Factors Influencing the Security Framework in Cloud Computing: A Case Study of Infrastructure Communications Company

Message:
Article Type:
Case Study (دارای رتبه معتبر)
Abstract:

Cloud computing technology could bring about cost-effectiveness, scalability, usage easiness, and flexibility against environmental changes. Despite several advantages of this technology, the acceptance and movement to the cloud computing environment occurs slowly, particularly in several organizations in developing countries. Cloud computing allows an individual to share distributed sources and services. This study aims to identify the optimal security framework in cloud computing, focusing on the Infrastructure Communications Company as a case study. The method used in this study is descriptive (non-test) and the correlative research scheme is PLS (partial least squares). The participants of the current study were selected among the Tehran Communication Infrastructure Company employees. Based on the Cochran formula and the research population which was 600, 234 were selected using the random sampling method. To measure the security framework in cloud computing, the questionnaires related to Joils and Opria (2017), Tari (2014), Qio and Gayi (2017), and Sing et al. (2016) were used. Findings indicate that the impacts of technological and technical factors, experienced human resources, financial resource provision and secure infrastructures on information technology security were significant (0.01). Moreover, information technology management and supporting regulations on security risk assessment have significant effects. The assessment of security risk has a significant effect on information security. Additionally, information security management and supporting regulations have a significant effect on Goal setting (0.01). Goal setting has a significant effect on environmental and physical security. Based on the results, the evaluated model of the research could explain 0.53 of information security management, 0.50 of security evaluation, 0.36 of goal setting, 0.55 of information security, and 0.35 of environmental security.

Language:
English
Published:
Journal of Information Technology Management, Volume:16 Issue: 2, Spring 2024
Pages:
206 to 222
magiran.com/p2716522  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!