Next Article in Journal
Electrochemical DNA Sensor Based on Carbon Black—Poly(Neutral Red) Composite for Detection of Oxidative DNA Damage
Next Article in Special Issue
Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System
Previous Article in Journal
The Limpet: A ROS-Enabled Multi-Sensing Platform for the ORCA Hub
Previous Article in Special Issue
An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model

1
Polytech Nantes, University of Nantes, 44200 Nantes, France
2
College of Logistics and E-Commerce, Zhejiang Wanli University, Ningbo 315100, China
3
Coggin College of Business, University of North Florida, Jacksonville, FL 32224, USA
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(10), 3488; https://doi.org/10.3390/s18103488
Submission received: 30 August 2018 / Revised: 2 October 2018 / Accepted: 12 October 2018 / Published: 16 October 2018

Abstract

:
With the growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS), cloud- based systems have assumed a greater important role. However, there lacks formal approaches to modeling the risks transferred through information systems implemented in a cloud-based environment. This paper explores formal methods to quantify the risks associated with an information system and evaluate its variation throughout its implementation. Specifically, we study the risk variation through a quantitative and longitudinal model spanning from the launch of a cloud-based information systems project to its completion. In addition, we propose to redefine the risk estimation method to differentiate a mitigated risk from an unmitigated risk. This research makes valuable contributions by helping practitioners understand whether cloud computing presents a competitive advantage or a threat to the sustainability of a company.

1. Introduction

The growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS) has demanded more systems to be deployed in cloud-based environments in order to facilitate workflows and system functions in a large-scale network [1,2]. Developed from the convergence of several massive information processing technologies, cloud computing has become a paradigm in organizational transformation, particularly influencing small- and medium-sized businesses that use public cloud-based systems. The impact of cloud computing on the outsourcing process of information systems (IS) poses complex questions for market players in the digital economy.
Issues of cloud computing such as loss of data control and ambiguity concerning its legal framework have revealed more and more of its disadvantages during its adoption. Many managers are suspicious of cloud computing when it comes to organizational, technological, and environmental risks [3,4]. Therefore, it is important to clearly understand the internal and external risks associated with adopting a cloud-based IS, particularly through a theoretical, quantitative, and longitudinal framework.
Prior studies have developed frameworks of risk management to help the migration to a cloud-based system from various perspectives [3,5,6]. Nevertheless, these studies have not yet formally quantified and evaluated the risks within a real IS migration project. This study attempts to address this research gap by developing a conceptual model to quantify the risks resulted from a cloud computing context. Through mathematical modeling, our approach captures and investigates the variations of risks during the implementation of a cloud-based IS migration project.
Our research makes some significant contributions to the existing literature. First, we redefine the risk estimation formula by differentiating mitigated risks from unmitigated risks. Second, we suggest that the exposure to attenuated risk allows an interval of variation between maximum and minimum risk, which can serve as a reference for companies to limit an IS risk threshold. Third, we show that the variations of the internal and external risk are mutually dependent, obey a logic of geometric sequences and determined a general expression of this variation. Finally, we reject the hypothesis that the sum of internal and external risks is stable throughout a migration project to cloud computing, thus demonstrating the new risks exposed to companies from migrating to cloud-computing systems.
This rest of the paper is structured as follows. The next section reviews prior literature on IS risks related to cloud computing adoption with the objective to identify an exhaustive list of such possible risks. Section 3 considers their variations over time and postulates hypotheses in line with our mathematical model. Section 4 presents a longitudinal case study of a cloud migration project to evaluate the proposed five hypotheses. A bivariate analysis is conducted between the theoretical model and the field results to confirm the model. The last section concludes the paper.

