Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method
The growth of cloud computing become one of the fastest technologies adopted in the industry. Nevertheless, cloud computing security issues are still debated and organizations are struggling in safeguarding the security of cloud computing. Moreover, challenges in identifying and evaluating risks in...
Saved in:
Main Authors: | , , |
---|---|
Format: | Book Section |
Published: |
Springer Science and Business Media Deutschland GmbH
2022
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/101089/ http://dx.doi.org/10.1007/978-3-031-00828-3_25 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.101089 |
---|---|
record_format |
eprints |
spelling |
my.utm.1010892023-05-27T07:45:48Z http://eprints.utm.my/id/eprint/101089/ Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method Zainuddin, Nurbaini Che Mohd. Yusuff, Rasimah Samy, Ganthan Narayana QA75 Electronic computers. Computer science The growth of cloud computing become one of the fastest technologies adopted in the industry. Nevertheless, cloud computing security issues are still debated and organizations are struggling in safeguarding the security of cloud computing. Moreover, challenges in identifying and evaluating risks in cloud computing are add-on factors. In this study, we identified threats in cloud computing using judgment-based assessment. Twenty experts were selected to assess the likelihood of threats. The fuzzy Delphi method was used to analyze the assessment results and the list of threats was ranked and discussed in the results. The findings show that security risks are highlighted as the top-ranked compared to organizational or non-cloud-related threats. Springer Science and Business Media Deutschland GmbH 2022 Book Section PeerReviewed Zainuddin, Nurbaini and Che Mohd. Yusuff, Rasimah and Samy, Ganthan Narayana (2022) Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method. In: Recent Advances in Soft Computing and Data Mining Proceedings of the Fifth International Conference on Soft Computing and Data Mining (SCDM 2022), May 30-31, 2022. Lecture Notes in Networks and Systems, 457 (NA). Springer Science and Business Media Deutschland GmbH, Cham, Switzerland, pp. 252-263. ISBN 978-303100827-6 http://dx.doi.org/10.1007/978-3-031-00828-3_25 DOI:10.1007/978-3-031-00828-3_25 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Zainuddin, Nurbaini Che Mohd. Yusuff, Rasimah Samy, Ganthan Narayana Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method |
description |
The growth of cloud computing become one of the fastest technologies adopted in the industry. Nevertheless, cloud computing security issues are still debated and organizations are struggling in safeguarding the security of cloud computing. Moreover, challenges in identifying and evaluating risks in cloud computing are add-on factors. In this study, we identified threats in cloud computing using judgment-based assessment. Twenty experts were selected to assess the likelihood of threats. The fuzzy Delphi method was used to analyze the assessment results and the list of threats was ranked and discussed in the results. The findings show that security risks are highlighted as the top-ranked compared to organizational or non-cloud-related threats. |
format |
Book Section |
author |
Zainuddin, Nurbaini Che Mohd. Yusuff, Rasimah Samy, Ganthan Narayana |
author_facet |
Zainuddin, Nurbaini Che Mohd. Yusuff, Rasimah Samy, Ganthan Narayana |
author_sort |
Zainuddin, Nurbaini |
title |
Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method |
title_short |
Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method |
title_full |
Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method |
title_fullStr |
Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method |
title_full_unstemmed |
Assessing cloud computing security threats in Malaysian organization using fuzzy Delphi method |
title_sort |
assessing cloud computing security threats in malaysian organization using fuzzy delphi method |
publisher |
Springer Science and Business Media Deutschland GmbH |
publishDate |
2022 |
url |
http://eprints.utm.my/id/eprint/101089/ http://dx.doi.org/10.1007/978-3-031-00828-3_25 |
_version_ |
1768006607294169088 |
score |
13.211869 |