Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method

The growth of cloud computing become one of the fastest technologies adopted in the industry. Nevertheless, cloud computing security issues are still debated and organizations are struggling in safeguarding the security of cloud computing. Moreover, challenges in identifying and evaluating risks in...

Full description

Saved in:
Bibliographic Details
Main Authors: Zainuddin, Nurbaini, Che Mohd. Yusuff, Rasimah, Samy, Ganthan Narayana
Format: Book Section
Published: Springer Science and Business Media Deutschland GmbH 2022
Subjects:
Online Access:http://eprints.utm.my/id/eprint/101089/
http://dx.doi.org/10.1007/978-3-031-00828-3_25
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.101089
record_format eprints
spelling my.utm.1010892023-05-27T07:45:48Z http://eprints.utm.my/id/eprint/101089/ Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method Zainuddin, Nurbaini Che Mohd. Yusuff, Rasimah Samy, Ganthan Narayana QA75 Electronic computers. Computer science The growth of cloud computing become one of the fastest technologies adopted in the industry. Nevertheless, cloud computing security issues are still debated and organizations are struggling in safeguarding the security of cloud computing. Moreover, challenges in identifying and evaluating risks in cloud computing are add-on factors. In this study, we identified threats in cloud computing using judgment-based assessment. Twenty experts were selected to assess the likelihood of threats. The fuzzy Delphi method was used to analyze the assessment results and the list of threats was ranked and discussed in the results. The findings show that security risks are highlighted as the top-ranked compared to organizational or non-cloud-related threats. Springer Science and Business Media Deutschland GmbH 2022 Book Section PeerReviewed Zainuddin, Nurbaini and Che Mohd. Yusuff, Rasimah and Samy, Ganthan Narayana (2022) Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method. In: Recent Advances in Soft Computing and Data Mining Proceedings of the Fifth International Conference on Soft Computing and Data Mining (SCDM 2022), May 30-31, 2022. Lecture Notes in Networks and Systems, 457 (NA). Springer Science and Business Media Deutschland GmbH, Cham, Switzerland, pp. 252-263. ISBN 978-303100827-6 http://dx.doi.org/10.1007/978-3-031-00828-3_25 DOI:10.1007/978-3-031-00828-3_25
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Zainuddin, Nurbaini
Che Mohd. Yusuff, Rasimah
Samy, Ganthan Narayana
Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
description The growth of cloud computing become one of the fastest technologies adopted in the industry. Nevertheless, cloud computing security issues are still debated and organizations are struggling in safeguarding the security of cloud computing. Moreover, challenges in identifying and evaluating risks in cloud computing are add-on factors. In this study, we identified threats in cloud computing using judgment-based assessment. Twenty experts were selected to assess the likelihood of threats. The fuzzy Delphi method was used to analyze the assessment results and the list of threats was ranked and discussed in the results. The findings show that security risks are highlighted as the top-ranked compared to organizational or non-cloud-related threats.
format Book Section
author Zainuddin, Nurbaini
Che Mohd. Yusuff, Rasimah
Samy, Ganthan Narayana
author_facet Zainuddin, Nurbaini
Che Mohd. Yusuff, Rasimah
Samy, Ganthan Narayana
author_sort Zainuddin, Nurbaini
title Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
title_short Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
title_full Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
title_fullStr Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
title_full_unstemmed Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
title_sort assessing cloud computing security threats in malaysian organization using fuzzy delphi method
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2022
url http://eprints.utm.my/id/eprint/101089/
http://dx.doi.org/10.1007/978-3-031-00828-3_25
_version_ 1768006607294169088
score 13.211869