2. Prior Literature

Cloud computing has converged past technologies such as virtualization, grid computing, and broadband networks [7], which has significantly changed the existing standards in terms of the growth of IT resources and their decreased costs [3,8]. Thus, information systems management has become less expensive [9].
Research on cloud computing adoptions has been largely inspired from IT adoption theories such as the theory of planned behavior (TPB) and the technology acceptance model (TAM) or their extensions [10,11,12]. They considered that the consumer is at the center of the analysis and suggest that perceived utility and ease of use determine the choice of cloud computing adoptions. Ease of use, universal access to files, and availability of groupware positively influence a consumer’s attitude towards cloud computing [12]. However, their contributions do not eliminate privacy and security concerns [13,14,15]. According to Li and Chang [11], security, privacy, and reversibility accounted for nearly 33% of the perceived risk variance (behavior’s influence factor).
Outsourced from an expert provider, cloud computing was initially designed to solve a security problem by reducing an organization’s number of servers and subsequent network infrastructure size [11]. But this option quickly leads to a feeling of uncertainty following the controversy launched by Snowden in 2013 [7]. Because it is risky to implement information technology [16,17], migration to SaaS-based IS is typically slow and cautious, especially for companies with the capacity to invest in IT infrastructure [4].
Many information technology projects fail due to various reasons [18,19]. With productivity improvements being delayed [20], managers find it difficult to see the usefulness of the proposed IS projects. In addition, the disadvantages of migrating to cloud computing [21,22] appear to be connected to the process of data outsourcing.
Lack of confidence in cloud service providers is one of the obstacles to rapid adoption [4,23]. Stieninger et al. [21] explained that trust was strongly correlated with security and its perception. They identified four key elements that guided the cloud computing adoption: Data security, trust in the service provider, contractual agreements and geographical location. Other authors [4,24,25] add the possibility of transferring data and programs from one provider to another. According to Armbrust et al. [22], services’ non-reversibility resulting from data confinement is one of the limitations of the continuous growth of cloud computing. They call for a standardization of cloud computing APIs for interoperability between different providers. Similarly, Troshani et al. [3] suggested a Cloud Computing Risk Management Framework that subdivides threats into three main axes: A technology, an organizational, and an environmental axe. Their work focuses on the risks associated with cloud computing that can influence its adoption.
In summary, prior research has evaluated the dependencies among different factors as well as identifying the risks in a cloud computing framework. However, existing studies have not systematically quantified the risks associated with a cloud-based IS and assessed the variations of risks before and after its adoption. Therefore, we propose to evaluate such risks through a quantitative and longitudinal model which spans the entire life cycle of a cloud-based IS project from its launch to completion. Our goal is to better understand whether migrating to a cloud computing system can bring competitive advantages or pose a threat to a company.

