Open Access. Powered by Scholars. Published by Universities.®
Criminology and Criminal Justice Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Criminology and Criminal Justice
Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde
Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde
Walden Dissertations and Doctoral Studies
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager …