Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments

Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments

S. Srinivasan (Texas Southern University, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: March, 2014|Copyright: © 2014 |Pages: 325
DOI: 10.4018/978-1-4666-5788-5
ISBN13: 9781466657885|ISBN10: 146665788X|EISBN13: 9781466657892
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software.

Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cloud Computing
  • Cloud Forensics
  • Cloud Security
  • Green computing
  • Regulatory Aspects and Industry Compliance
  • Risk Management
  • Securing Business IT
  • Trust in the Cloud
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
S. Srinivasan (nickname Srini) joined Texas Southern University (TSU) on August 1, 2013 as Associate Dean for Academic Affairs and Research as well as Distinguished Professor of Business Administration. Prior to coming to TSU, he was Chairman of the Division of International Business and Technology Studies at Texas A & M International University's A.R. Sanchez School of Business in Laredo, TX. Before coming to Laredo, he spent 23 years at the University of Louisville (UofL) in Louisville, Kentucky. At UofL he held joint appointments in the Computer Information Systems Department in the College of Business and the Computer Science Department in the Speed School of Engineering. During the time there he started the Information Security Program as a collaborative effort of multiple colleges. He was Director of the InfoSec program until 2010 when he left for Laredo. The program was designated a National Center of Academic Excellence in Information Assurance Education by the National Security Agency (NSA) and the Department of Homeland Security (DHS). He successfully wrote several grant proposals in support of the InfoSec Program. He is currently completing two books on Cloud Computing. One of them will be published in March 2014 and the other in July 2014. His area of research is Information Security. He has taught the Management of Information Systems course at the MBA level at UofL, in El Salvador and Greece, Texas A & M International University (TAMIU) as well as at Texas Southern University. At TAMIU, he taught the Business Intelligence course as an online course for MBA students. He used the Tableau software for students to have firsthand experience with Business Intelligence processing. He spent his sabbatical leaves from UofL in Siemens at their R & D facility in Munich, Germany; UPS Air Group in Louisville, KY; and GE Appliance Park in Louisville, KY. Besides these industry experiences, he has done consulting work for US Army, IBM and a major hospital company in Louisville, KY. He was the Conference Chair for the 21st Annual Southwestern Business Administration Teaching Conference held at the Jesse H. Jones School of Business at Texas Southern University from October 31 to November 1, 2013. He has been the Category Editor for ACM Computing Reviews since 1985 and is on the Editorial Boards of other journals as well. He volunteers his time extensively for public education causes.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.