3. Research Model

Risk is defined by a triggering event (risk factor) and the scope of the affected component. It is expressed through the probability of the scenario occurrence and the impact severity on the component. The risk exposure measure proposed by Boehm [26] in software engineering is suggested as risk exposure: E ( R i ) = P ( R i ) × I ( R i ) , where P ( R i ) denotes the scenario probability and I ( R i ) represents the severity of impact of the risks. In finance, risk is defined as results’ distribution variance [27,28] and the estimation of this occurrence probability is normally based on historical data [29]. Other fields have also attempted to subjectively estimate the probability of the risk factors [30].
Some characteristics of cloud risks intersect with those in supply chain networks or the financial sector [18]. For instance, in a cloud context, customers may be exposed to a risk of default from their cloud providers [3,29]. According to Cloud Harmony’s performance indicators, in 2014 Microsoft Azure scored 103 breakdowns that affected a large number of its customers for a total of 42.94 h of downtime. Therefore, we can estimate the probability of the downtime risk of a cloud service based on vendor history. For other types of risks such as environmental or malicious accidents, the estimate can only be based on subjective criteria. The subjectivity of risk management methods is still criticized [30,31,32]. Some authors found that several frameworks are not scientific or do not adequately address the system risks. Moreover, these methods are concerned with their focus on a technical aspect by considering the social aspects as a simple obstacle to overcome [31,33].
Current risk management methods can be divided into three generations [30]: The first two generations focus on the general requirements for systemic risks based on good practices or checklists, whereas the third generation exceeds the application of generic standards by integrating organizational requirements such as the human component [31,34].
Although risks often result from human behavior directly or indirectly, the human component has long been neglected by systemic risks studies [35,36]. An interpretive perspective within risk management is called for because it would lead to a multidimensional view [37] that goes beyond the simplistic explanations provided by the functionalist paradigm.
Indeed, the risk estimate is evaluated without considering the reduction factors that include the human component like preventive, deterrent, palliative, and containment measures. Therefore, it is important to distinguish between mitigated and unmitigated risks and to redefine exposure to risks by taking these measures into account.
Preventive and dissuasive measures act on the factors that reduce the event occurrence probability, while palliative and containment measures act on the impact reduction factors on the component. Consequently, we suggest that the exposure to attenuated risk is defined as follows:
E(RiA) = [P(Ri) − M(Pr,Ds)] × [I(Ri) − M(Pl,Cn)]
where M(Pr,Ds) ≠ 0 and M(Pl,Cn) ≠ 0 and the notations used in the formula are shown in Table 1.
We argue that the risk exposure formula suggested by Boehm [26] is only applicable to estimate the exposure to unmitigated risk:
If M(Pr,Ds) = 0 and M(Pl,Cn) = 0 <=> E(RiA) = E(RiNA)
Therefore, we note the estimate of the non-attenuated risk by E(RiNA) and we propose a first hypothesis:
Hypothesis 1 (H1).
Information System risk quantification is included in an interval [RiA; RiNA], where RiA = The estimation of ed risks, and RiNA = The estimation of the mitigated risks.
To quantify IT risks, we need to understand IT governance methodologies. IT governance has gained significant research interest since the application of US Sarbanes-Oxley or HIPPA laws to mitigate IT risks [38]. Although no governance model covers all possible controls, each model responds to some requirements that affect either procedures, objectives, or scope of coverage.
IT governance in a cloud computing context requires a new definition of organizational policies. It must explicitly describe roles and responsibilities for the management of technologies, business processes, and applications. Indeed, the cloud computing adoption does not change the objectives set by IT governance standards. However, it introduces to cloud providers a new relational element [8] that must be included in IT governance deployment. So, traditional IT governance models (COSO, CobiT, ENISA, ITIL and ISO) are not altered by implementing cloud solutions, but they must be adapted to such a new context.
In 2011, the Information Systems Audit and Control Association (ISACA) tried to adapt the Cobit repository to a cloud context. They suggested a new publication of IT governance titled “IT control objectives for cloud computing”. The study described the technological and organizational requirements of setting up a repository including cloud computing systems. In addition, COSO has submitted an enterprise risk management framework (ERM framework) for the governance of cloud computing through seven guidelines, which can be tailored to business process, deployment models, and cloud service models, and can also be merged with the Cloud Cube Model suggested by the Open Group to include the four characteristic dimensions of the service instead of the cloud options
ISO has also published two new standards in adequacy with the requirements of cloud computing: ISO/IEC 27017 and ISO/IEC 27018. The first provides guidelines for the implementation of information security controls for cloud services in addition to the initial guide defined by ISO 27002. The second encompasses best practices for protecting of personal identifiable information (PII) in public cloud computing. The 2700× series of ISO/IEC standards are often associated with the harmonized method of risk analysis (MEHARI), which is developed by CLUSIF. Through personalized measures, MEHARI suggests analyzing corporate business challenges to reduce risk exposure. The method reached its sixth version and shows an advanced maturity in risk management.
To develop our model, we retain some suggestions in the MEHARI 2010 version (see Appendix A). First, we construct a comprehensive list of IS risks based on the MEHARI 2010 event typology. Then, we add to the list the five incidents that can arise in a cloud computing context and finally we integrate risks related to project management [18]. Secondly, we develop a matrix in which rows represent the list of event triggers of risk and columns the temporal phases of a cloud computing project. The temporal definition of actions is a key element in studying the phenomenon course [39]. So, it is important to break down the timeframe and define appropriate periods to match the project evolution. We consider time as a social construct and retain the organizational transformation model suggested by Besson and Rowe [40] to define the four-phase migration project: Uprooting, exploration and construction of the new solution, stabilization and the institutionalization of the new solution, and optimization of new routines. Finally, by applying the formula E(RiA), we specify a type for each event and each phase (external, internal, or both at the same time), a maximum estimate (i.e., the risk is unmitigated), and a minimum estimate (i.e., the risk is mitigated). Appendix B shows the precise values of all the parameters and Appendix C summarizes the measures of theoretical risk estimation with respect to the type and σ E(Ri).
Alter and Sherer [41] distinguish between a permanent and a temporary risk, but we consider that any risk is a temporary risk since its probability or impact may be zero at a specific time t. In addition, we add the estimates of events to each organizational transformation phase to quantify the evolution of internal risks and external risks. If a risk is both external and internal, we divide its estimate by two. For each phase, we obtain two values for each type of risk: A minimum value (attenuated risk) and a maximum value (non-attenuated risk). These values make it possible to define a variation interval [RiA; RiNA]. There is a gradual increase of 1/2 of the external risks and a reduction of 1/3 of the internal risks. It is also important to note that the internal risk represents approximately 75% of the total risk at the beginning of a cloud computing project and the external risk represents 25% (see Table 2). These probabilities are reversed at the end of the project. Therefore, we propose the second hypothesis as follows.
Hypothesis 2 (H2).
The internal IS risk represents 3/4 of the total risk before launching a project to migrate to the cloud, but 1/4 of the project’s completion.
We observe that the variation of internal risks and external risks over time is a geometric sequence of respective reasons 2/3 and 3/2 (see Figure 1 and Figure 2). So, we can propose a new hypothesis and express the sequences of internal risk (Rin) and external risk (Rex) as:
Rint = 2/3 × Rin t−1 and Rext = 3/2 × Rex t−1
The number of intervals between the phases (4 points) is 3. Therefore, we induce the geometric sequence increases or decreases per unit of time. To generalize:
when n denotes the number of intervals (or unit of time) and n > 1,
Rint = (n − 1/n) × Rint−1 and Rext = (n/n − 1) × Rext−1
According to a numerical analysis, we note the expression of the internal risk and the external risk at a time t as:
Rin(t) = (n − 1/n)t × Rin(0) and Rex(t) = (n/n − 1)t × Rex(0)
Hence, we next propose the third and fourth hypotheses (see Figure 3 and Figure 4).
Hypothesis 3 (H3).
The internal risk decreases by 1/3 from one phase to the next within a four-stage cloud computing project.
Hypothesis 4 (H4).
The external risk increases by 1/2 from one phase to the next within a four-stage cloud migration project.
We induce that cloud computing does not expose the company to new risks. However, with cloud computing, risks transfer from the inside to the outside. A cloud computing choice is in fact an agreement of IS risk outsourcing to cloud providers. Therefore, we propose the following final hypothesis:
Hypothesis 5 (H5).
The sum of internal risks and external risks is always the same throughout the four stages of a cloud computing project.

