Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adoption (1)
- Big Data as a Service (BDaaS) (1)
- Business requirements (1)
- Cloud computing (1)
- Cloud-based services (1)
-
- Cloud-computing services (1)
- Cost-effectiveness (1)
- Cyber security (1)
- Cyber strategy (1)
- Data breach (1)
- Flexibility (1)
- Implementation (1)
- Infrastructure as a Service (IaaS) (1)
- Interoperability (1)
- Password protection (1)
- Platform as a Service (PaaS) (1)
- Ransomware (1)
- Scalability (1)
- Service level agreement (SLA) (1)
- Software as a Service (SaaS) (1)
- Storage as a Service (STaaS) (1)
- Virtualization (1)
Articles 1 - 2 of 2
Full-Text Articles in Business
Looking Towards The Sky: Cloud Computing From A Conceptual To An It Industry Game Changer, Jordan Bani
Looking Towards The Sky: Cloud Computing From A Conceptual To An It Industry Game Changer, Jordan Bani
Mountain Plains Journal of Business and Technology
Cloud computing is highly embraced and identified as one of the major innovations in the computing field in recent years. The main goals of this article, which is based on literature reviews and personal work experience, are to present an overview of the conceptual idea of cloud computing, the cloud computing delivery paradigms, common roles in cloud computing, the most mentioned advantages of adopting cloud computing in enterprise environments, the main criticisms facing cloud computing, and recommendations for ensuring the success of cloud computing implementation and adoption, in order to inform and educate business managers, IT managers, and higher education …
Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin
Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin
Mountain Plains Journal of Business and Technology
Ransomware is a strategic threat to government, business, and academic organizations. It has both short term and long term consequences, requiring strategic planning to create defenses, assess options, and create policies.
The purpose of the study is to answer three questions: What is the strategic risk of cyberattack to organizations? What are the current attitudes and practices of executives who are vulnerable to such threats? What are specific options that organizations should consider to prevent and deal with possible incidents in the future? The article is thus comprised of the following components: A) a history of the development and complexity …