Extent:
Online-Ressource (XXIV, 190 p. 39 illus, digital)
Series:
Type of publication: Book / Working Paper
Language: English
Notes:
Description based upon print version of record
Foreword; Preface; Contents; List of Figures; List of Tables; Acronyms; Abstract; Zusammenfassung; Introduction; 1.1 Problem Description and Motivation; 1.2 Objectives and Benefit; 1.3 Structure of this Dissertation; Foundations; 2.1 Cloud Computing; 2.2 IT Risk Management; 2.2.1 Risk-related Definitions; 2.2.2 The Nature of Perceived Risk as Multi-Dimensional Construct; 2.2.3 IT Risk Management Process; 2.3 Risks in the Context of IT Outsourcing and Cloud Computing; Evaluation of Perceived IT Security Risks; 3.1 Development of Measures Using a Structured Literature Review
3.1.1 Selection of Scientific Databases3.1.2 Selection of Keywords; 3.1.3 Search Filters; 3.1.4 Successive Refinement of Risk Items; 3.2 Scale Evaluation and Refinement Using the Q-Sort Method; 3.3 Scale Evaluation and Refinement Using Qualitative Interviews among Security Researchers; 3.4 Construct Conceptualization and Model Specification; 3.4.1 Formal Measurement Specification; 3.4.2 Descriptions of Security Risk Dimensions; 3.5 Scale Assessment and Validation Using an Empirical Survey; 3.5.1 Survey Development and Implementation; 3.5.2 Methods of Validation
3.6 Analysis of Adoption Decisions3.6.1 Theoretical Perspective and Hypothesis Development; 3.6.2 Description of Measures; 3.6.3 Results of the Statistical Analysis; 3.6.4 Discussion of the Survey's Results; Risk Quantification Framework; 4.1 Model Description; 4.1.1 Parameter Descriptions; 4.1.2 Calculations of the Overall Risk Distribution; 4.1.3 Determination of Risk Measures; 4.2 Simulations; 4.2.1 Identification of Costs Drivers; 4.2.2 Sensitivity Analysis; 4.2.3 Trade-off: Accuracy and Performance; 4.3 Model Applications; 4.3.1 Dynamic Posted Pricing Service
4.3.2 Decision Support System PrototypeRecommended Actions; 5.1 Recommended Actions for Risk Identification; 5.2 Recommended Actions for Risk Quantification; 5.3 Recommended Actions for Risk Treatment; 5.4 Recommended Actions for Risk Review and Evaluation; 5.5 Recommended Actions for Cloud Computing Providers; Limitations, Summary, and Prospect; 6.1 Limitations and Critical Assessment; 6.2 Summary; 6.2.1 Theoretical Contributions; 6.2.2 Practical Contributions; 6.2.3 Conclusion; 6.3 Recommendations for Future Work; Appendix; A.1 Sources for the Literature Review
A.2 Sources for each Risk ItemA.3 Q-Sort Statistics; A.4 Expert Interview Statistics; A.5 Questionnaire Items; A.6 Survey Questionnaire; A.7 Descriptive Sample Characteristics; A.8 Results for Other Structural Equation Models; References
ISBN: 978-3-658-01115-4 ; 1-283-94638-6 ; 978-1-283-94638-4 ; 978-3-658-01114-7
Other identifiers:
10.1007/978-3-658-01115-4 [DOI]
Source:
ECONIS - Online Catalogue of the ZBW
Persistent link: https://www.econbiz.de/10014016425