4. Empirical Study

4.1. Research Methodology

We apply a qualitative research methodology by focusing on a longitudinal case study of a cloud computing project. The longitudinal approach has a confirmatory character for our deductive approach. It precisely defines the phases of a project, so we can measure the risks at the appropriate time. Its objective is to understand the outcome of a phenomenon through the definition of three key elements: Context, actions, and the temporal interconnection between actions [39].
First, we identified around ten French SMEs offering PaaS and (or) IaaS cloud services that could be interested in our work. The selection criteria were the size of the company, the geographical accessibility of the servers, and the simplicity of the communication with their potential customers. Two of them showed interest and engaged in the study process. However, one field research had to be terminated because of the contradictions between data provided and the data collected. Typically, managers are uncomfortable when asked to communicate on IS security issues, so their participation rates in studies do not exceed 1.8% [42].
To develop our remaining case study in the second company, several of its customers were contacted. The cloud provider was not in direct contact with them and lacked data to assess the risks in the first phase. The selection criteria were their sizes, their sectors of activities, and the nature of the cloud computing project.
First, our empirical study was based on the processing of primary data through several semi-directive interviews, with the technical director and the IT security manager of the cloud provider to contextualize the project and define the major purposes of our empirical research. Second, we conducted another semi-structured interview with the customer’s CIO. Then we organized a working session at the local cloud provider with the IT security manager. Another work session was also planned with the client’s CIO. They were conducted as directional interviews so that the IT security manager and the CIO could correctly estimate the probability and impact of each event. The objective was to quantify the risks with the best precision through the evaluation grid that we previously suggested.
The research proposal and evaluation grids were sent to the interviewees before the interviews so that they could assess the research project in advance. In the meantime, we had exchanged information by telephone and e-mail to meet our expectations. We had also used several sources to collect secondary data such as press releases, data available on the Internet, and the configuration documents offered in free access on GitHub. In addition, we watched several videos describing the datacenter. Excluding guided tours during the Heritage Days, access to the site was restricted for security reasons. Therefore, it was not possible to evaluate the risk management measures except through the video and photo footage suggested.
The longitudinal study lasted approximately 5 months. Finally, we were able to compare the risk measures taken by the cloud provider’s CISO and the client’s CIO with our comments.

