透過您的圖書館登入
IP:3.138.101.95

摘要


雲端運算正在蓬勃發展,為使用者提供共享軟硬體資源和訊息服務,帶來資訊的互通性、可攜性與行動性,不少國家都積極推動雲端資訊系統並應用在各行各業。雲端資訊系統在教育上帶來不少效益與突破,但雲端資訊系統的安全性一直都是受關注之議題。本研究的目的在了解雲端資訊系統的安全性問題以及教育機構在使用雲端資訊系統時面對的安全疑慮,經過整合與分析,評選出教育雲端資訊系統之關鍵的安全性因素。在研究方法上,本研究第一階段採用內容分析法,透過面對面非結構式專家訪談法訪談教育機構,了解教育機構在使用教育雲端資訊系統上所面對的安全疑慮,第二階段進行文獻回顧以彙整出文獻中所提及的安全性問題,並與第一階段的分析結果統合而歸納出教育雲端資訊系統安全性因素。設計專家問卷,透過模糊德菲爾法進行分析,以門檻值75.00評選出12個關鍵的安全性因素,建立出教育雲端資訊系統之安全性評估模式,讓教育機構能夠有效地評估教育雲端資訊系統。本研究亦提出提高教育雲端資訊系統之相關建議,期望能夠解決教育機構的安全疑慮,加強教育雲端資訊系統之應用,推動未來創新的教育模式。

並列摘要


Cloud computing is growing quick and well, providing users with shared software and hardware resources and messaging services, bringing information interoperability, portability and mobility. Many countries are actively promoting cloud information systems and applying them in various industries. Cloud information system brings many benefits and breakthroughs in education, but the security of cloud information systems has always been a topic of concern. The purpose of this study is to understand the security issues of cloud information systems and the security concerns that educational institutions face when using cloud information systems. After integration and analysis, the key security factors for educating cloud information systems are selected. The first phase of the study uses content analysis to deal with the results of interview of educational institutions, to understand the security concerns faced by educational institutions in using education cloud information systems. In the second stage, a literature review was conducted to summarize the safety issues mentioned and integrated with the analysis results of the first phase to summarize the safety factors of the education cloud information system. Third, design expert questionnaire, through fuzzy Delphi method analysis, selected 12 key security factors with a threshold of 75.00, established a security assessment model for education cloud information system, enabling educational institutions to effectively evaluate education cloud information system.

參考文獻


Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Security. V3.0, 11-14. 2009.
J. H. Che, Y. Duan, T. Zhang, and J. Fan, “Study on the Security Models and Strategies of Cloud Computing,” Procedia Engineering, 23, pp. 586-593, 2011.
G. Gerbner, (1969). “Cultural indicators: The third voice,” Communication technology and social policy, New York: John Wiley, 1969.
C. Jenkins, “The Three Pillars of a Secure Hybrid Cloud Environment,” Computer Fraud & Security, 6, pp. 13-15. 2013.
S. Khaled, M. Jose, C. Alcaraz, B. B. Jorge, M. Juan, P. Marín, and Z. Sherali, “Analyzing the Security of Windows 7 and Linux for Cloud Computing,” Computers & Security, 34, pp. 113-122, 2013.

延伸閱讀