References
- Richter F. Amazon captures 32% of the $80 billion cloud market. Statistica. Retrieved from https://www.statista.com/chart/7994/cloud-market-share/, 2019.
- Roche J. Goldman eyes financial cloud, taking a page from Amazon’s playbook. Yahoo Finance. Retrieved from https://finance.yahoo.com/news/goldman-sachs-to-build-financial-cloud-for-new-revenue-streams-155623957.html, 2020.
- 451 Research. Invent 2018. 451 Research Press Release. Retrieved from https://451research.com/images/Marketing/press_releases/Pre_Re-Invent_2018_press_release_final_11_22.pdf, 2018.
- IDG Communications, https://cdn2.hubspot.net/hubfs/1624046/2018%20Cloud%20Computing%20Executive%20Summary.pdf, 2018
- Aljabre A. Cloud computing for increased business value. Int J Business Soc Sci. 2012;3:234–39.
- Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology (NIST). Special Publication 800-145. US Department of Commerce. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-145/final, 2011.
- Vithayathil J. Will cloud computing make the Information Technology (IT) department obsolete? Inf Syst J. 2018;28(4):634–49. doi:10.1111/isj.12151.
- Gordon S, Ford R. On the definition and classification of cybercrime. J Comput Virol. 2006;2(1):13–20. doi:10.1007/s11416-006-0015-z.
- Stavridis V. 10 Cybersecurity trends to watch going into 2020. Cybint. Retrieved from https://www.cybintsolutions.com/10-cybersecurity-trends-to-watch/, 2019.
- Thycotic JC. Increasing cyber threats will force organisations to embrace cloud security in 2020. CSO Online. Retrieved from https://www.csoonline.com/article/3514555/increasing-cyber-threats-will-force-organisations-to-embrace-cloud-security-in-2020.html, 2020.
- Avey C. 7 key cybersecurity threats to cloud computing. Cloud Academy. Retrieved from https://cloudacademy.com/blog/key-cybersecurity-threats-to-cloud-computing/, 2019.
- Ranger S. Cloud computing: here’s how much a huge outage could cost you. ZDNet. Retrieved from https://www.zdnet.com/article/cloud-computing-heres-how-much-a-huge-outage-could-cost-you/, 2018.
- Bradley RV, Byrd TA, Pridmore JL, Thrasher E, Pratt RM, Mbarika VW. An empirical examination of antecedents and consequences of IT governance in US hospitals. J Inf Technol. 2012;27(2):156–77. doi:10.1057/jit.2012.3.
- Zhang X, Wuwong N, Li H, Zhang X. Information security risk management framework for the cloud computing environments. In Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010 June 29–July 1, Bradford, West Yorkshire, UK, (pp. 1328–34). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5577860&casa_token=1-SgjoG39KcAAAAA:AioZqXkYWcFVFU-SceQByaHxzViKOjYGXUVMaOtTl2ASFlVHlQHS0WJl6vbGCZ_PVRJ0Uyo43w&tag=1
- Choudhary V, Vithayathil J. The impact of cloud computing: should the IT department be organized as a cost center or a profit center? J Manage Inf Syst. 2013;30(2):67–100. doi:10.2753/MIS0742-1222300203.
- Kathuria A, Mann A, Khuntia J, Saldanha TJ, Kauffman RJ. A strategic value appropriation path for cloud computing. J Manage Inf Syst. 2018;35(3):740–75. doi:10.1080/07421222.2018.1481635.
- Hsieh PJ. An empirical investigation of patients’ acceptance and resistance toward the health cloud: the dual factor perspective. Comput Human Behav. 2016;63:959–69. doi:10.1016/j.chb.2016.06.029.
- Hsu PF, Ray S, Li-Hsieh YY. Examining cloud computing adoption intention, pricing mechanism, and deployment model. Int J Inf Manage. 2014;34(4):474–88. doi:10.1016/j.ijinfomgt.2014.04.006.
- Mann, A., Kathuria, A., Khuntia, J., Saldanha, T. Cloud-integration and business flexibility: The mediating role of cloud functional capabilities Americas Conference on Information Systems (AMCIS) San Diego, CA, USA. August 11-14, 2016. https://aisel.aisnet.org/amcis2016/SCU/Presentations/17
- Porcedda, M. G. (2018). Patching the patchwork: appraising the EU regulatory framework on cyber security breaches. Computer law & security review, 34(5), 1077–1098.