4.2. A Longitudinal Study

The first step in a longitudinal study is to complete a monograph of the process studied [43]. The studied process is a transfer of IS risks during a migration project to the cloud. It is important to describe in detail the sequence of events and thus to understand the temporal interconnections between these events.
The cloud computing projects used in companies generally correspond to a support use. Few companies take the risk of outsourcing core activities to a hosted service. However, our case study is different because our empirical study is not a study of auxiliary activities but the follow-through of the core business migration.
We studied a trading platform initially developed in-house by a French start-up in 2010. Its objective was to offer a communication tool through social networks or websites to companies who wish to create a direct link with their permanent or potential customers. Thanks to this platform, the synchronization of communications between companies and customers will, in the long term, increase user satisfaction and loyalty.
Currently, the start-up company employs 200 people (see the client features in Table 3). In 2015, it rationalized its offer of customer intermediation and acquired another French start-up offering a social network monitoring service. The platform also offered a connector to synchronize its tools with the Salesforce CRM solution.
In 2010, before its implementation of cloud computing projects, the platform prototype development lasted several months. The start-up was one of the cloud provider’s first customers. This initial internal development took a relatively long time compared to the duration needed to host the solution within the cloud provider’s data-centers. However, we prefer a social construction chronology to a standard time one [44]. We also retain, as we did in our theoretical proposition, the transformation organizational structure model suggested by Besson and Rowe [40].
The process studied must be subdivided into several phases that fit a relatively homogeneous set [45]. Internal development then corresponds to the phase of uprooting or “revolution” [40]. We break-down the implementation phase into two phases: A phase of construction which begins with the first set-up operations and a stabilization phase at the end of these operations and the completion of the stabilization tests. A final step, the optimization phase, is defined by the launch of the product to the general public during the year 2011.
The empirical study was mainly carried out at the cloud computing provider’s premises. Our exchanges with the customer CIO focused on risk measures during the uprooting phase. We also validated the internal risk measures suggested by the cloud provider.
The cloud provider is a French company, created in 2010 and located in the same region as its customer. It offers a Platform as a Service (PAAS) cloud solution supporting the programming languages: PHP, Java, Ruby and Scala. Its pricing system is based on energy costs automatically adjusting to potential load increases (see the cloud provider’s features in Table 4).
The PaaS provider started its services based on a partnership with a French telephone company that has five data centers based in Paris. In 2014, it launched another data-center in Canada to target the US market. The data of French customers is always hosted in France.
Although the cloud provider stated that French data-centers were Tier IV certified, we cloud only identify one Tier III certified data-center. There remains, however, a high security guarantee. A Tier III data-center offers 99.98% availability within 1.6 h of outage per year. Its configuration provides maintainability of all data-center components without impact on service continuity. Note that it has a partial redundancy of N + 1 in contrast to Tier IV which has a 2N + 1 redundancy.
The four-tier certification is issued by a US private organization, the uptime institute, based on design documents and building construction. The institute is limited to climate and electrical redundancies and does not take into account data replication software or clustered servers. Therefore, the security guarantee is partial and costs a hundred thousand Euros per data-center.
Many data-center manufacturers have abandoned the certification process to self-proclaim as Tier III + or Tier IV. They are based on the 2N + 1 redundancy model or prefer to apply a standard of the ISO 270xx series. ISO 27017 and ISO 27018 offer specific guides to cloud computing and guarantee a security policy for application services. In France there are only three data-centers certified partly third III or IV.
On the application side, the cloud provider has opted for hypervisor-based virtualization. Their customers’ applications are thus partitioned to their own virtual machines. They guarantee a total isolation of each application distribution. This strategic choice is driven by security reasons. Indeed, virtualization techniques can be categorized into two major families: Container virtualization and hypervisor-based virtualization. Although container virtualization offers a lighter, more powerful virtual environment [46], it poses a problem of isolation between applications and the host kernel [47]. It exposes hosted data to an intrusion risk.
We have chosen to organize the risk transfer process in a matrix shape so as to simplify taking measures for CIOs. The four phases of the project are displayed in columns and the different events triggering an IS risk in rows. The narrative text is spread over several pages and does not facilitate the comparison of one or more variables over several periods. Such narratives are criticized for structuring a longitudinal study [48]. Therefore, we used the chronological matrix, expressing at each phase a type of risk (external, internal, or both), its probability, and its impact.

