透過您的圖書館登入
IP:13.58.112.1
  • 期刊

Impact of Cloud Computing on Information Systems Auditing

並列摘要


It is undeniable that Cloud Computing becomes very popular in modern business. However, from some cases, there are evidences that it has affected personal privacy. Therefore, the need to review current traditional information systems auditing method becomes meaningful. In this research, the nature of the risks brought from cloud computing was explored; threat analysis has been done using Whitman's (2010) 14-category of threats. Finally, Weber's (1998) controls framework was reviewed to find out any gap existing in cloud computing information systems auditing.

並列關鍵字

Cloud Privacy Audit Control Threat

參考文獻


Thomas, A. (2009),' Twitter hack highlights Google Apps vulnerability,' TG Daily, July 16, 2009.
Winkler, I. (2009)', Winkler: The Real Problems with Cloud Computing,' CSO Security and Risk, August 24, 2009
Weber, R.(1998).Information Systems Control and Audit.
Whitman, Michael E.(2003).Enemy at the Gates: Threats to Information Security.Communications of the ACM.46(8),91-96.
Whitman, Michael E.,Mattord, Herbert J.(2010).Management of information security.

延伸閱讀