The difference of awareness between public institutions and private enterprises for cloud computing security

Junseok Oh, Young Bae Yoon, Jong Ryeol Suh, Bong Gyou Lee

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Cloud computing has become one of the important technologies for reducing cost and increasing productivity by efficiently using IT resources in companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes also have plans to introduce the system in Korea. Various researches have pointed out security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the expected security threats and their correspondents for solving problems. Cloud computing security area is classified into managerial, physical and technical area in the research. The research derives the influence of security priorities in each area on the importance of security issues according to the recognition of workers in private enterprise and public institutions by ordered probit model. The ordered probit model is used to analyze the influences and marginal effects of awareness for security importance in each area on the degree of security priority. The results show workers in public agencies regard the technical security as the highest priority, otherwise the physical and managerial security are considered as the critical security factors in private enterprise. This research compared the difference of recognitions for the security priority in three areas between workers in private enterprise which are using cloud computing services and them in public institutions that has never used the services. It contributes to the establishment of strategies in aspect of security by providing guidelines to companies or agencies which want to introduce the cloud computing systems.

Original languageEnglish
Pages (from-to)1-10
Number of pages10
JournalInternational Journal of Security and its Applications
Volume6
Issue number3
Publication statusPublished - 2012 Aug 27

Fingerprint

Cloud computing
Industry
Productivity
Costs

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

@article{ab56b8717d6b4513822419cf0fcb4e9f,
title = "The difference of awareness between public institutions and private enterprises for cloud computing security",
abstract = "Cloud computing has become one of the important technologies for reducing cost and increasing productivity by efficiently using IT resources in companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes also have plans to introduce the system in Korea. Various researches have pointed out security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the expected security threats and their correspondents for solving problems. Cloud computing security area is classified into managerial, physical and technical area in the research. The research derives the influence of security priorities in each area on the importance of security issues according to the recognition of workers in private enterprise and public institutions by ordered probit model. The ordered probit model is used to analyze the influences and marginal effects of awareness for security importance in each area on the degree of security priority. The results show workers in public agencies regard the technical security as the highest priority, otherwise the physical and managerial security are considered as the critical security factors in private enterprise. This research compared the difference of recognitions for the security priority in three areas between workers in private enterprise which are using cloud computing services and them in public institutions that has never used the services. It contributes to the establishment of strategies in aspect of security by providing guidelines to companies or agencies which want to introduce the cloud computing systems.",
author = "Junseok Oh and Yoon, {Young Bae} and Suh, {Jong Ryeol} and Lee, {Bong Gyou}",
year = "2012",
month = "8",
day = "27",
language = "English",
volume = "6",
pages = "1--10",
journal = "International Journal of Security and its Applications",
issn = "1738-9976",
publisher = "Science and Engineering Research Support Society",
number = "3",

}

The difference of awareness between public institutions and private enterprises for cloud computing security. / Oh, Junseok; Yoon, Young Bae; Suh, Jong Ryeol; Lee, Bong Gyou.

In: International Journal of Security and its Applications, Vol. 6, No. 3, 27.08.2012, p. 1-10.

Research output: Contribution to journalArticle

TY - JOUR

T1 - The difference of awareness between public institutions and private enterprises for cloud computing security

AU - Oh, Junseok

AU - Yoon, Young Bae

AU - Suh, Jong Ryeol

AU - Lee, Bong Gyou

PY - 2012/8/27

Y1 - 2012/8/27

N2 - Cloud computing has become one of the important technologies for reducing cost and increasing productivity by efficiently using IT resources in companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes also have plans to introduce the system in Korea. Various researches have pointed out security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the expected security threats and their correspondents for solving problems. Cloud computing security area is classified into managerial, physical and technical area in the research. The research derives the influence of security priorities in each area on the importance of security issues according to the recognition of workers in private enterprise and public institutions by ordered probit model. The ordered probit model is used to analyze the influences and marginal effects of awareness for security importance in each area on the degree of security priority. The results show workers in public agencies regard the technical security as the highest priority, otherwise the physical and managerial security are considered as the critical security factors in private enterprise. This research compared the difference of recognitions for the security priority in three areas between workers in private enterprise which are using cloud computing services and them in public institutions that has never used the services. It contributes to the establishment of strategies in aspect of security by providing guidelines to companies or agencies which want to introduce the cloud computing systems.

AB - Cloud computing has become one of the important technologies for reducing cost and increasing productivity by efficiently using IT resources in companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes also have plans to introduce the system in Korea. Various researches have pointed out security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the expected security threats and their correspondents for solving problems. Cloud computing security area is classified into managerial, physical and technical area in the research. The research derives the influence of security priorities in each area on the importance of security issues according to the recognition of workers in private enterprise and public institutions by ordered probit model. The ordered probit model is used to analyze the influences and marginal effects of awareness for security importance in each area on the degree of security priority. The results show workers in public agencies regard the technical security as the highest priority, otherwise the physical and managerial security are considered as the critical security factors in private enterprise. This research compared the difference of recognitions for the security priority in three areas between workers in private enterprise which are using cloud computing services and them in public institutions that has never used the services. It contributes to the establishment of strategies in aspect of security by providing guidelines to companies or agencies which want to introduce the cloud computing systems.

UR - http://www.scopus.com/inward/record.url?scp=84865276314&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84865276314&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84865276314

VL - 6

SP - 1

EP - 10

JO - International Journal of Security and its Applications

JF - International Journal of Security and its Applications

SN - 1738-9976

IS - 3

ER -