Search results

1 – 3 of 3
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 14 February 2019

David Lewis Coss and Gurpreet Dhillon

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their…

1210

Abstract

Purpose

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy values with respect to cloud computing to define cloud privacy objectives.

Design/methodology/approach

For the purpose of this study, the authors adopted Keeney’s (1994) value-focused thinking approach to identify privacy objectives with respect to cloud computing.

Findings

The results of this study identified the following six fundamental cloud privacy objectives: to increase trust with cloud provider, to maximize identity management controls, to maximize responsibility of information stewardship, to maximize individual’s understanding of cloud service functionality, to maximize protection of rights to privacy, and to maintain the integrity of data.

Research limitations/implications

One limitation is generalizability of the cloud privacy objectives, and the second is research bias. As this study focused on cloud privacy, the authors felt that the research participants’ increased knowledge of technology usage, including that of cloud technology, was a benefit that outweighed risks associated with not having a random selection of the general population. The newness and unique qualities of privacy issues in cloud computing are better fitted to a qualitative study where issues can emerge naturally through a holistic approach opposed to trying to force fit an existing set of variables or constructs into the context of privacy and cloud computing.

Practical implications

The findings of this research study can be used to assist management in the process of formulating a cloud privacy policy, develop cloud privacy evaluation criteria as well as assist auditors in developing their privacy audit work plans.

Originality/value

Currently, there is little to no guidance in the literature or in practice as to what organizations need to do to ensure they protect their stakeholders privacy in a cloud computing environment. This study works at closing this knowledge gap by identifying cloud privacy objectives.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 1948

F.C. Francis

The foundation collection of the printed books now forming the Library of the British Museum was that of Sir Hans Sloane. This comprised about 40,000 volumes. To it was added in…

128

Abstract

The foundation collection of the printed books now forming the Library of the British Museum was that of Sir Hans Sloane. This comprised about 40,000 volumes. To it was added in 1759 the Royal collection, begun in the time of Henry VII and inherited by George II from his predecessors on the throne.

Details

Journal of Documentation, vol. 4 no. 1
Type: Research Article
ISSN: 0022-0418

Access Restricted. View access options
Book part
Publication date: 30 December 2004

John Logan

The campaign for striker replacement legislation, which began in the late 1980s and had effectively ended by the mid-1990s, was the most important political battle over labor…

Abstract

The campaign for striker replacement legislation, which began in the late 1980s and had effectively ended by the mid-1990s, was the most important political battle over labor legislation since the defeat of the Labor Law Reform Bill in 1978. Striker replacement was the AFL-CIO’s top legislative priority in the early 1990s and, coming quickly after the passage of NAFTA, which labor had opposed, the defeat of its campaign solidified organized labor’s reputation for failure in legislative battles. As yet, however, the political campaign for striker replacement legislation has attracted surprisingly little attention from industrial relations scholars.

Details

Advances in Industrial & Labor Relations
Type: Book
ISBN: 978-1-84950-305-1

1 – 3 of 3
Per page
102050