cloud computing integrating technologies like virtualization, service management automation and standardization can bring considerable benefits, cost savings and improve acceptance. By leveraging the power of cloud computing, enterprises can solve problems of high information costs of operating the data center and managing the servers. Nonetheless, there are several items that must be carefully considered and assessed. Among them, information security is on the top of the list. Rapid change in information technology leads to continuous information security incidents every day. Enterprises start to pay more attention to information security. There is also a diversity of information security products on the market. Based on the ISO27001 standard and the interviews and questionnaires of information security experts, this thesis intends to find the factors affecting the current procedures or controls when an enterprise plans to build up cloud computing environment, and derives the information security assessment criteria through the hierarchical structure and Estimated on the weight, while to provide solutions for business reference, thereby allowing the companies into cloud computing environment, information security can reduce the risk of disaster events. Horng-Tw Liaw Ming-Huang Guo 廖鴻圖 郭明煌 2011 學位論文 ; thesis 134 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === Globally soaring price of the most materials have resulted in a substantial increase in operation costs of enterprises. The emerging cloud computing integrating technologies like virtualization, service management automation and standardization can bring considerable benefits, cost savings and improve acceptance.
By leveraging the power of cloud computing, enterprises can solve problems of high information costs of operating the data center and managing the servers. Nonetheless, there are several items that must be carefully considered and assessed. Among them, information security is on the top of the list.
Rapid change in information technology leads to continuous information security incidents every day. Enterprises start to pay more attention to information security.
There is also a diversity of information security products on the market. Based on the ISO27001 standard and the interviews and questionnaires of information security experts, this thesis intends to find the factors affecting the current procedures or controls when an enterprise plans to build up cloud computing environment, and derives the information security assessment criteria through the hierarchical structure and Estimated on the weight, while to provide solutions for business reference, thereby allowing the companies into cloud computing environment, information security can reduce the risk of disaster events.
|
author2 |
Horng-Tw Liaw |
author_facet |
Horng-Tw Liaw Chih-Ling Chang 張至伶 |
author |
Chih-Ling Chang 張至伶 |
spellingShingle |
Chih-Ling Chang 張至伶 A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments |
author_sort |
Chih-Ling Chang |
title |
A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments |
title_short |
A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments |
title_full |
A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments |
title_fullStr |
A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments |
title_full_unstemmed |
A Study on the Security Factors for Enterprises to Adopt Cloud Computing Environments |
title_sort |
study on the security factors for enterprises to adopt cloud computing environments |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/90862437881368860760 |
work_keys_str_mv |
AT chihlingchang astudyonthesecurityfactorsforenterprisestoadoptcloudcomputingenvironments AT zhāngzhìlíng astudyonthesecurityfactorsforenterprisestoadoptcloudcomputingenvironments AT chihlingchang qǐyèdǎorùyúnduānyùnsuànhuánjìngdezīxùnānquányīnsùzhīyánjiū AT zhāngzhìlíng qǐyèdǎorùyúnduānyùnsuànhuánjìngdezīxùnānquányīnsùzhīyánjiū AT chihlingchang studyonthesecurityfactorsforenterprisestoadoptcloudcomputingenvironments AT zhāngzhìlíng studyonthesecurityfactorsforenterprisestoadoptcloudcomputingenvironments |
_version_ |
1718220600664653824 |