Abstract
In the cloud computing environment, cybersecurity and data quality capacities and vulnerabilities can have impact on could computing performance. Cloud computing resiliency addresses risks and capabilities in order to make cloud computing stronger and less susceptible to disruptions. Cloud computing provides many opportunities, however, it also presents some cybersecurity and data quality issues. In this paper, we propose a research framework for cybersecurity and data quality in the cloud computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Almutiry, O., Wills, G., Alwabel, A., Crowder, R., WaIters, R.: Toward a framework for data quality in cloud-based health information system. Paper presented at the International Conference on Information Society (i-Society 2013) (2013)
Ani, L.: aCybercrime and national security: the role of the penal and procedural law. Law and Security in Nigeria, 200–202 (2011)
Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. Paper presented at the 2012 International Conference on Computer Science and Electronics Engineering (2012)
Goud, N.: Cyber Attack on Tower Semiconductor. Cybersecurity Insiders. http://www.cybersecurity-insiders.com/cyber-attack-on-tower-semiconductor/ (2020)
Kamara, S., Lauter, K.: Cryptographic cloud storage. Paper presented at the Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization (2010)
Khan, N., Al-Yasiri, A.: Identifying cloud security threats to strengthen cloud computing adoption framework. Paper presented at the the 2nd International Workshop on Internet of Thing: Networking Applications and Technologies (IoTNAT’2016) (2016)
Ramachandra, G., Iftikhar, M., Khan, F.A.: A comprehensive survey on security in cloud computing. Procedia Comput. Sci. 110, 465–472 (2017). https://doi.org/10.1016/j.procs.2017.06.124
Razzaq, A., Hur, A., Ahmad, H.F., Masood, M.: Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial ap- plications. Paper presented at the 2013 IEEE Eleventh International Symposium on Auton- omous Decentralized Systems (ISADS) (2013)
Schneier, B.: The US has suffered a massive cyberbreach. It's hard to overstate how bad it is. The Guardian. Available at: https://www.theguardian.com/commentisfree/2020/dec/23/cyber-attack-us-security-protocols (2020)
Srinivasamurthy, S., Liu, D.Q., Vasilakos, A.V., Xiong, N.: Security and privacy in cloud computing: a survey. Parallel Cloud Comput. 2(4), 126–149 (2013)
Strong, D.M., Lee, Y.W., Wang, R.Y.: Data quality in context. Commun. ACM 40, 103–110 (1997)
Xu, H.: Factor Analysis of Critical Success Factors for Data Quality. Paper presented at the AMCIS (2013)
Xu, H., Horn Nord, J., Brown, N., Daryl Nord, G.: Data quality issues in implementing an ERP. Ind. Manag. Data Syst. 102(1), 47–58 (2002). https://doi.org/10.1108/02635570210414668
Xu, H., Mahenthiran, S.: Users’ perception of cybersecurity, trust and cloud computing providers’ performance. Inform. Comput. Secur. 29(5), 816–835 (2021). https://doi.org/10.1108/ICS-09-2020-0153
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012). https://doi.org/10.1016/j.future.2010.12.006
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, H. (2023). Cybersecurity and Data Quality in Cloud Computing: A Research Framework. In: Papadaki, M., Rupino da Cunha, P., Themistocleous, M., Christodoulou, K. (eds) Information Systems. EMCIS 2022. Lecture Notes in Business Information Processing, vol 464. Springer, Cham. https://doi.org/10.1007/978-3-031-30694-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-30694-5_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30693-8
Online ISBN: 978-3-031-30694-5
eBook Packages: Computer ScienceComputer Science (R0)