A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing
Year of publication: |
2014
|
---|---|
Authors: | Kouatli, Issam |
Published in: |
Journal of Management History. - Emerald Group Publishing Limited, ISSN 1758-7751, ZDB-ID 2020279-9. - Vol. 20.2014, 4, p. 409-433
|
Publisher: |
Emerald Group Publishing Limited |
Subject: | Comparative method | Business ethics | Cloud computing | Work ethic | Technology management | Network security | Work motivation | Vulnerability categories | Cloud ethics | Business security | Cloud business protection | Cloud malware attacks |
-
Kouatli, Issam, (2014)
-
Global business vulnerabilities in cloud computing services
Koutli, Issam, (2016)
-
Impact of un-ethical IT behaviours to cloudy businesses
Kouatli, Issam, (2014)
- More ...
-
Kouatli, Issam, (2014)
-
Impact of un-ethical IT behaviours to cloudy businesses
Kouatli, Issam, (2014)
-
Kouatli, Issam, (2019)
- More ...