2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) 2014
DOI: 10.1109/icaicta.2014.7005923
|View full text |Cite
|
Sign up to set email alerts
|

Risk management framework with COBIT 5 and risk management framework for cloud computing integration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
4

Year Published

2015
2015
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 5 publications
0
5
0
4
Order By: Relevance
“…One of the frameworks that has been emerging in recent years is the COBIT whose new COBIT 2019 full release will be published by December 2018. This Framework, as extensively documented by the academic literature (Lainhart IV, 2000;Ridley et al, 2004;Khrisna, 2014;Rubino & Vitolla, 2014b;Rubino et al, 2017a and b;Javaid & Iqbal, 2017), is specifically oriented towards defining IT controls aimed at ensuring certain information requirements. The model structure is based on a series of processes that help to implement an effective IT governance system which produces benefits also on the internal control and risk management system.…”
Section: The Risk Framework' Limitations and Weaknesses: The Role Ofmentioning
confidence: 99%
“…One of the frameworks that has been emerging in recent years is the COBIT whose new COBIT 2019 full release will be published by December 2018. This Framework, as extensively documented by the academic literature (Lainhart IV, 2000;Ridley et al, 2004;Khrisna, 2014;Rubino & Vitolla, 2014b;Rubino et al, 2017a and b;Javaid & Iqbal, 2017), is specifically oriented towards defining IT controls aimed at ensuring certain information requirements. The model structure is based on a series of processes that help to implement an effective IT governance system which produces benefits also on the internal control and risk management system.…”
Section: The Risk Framework' Limitations and Weaknesses: The Role Ofmentioning
confidence: 99%
“…Paradigma baru yang diusung oleh cloud computing terkait layanan TIK antara lain : reduksi biaya, fleksibilitas layanan yang tinggi, dan metode akses yang dapat dilakukan dimana saja, kapan saja, dan menggunakan perangkat apa saja (Avram, 2014;Frantsvog, Seymour, & John, 2012;Hsu, Ray, & Li-Hsieh, 2014;Tim Mell, 2009;Zissis & Lekkas, 2011). Hal tersebut dapat menjadi pendorong pemerintah untuk segera melakukan adopsi cloud computing (Zhang & Chen, 2010 (Samani, Honan, & Reavis, 2015), terlebih cloud computing adalah salah satu skema dari outsourcing TIK sehingga manajemen risiko yang tepat harus segera dilaksanakan (Paquette, Jaeger, & Wilson, 2010;Yaumi & Kridanto, 2012 (Susanto, Almunawar, & Tuan, 2011 Research (Hevner, March, Park, & Ram, 2004;Khrisna & Harlili, 2014 memungkinkan kapabilitas dari sisi pengguna dapat dikelola secara langsung .…”
Section: Salah Satu Key Factor Dalam Indikator Networkunclassified
“…The enterprise will be able to identify its weakness and strength for each factor, and then build and prepare plan that can help them to make appropriate decision toward a successful adoption of Cloud Computing [35]. Cloud computing's risks can bring negative effects on any companies or organizations, therefore an effective risk management is needed to balance the operational and financial cost as well as proactive actions to secure data, information systems and technologies [27]. Understanding the true potential of mobile cloud computing and identifying issues with mobile cloud security, privacy, feasibility and accessibility remain a major concern for both the customers and the enterprises [36].…”
Section: Classification Of Critical Cloud Security Issues Based On CLmentioning
confidence: 99%