- Anicas M. How to mitigate DDoS attacks against your website with Cloudflare. Digital Ocean. Retrieved from https://www.digitalocean.com/community/tutorials/how-to-mitigate-ddos-attacks-against-your-website-with-cloudflare, 2015.
- Lee S, Ong I, Lim H, Lee H. Two factor authentication for cloud computing. J Inf Commun Converg. 2010;8(4):427–32. doi:10.6109/jicce.2010.8.4.427.
- Park JH, Park JH. Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry. 2017;9(8):164. doi:10.3390/sym9080164.
- Kim H-W, Kankanhalli A. Investigating user resistance to information systems implementation: a status quo bias perspective. MIS Quarterly. 2009;33(3):567–82. doi:10.2307/20650309.
- Park SC, Ryoo SY. An empirical investigation of end-users’ switching toward cloud computing: a two factor theory perspective. Comput Human Behav. 2013;29(1):160–70. doi:10.1016/j.chb.2012.07.032.
- Zech P. Risk-based security testing in cloud computing environments. In Proceedings of the Fourth IEEE International Conference on Software Testing, Verification and Validation, 2011 Mar 21-25, Berlin, Germany, (pp. 411–14). IEEE, 2011. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5770631&casa_token=Nmr1QtdlsycAAAAA:vjR4u7wAlV1On0ZrT_EsCK1bTU-8aN8O4HS5tjUgnmXsB8zPZWc3kUtcvcb0MyoucA2RcVZ19g
- Lunardi GL, Maçada ACG, Becker JL. IT governance effectiveness and its antecedents: an empirical examination in Brazilian firms. In Proceedings of 47th Hawaii International Conference on System Sciences (HICSS) 2014, January 6-9, 2014, Waikoloa, HI, USA. (pp. 4376–85). IEEE, 2014. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6759142&casa_token=kdgvOckzDp0AAAAA:ricSpN_pU10xODu9RK1Uy05gNzANoI8zxMEBoa_6xF244l0_l89mdM_elPWa41lYnUjEZYLK7A
- Dikaiakos MD, Katsaros D, Mehra P, Pallis G, Vakali A. Cloud computing: distributed internet computing for IT and scientific research. Internet Comput IEEE. 2009;13(5):10–13. doi:10.1109/MIC.2009.103.
- Mejias RJ, Harvey MG. A case for information security awareness (ISA) programmes to protect global information, innovation and knowledge resources. Int J Trans Innov Syst. 2012;2(3–4):302–24. doi:10.1504/IJTIS.2012.051535.
- Mimoso M. Hacker puts hosting service code spaces out of business. Threatpost. Retrieved from https://threatpost.com/hacker-puts-hosting-service-code-spaces-out-of-business/106761/, 2014.
- Afrahim M. Sesame Street among many Volusion customers are compromised; how the cookie monster is stealing credit card info. Retrieved from https://blog.usejournal.com/sesame-street-volusion-customers-are-comprised-how-the-cookie-monster-is-stealing-cc-numbers-21eb51ec613b, 2019.
- Sabherwal R, Chan YE. Alignment between business and IS strategies: a study of prospectors, analyzers, and defenders. Inf Syst Res. 1988;12(1):11–33. doi:10.1287/isre.12.1.11.9714.
- Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 2020;34(3):523–48. doi:10.2307/25750690.
- Express Computer. Hackers are using google cloud services to conceal phishing attacks, warns check point. Express Computer. Retrieved from https://www.expresscomputer.in/news/hackers-are-using-google-cloud-services-to-conceal-phishing-attacks-warns-check-point/60976/, 2020.
- Brender N, Markov I. Risk perception and risk management in cloud computing: results from a case study of Swiss companies. Int J Inf Manage. 2013;33(5):726–33. doi:10.1016/j.ijinfomgt.2013.05.004.
- Cloudflare. Business service level agreement. Cloudflare. Retrieved from https://www.cloudflare.com/business-sla/, 2020.
- Giles M. 5 key security lessons from the cloud hopper mega hack. Forbes. Retrieved from https://www.forbes.com/sites/martingiles/2020/01/03/cloud-computing-security-cloud-hopper/#45e3ba4b4552, 2020.
- Greig J. Cloud misconfigurations cost companies nearly $5 trillion. TechRepublic. Retrieved from https://www.techrepublic.com/article/cloud-misconfigurations-cost-companies-nearly-5-trillion/, 2020.
- Osborne C. National Credit Foundation leaked US citizen data through unsecured AWS bucket. ZDNet. Retrieved from https://www.zdnet.com/article/national-credit-federation-leaked-us-citizen-data-through-unsecured-aws-bucket/, 2014.
