Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Social and Behavioral Sciences
Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh
Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh
Walden Dissertations and Doctoral Studies
Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and …
Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde
Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde
Walden Dissertations and Doctoral Studies
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager …