(3.235.25.169) 您好!臺灣時間:2021/04/18 05:16
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:安從瑄
研究生(外文):Cong-Syuan An
論文名稱:運用灰關聯分析辨識和評估雲端運算風險
論文名稱(外文):Employing the Grey Relational Analysis to Identify and Evaluate Cloud Computing Risks
指導教授:范姜肱范姜肱引用關係
指導教授(外文):Chiang Ku Fan
口試委員:范姜肱李珍穎張吉宏
口試委員(外文):Chiang Ku FanChen-Ying LeeChi-Hung Chang
口試日期:2013-04-26
學位類別:碩士
校院名稱:實踐大學
系所名稱:財務金融學系碩士班
學門:商業及管理學門
學類:財務金融學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:英文
論文頁數:54
中文關鍵詞:雲端運算風險管理灰關聯分析
外文關鍵詞:Cloud ComputingRisk ManagementGrey Relational Analysis
相關次數:
  • 被引用被引用:0
  • 點閱點閱:220
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:7
  • 收藏至我的研究室書目清單書目收藏:1
雲端運算提供能滿足一般日常所需如水、氣、電話、電力公司的運算服務,但它也不可避免地觸發一定程度的損失風險。不幸的是,過去的研究主要集中於評估雲端運算損失風險的結果,且缺乏客觀的科學方法。
本研究使用德菲法及灰關聯分析辨識和評估雲端運算的風險。研究結果顯示:「協議或契約」、「社交工程」、「員工故意或意外造成的錯誤」、「系統漏洞」和「跨雲端平台相容性」被評為高頻率和高幅度雲端風險。「隱私」和「員工故意或意外造成的損壞」為較嚴重的雲端風險但發生頻率較低。「管轄權」、「 盜竊」、「正常磨損與破損或故障」和「天然災害」則被評為低頻率和低幅度雲端風險。
Cloud computing will provide the basic levels of computing services that are considered essential to meet the everyday needs of the general community, similar to water, gas, telephone, and electrical utilities, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on evaluating the loss exposure that results from cloud computing.
In this study, a modified Delphi method and the grey relational analysis (GRA) were employed to identify and evaluate risks of cloud computing. Research findings show that the risks of Agreement or contract, Social engineering, Mistakes made by employees intentionally or accidentally, System vulnerability, and Cross-cloud compatibility are rated highly on severity and frequency. The risks of Privacy and Damaged or spoiled by employees intentionally or accidentally are perceived as being more severe risks but occur at lower frequencies. The risks of Jurisdiction, Burglary, Normal wear and tear or malfunction, and Natural disaster are rated lower on severity and frequency.

ABSTRACT I
摘 要 II
CONTENTS III
LIST OF FIGURES IV
LIST OF TABLE V

1. INTRODUCTION 1
2. LITERATURE REVIEW 2
2.1. The Definition of Cloud Computing 2
2.2. Risk Assessment and Plotting the Risk Management Matrix 4
2.3. Risks of Cloud Computing Services 6
3. METHODOLOGY 8
3.1. The Delphi Study 9
3.2. Calculate the Grey Relation Grade. 11
3.3. Data Normalization (or Data Dimensionless) 12
4. RESULTS 14
4.1. Results from the Delphi Study 14
4.2. The Relative Weight of Each Identified Risk’s Severity 16
4.3. The Relative Weight of Each Identified Risk’s Frequency 21
4.4. The Relative Weights of Severity and Frequency of Each Identified Risk 22
4.5. The Customized Risk Management Matrix 23
5. CONCLUSIONS AND IMPLICATIONS 25
REFERENCES 27
APPENDIX A 31
APPENDIX B 38
APPENDIX C 44
APPENDIX D 50
1.Adler, M., and E. Ziglio, 1996, Gazing into the oracle, Jessica Kingsley Publishers: Bristol, PA.

2.Armburst, M., A. Fox, R. Griffith, A.D. Joseph, R. Katz, and A. Konwinski, et al., 2009, “Above the Clouds: A Berkley View of Cloud Computing”, Retrieved on Dec. 5, 2011 from
http://radlab.cs.berkekey.edu/

3.Aven, T., and O. Renn, 2009, “The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk”, Risk Analysis: An International Journal, 29(4), pp.587-600.

4.Awati, K., 2009, Cox’s Risk Matrix Theorem and Its Implications for Project Risk Management. Retrieved on Dec 18, 2011 from http://eight2late.wordpress.com/2009/07/01/cox%E2%80%99s-risk-matrix-theorem-and-its-implications-for-project-risk-management/

5.Bublitz, E., 2010, “Catching The Cloud: Managing Risk When Utilizing Cloud Computing”, National Underwriter P & C. 114(39), pp.12-6.

6.Buyya, R. and M. Parashar, 2010, “User requirements for cloud computing architecture”, Proc. 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, Melbourne, Australia. 17-20 May 2010, pp.625-30.

7.Casale, J., 2010, “Social Networking, Cloud Computing Bring New Risk Exposures”, Business Insurance, 44(38), p.17.

8.Cornish, E., 1977, The study of the future. World Future Society: Washington, D.C.

9.Cox, L.A., 2008, “What’s Wrong with Risk Matrices?” Risk Analysis, 28(2), pp.497-515.

10.Dalkey, N. C., 1969, The Delphi Method: An Experimental Study of Group Opinion, prepared for United States Air Force Project Rand, Santa Monica.

11.Deng, J., 1989, “Introduction to Grey System”, Journal of Grey System, 1(1), pp.1-24.

12.Deng, J., 1999, Grey System Theory and Applications, Kao-Li, Taiwan.

13.Fowles, J., 1978, Handbook of futures research. Greenwood Press: Connecticut.

14.Gutierrez, O., 1989, “Experimental Techniques for Information Requirement Analysis”, Information and Management, Vol. 16, pp.31-43.

15.Jaeger, P.T., J.M. Grimes, J. Lin, and S.N. Simmons, 2009, “Where Is the Cloud?”, Geography, Economics, Environment, and Jurisdiction in Cloud Computing, 14(5), pp.4-15.

16.Jick, T. O., 1979, Mixing gualitative and quantitative methods: Triangulation in action. Administrative Science Quarterly, December, pp.602-611.

17.Knorr, E. and G. Gruman, 2011, What Cloud Computing Really Means. Retrieved on Dec 5, 2011 from http://www.infoworld.com/d/cloud-computing/wht-cloud-computing-really-means-031

18.Lackennair, G., 2010, Hybrid Cloud Architectures for the Online Commerce, Procedia Computer Science, 3, p.p. 550-5.

19.Lim, S.H., 2011, “Risks in the North Korean Special Economic Zone: Context, Identification, and Assessment”, Emerging Markets Finance & Trade, 47(1), pp.50-66.

20.Masser, I. and P. Foley, 1987, “Delphi Revisited: Expert Opinion in Urban Analysis”, Urban Studies, Vol. 24, pp.217-225.

21.Paquette, S., P.T. Jaeger, and S.C. Wilson, 2010, “Identifying the Security Risks Associated with Governmental Use of Cloud Computing”, Government Information Quarterly 27, pp.245-53.

22.Paquette, S., P. T. Jaeger, and S. C. Wilson, 2010, Identifying the security risks associated with governmental use of Cloud Computing, Government Information Quarterly 27 , p.p. 245-53.

23.Perry, C., Riege, A., and L. Brown, 1999, “Realism’s role among scientific paradigms in marketing research”, Irish Marketing Review, Vol. 12, No.2, pp.16-23.

24.Picado, F., G. Barmen, G. Bengtsson, S. Cuadra, K. Jakobsson and A. Mendoza, 2010, “ Ecological, Groundwater, and Human Health Risk Assessment in a Mining Region of Nicaragua”, Risk Analysis: An International Journal, 30(6), pp.916-33.

25.Pintar, K. D. M., D.F. Charron, A. Fazil, S. A. McEwen, F. Pollari, and D. Waltner-Toews, 2010, “A Risk Assessment Model to Evaluate the Role of Fecal Contamination in Recreational Water on the Incidence of Cryptosporidiosis at the Community Level in Ontario”, Risk Analysis: An International Journal, 30(1), pp.49-64.

26.Rejda, G. E., 2011, Principles of Risk Management and Insurance, 11th Edition, Prentice Hall, New Jersey.

27.Rowe, G., G. Wright, and F. Bolger, 1991, “Delphi: A re-evaluation of Research and Theory”, Technological Forecasting, Vol. 39, pp.235-251.

28.Subashini, S., and V. Kavitha, 2011, “A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of Network and Computer Applications, 34, pp.1-11.

29.Subashini, S., and V. Kavitha, 2011, A survey on Security Issues in Service Delivery Models of Cloud computing, Journal of Network and Computer Applications, 34, p.p. 1-11.

30.Svantesson, D., and R. Clarke, 2010, “Privacy and Consumer Risks in Cloud Computing, Computer Law & Security Review, 26, pp.391-7.

31.Svantesson, D., and R. Clarke, 2010, Privacy and Consumer Risks in Cloud Computing, Computer Law & Security Review, 26, p.p. 391-7.

32.Tisnovsky, R., 2010, Risk versus Value in Outsourced Cloud computing, Financial Executive, November, p.p. 64-5.

33.Ward, B. T., and J. C. Sipior, 2010, The Internet Jurisdiction Risk of Cloud Computing, Information Systems Management, 27, pp. 334-9.

34.Woudenberg, F., 1991, “An Evaluation of Delphi”, Technological Forecasting and Social Change, Vol. 40, pp.131-150.

35.Zissis, D., and D. Lekkas, 2012, Addressing Cloud Computing Security Issues, Future Generation Computer Systems, 28, pp. 583-92.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