- Cloud Security Alliance. The treacherous 12. Top threats to cloud computing + industry insights. Cloud Security Alliance. Retrieved from https://cloudsecurityalliance.org/group/top-threats/, 2017.
- Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, andfine-grained data access control in cloudcomputing. In Proceedings of IEEE INFOCOM, 2010 Mar 15-19. San Diego, CA, USA, (pp. 1–9).IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5462174&casa_token=YX9AHugz6DsAAAAA:_3U0F9tdGktVSNlA7isxxrffelCxHGtoeXYkTuG3xnTQtEf0o0tVtCM3gYoBkWT5NXRyH8RYkQ
- Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M. A view of cloud computing. Communications of the ACM, 53(4), 50–58, 2010.
- Buyya R, Ranjan R, Calheiros RN. Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: challenges and opportunities. In 2009 International Conference on High Performance Computing & Simulation (pp. 1–11). IEEE, 2009.
- Hair JF, Black WC, Babin BJ, Anderson RE, Tatham RL. Multivariate Data Analysis. 10th. Upper Saddle River (NJ): Pearson Prentice Hall; 2010.
- Woodside AG, Wilson EJ. Case study research methods for theory building. J Bus Ind Mark. 2003;18(6/7):493–508. doi:10.1108/08858620310492374.
- Goud N. By 2023 cloud security spending to reach $12.6 billion. Cybersecurity Insiders. Retrieved from https://www.cybersecurity-insiders.com/by-2023-cloud-security-spending-to-reach-12-6-billion/. 2020.
- Cochran M, Witman PD. Governance and service level agreement issues in a cloud computing environment. J Inf Technol Manage. 2011;22:41–55.
- Dillet R. Cloudflare’s servers were down for close to one hour due to crashing of their edge routers, and resulting in the taking down of 785,000 websites, including 4chan and WikiLeaks. Techcrunch. Retrieved from https://techcrunch.com/2013/03/03/cloudflare-is-down-due-to-dns-outage-taking-down-785000-websites-including-4chan-wikileaks-metallica-com/, 2013.
- Verma, A. h ttps://w ww.w hizlabs.com/blog/amazon-a ws-outage/#:~:text=According%20to%20news%20reports%2C%20AWS,of%20downtime%20for%20AWS%20services, 2019
- Corcoran, J. https://threatpost.com/aws-arrest-data-breach-capital-one/146758/, 2019
- Goodin, D. https://arstechnica.com/information-technology/2019/07/feds-former-cloud-worker-hacks-into-capital-one-and-takes-data-for-106-million-people/, 2019
- Spitzner, L. Honeypots: Catching the insider threat. In Proceedings of the 19th Annual Computer Security Applications Conference December 8-12, 2003. Las Vegas, NV, USA, December 2003. (pp. 170–179 https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1254322&casa_token=FbZ0X63EYKwAAAAA:PJqjv4e59x3mFMSie_kD5mZIkUQbXeyygyFVg5RV3V6nlOtS6ZJh_IEZE8M9BbWrL04eEREhOg). IEEE., 2003.
- DivvyCloud, https://divvycloud.com/wp-content/uploads/2020/02/Cloud-Misconfiguration-Report-FINAL.pdf
- Uchiumi, T., Kikuchi, S., Matsumoto, Y. Misconfiguration detection for cloud datacenters using decision tree analysis. In Proceedings of the 14th Asia-Pacific Network Operations and Management Symposium (APNOMS), September 2012 September 25-27, 2012. Seoul, South Korea (pp. 1–4 https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6356072&casa_token=TBQB-1SFlmwAAAAA:Og3_Svp-6hFyEm741o4kSw2VSNtTXaVOwserVdcLpnt4oHXUm01OrpUfA3V9jvwr2rZdsaHXXg). IEEE. 2012.
- UNISYS, https://www.unisys.com/offerings/cloud-and-infrastructure-services/news%20release/one-in-three-cloud-migrations-fail-unisys-cloud-success-barometer, 2019
- Shevlin, R. https://www.forbes.com/sites/ronshevlin/2020/08/17/cloud-computing-raises-new-cybersecurity-concerns-for-banking/#3e87219424ae
- Perry, Y. https://cloud.netapp.com/blog/aws-cvo-blg-amazon-s3-buckets-finding-open-buckets-with-grayhat-warfare, 2020
- Henderson, N. https://www.datacenterknowledge.com/shared/millions-verizon-customer-records-exposed-through-open-amazon-s3-bucket, 2017