Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

2017

Cloud

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh Jan 2017

Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh

Walden Dissertations and Doctoral Studies

Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and …


Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde Jan 2017

Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde

Walden Dissertations and Doctoral Studies

IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager …