Cited 14 time in
Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Choi, Myeonggil | - |
| dc.contributor.author | Lee, Changhan | - |
| dc.date.accessioned | 2024-09-26T14:01:49Z | - |
| dc.date.available | 2024-09-26T14:01:49Z | - |
| dc.date.issued | 2015-09 | - |
| dc.identifier.issn | 2071-1050 | - |
| dc.identifier.issn | 2071-1050 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/25377 | - |
| dc.description.abstract | Cloud computing has made it possible for private companies to make rapid changes in their computing environments. However, in the public sector, security issues hinder institutions from adopting cloud computing. To solve these security challenges, in this paper, we propose a methodology for information security management, which quantitatively classifies the importance of information in cloud systems in the public sector. In this study, we adopt a Delphi approach to establish the classification criteria of the proposed methodology in an objective and systematic manner. Further, through a case study of a public corporation, we try to validate the usefulness of the proposed methodology. The results of this study will help public institutions to consider introducing cloud computing and to manage cloud systems effectively and securely. | - |
| dc.format.extent | 20 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | MDPI | - |
| dc.title | Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations | - |
| dc.type | Article | - |
| dc.publisher.location | 스위스 | - |
| dc.identifier.doi | 10.3390/su70912032 | - |
| dc.identifier.scopusid | 2-s2.0-84945237161 | - |
| dc.identifier.wosid | 000362553400035 | - |
| dc.identifier.bibliographicCitation | SUSTAINABILITY, v.7, no.9, pp 12032 - 12051 | - |
| dc.citation.title | SUSTAINABILITY | - |
| dc.citation.volume | 7 | - |
| dc.citation.number | 9 | - |
| dc.citation.startPage | 12032 | - |
| dc.citation.endPage | 12051 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | ssci | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
| dc.relation.journalResearchArea | Environmental Sciences & Ecology | - |
| dc.relation.journalWebOfScienceCategory | Green & Sustainable Science & Technology | - |
| dc.relation.journalWebOfScienceCategory | Environmental Sciences | - |
| dc.relation.journalWebOfScienceCategory | Environmental Studies | - |
| dc.subject.keywordPlus | ISSUES | - |
| dc.subject.keywordPlus | RISK | - |
| dc.subject.keywordAuthor | information classification | - |
| dc.subject.keywordAuthor | information security management | - |
| dc.subject.keywordAuthor | criteria for security measurement | - |
| dc.subject.keywordAuthor | Delphi approach | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
