Leveraged BMIS Model for Cloud Risk Control


YouJin Song, Yasheng Pang, Journal of Information Processing Systems Vol. 10, No. 2, pp. 240-255, Apr. 2014  

10.3745/JIPS.03.0004
Keywords: Cloud Risk, CSFs, BMIS, Risk Control, Leverage point, Effective model
Fulltext:

Abstract

Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security management and framework in the information system. In this paper, we find the specific business meaning of the BMIS model and try to apply and leverage this model to cloud risk. Through a previous study, we select and determine the causal risk factors in cloud service, which are also known as CSFs (Critical Success Factors) in information management. Subsequently, we distribute all selected CSFs into the BMIS model by mapping with ten principles in cloud risk. Finally, by using the leverage points, we try to leverage the model factors and aim to make a resource-optimized, dynamic, general risk control business model for cloud service providers.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
YouJin Song and Yasheng Pang (2014). Leveraged BMIS Model for Cloud Risk Control. Journal of Information Processing Systems, 10(2), 240-255. DOI: 10.3745/JIPS.03.0004.

[IEEE Style]
Y. Song and Y. Pang, "Leveraged BMIS Model for Cloud Risk Control," Journal of Information Processing Systems, vol. 10, no. 2, pp. 240-255, 2014. DOI: 10.3745/JIPS.03.0004.

[ACM Style]
YouJin Song and Yasheng Pang. 2014. Leveraged BMIS Model for Cloud Risk Control. Journal of Information Processing Systems, 10, 2, (2014), 240-255. DOI: 10.3745/JIPS.03.0004.