4.3. Results and Implications

Our empirical results indicate that the measured external and internal risks vary within the range [20, 100], which confirms the first hypothesis (see Table 5 for results in summary and Appendix D for results in in details).
The first contribution of our work suggests a definition of a risk interval for a cloud project migration. This proposal is also useful for quantifying IS risks in a global way within an organization. Exceeding the indicated threshold may alert the company to a possible problem in its risk management approach.
We next perform a covariance analyzes, including all the measured variables and expected theoretical variables, to validate the rest of the hypotheses. The objective is to model the homogeneity between the measured values and the theoretical values. Figure 5 and Figure 6 visually present the results generated.
First, we drew regression curves for changes in measured internal and external risks. Hence, it is possible to estimate the first two theoretical values Rex(1) and Rin(1). From applying the two formulas Rex(t) and Rin(t) suggested in the theoretical framework, we can generate these two new sets of theoretical values. Therefore, we define the regression line of the external risks’ variation as
Yex = 25.35 × Xex − 2.5,
and the regression line of the internal risks variation with respect to time as:
Yin = (−17.65) × Xin + 90.75.
The expected values of Rex(1) and Rin(1) are 23 and 73. We can thus construct two sets of expected theoretical values and then compare the distributions of internal and external risks to confirm our model (see Table 6 for the theoretical risk variation).
Finally, a bivariate analysis is carried out to define the dependence between the theoretical model and the results obtained. The distribution parameters used in this approach are the covariance, the correlation coefficient, and the coefficient of determination. The coefficient of determination is an indicator that allows approving the model quality through the adequacy between the latter and the observed data. Therefore, it will be of great value for validation of the hypotheses.
The correlation coefficient and coefficient of determination R2 measurements are 0.999 and 0.999 for the internal risk model and they are 0.988 and 0.976 for the external risk model. We can therefore confirm both hypotheses H3 and H4.
However, the second hypothesis H2 remains rejected since the internal risk represents 3/4 of the total risk before the launch of the project but not the 1/4 at the end. Indeed, the coefficient of variation of external risks (0.466) is higher than that of internal risks (0.429). The rapid increase in external risks has shifted the balance established to reduce internal risks to 1/5 of total risks at the end of project (see Figure 7). So, it is possible to confirm that the internal risk is significantly higher than the external risk before the launch of the cloud project. This dispersion is reversed at the end of the project without specifying the distributions. The reality can be known only in a probabilistic way and the verification is not probative [49].
The last hypothesis implies that the variable “sum of risks” is independent of the variable “time”. Consequently, the covariance value of the two series tends to zero. Although the covariance, equal to 9.87, is relatively small, it cannot validate the hypothesis. An approximate increase of 1/5 of the total risk is noticed at the completion of cloud computing project. The hypothesis H5 is to be rejected, and it is, therefore, conceivable that cloud computing exposes the company to new risks. Other case studies should be planned to confirm or reject this hypothesis. Only the refutation of the hypotheses is conclusive [49].

5. Conclusions

Our work indicates a redefinition of the risk estimation formula suggested by Boehm [26], including probability reduction factors and impact reduction factors. We distinguished between mitigated and unmitigated risks. The factors of probability reduction are conditioned by preventive and dissuasive measures, whereas the factors of the impact reduction are conditioned by palliative and containment measures. Therefore we suggest that the exposure to attenuated risk is defined as: E(RiA) = [P(Ri) − M(Pr,Ds)] × [I(Ri) − M(Pl,Cn)], which allows an interval of variation between maximum risk and minimum risk. Apart from its contribution to the validation of the theoretical model during the empirical study, this interval can serve as a reference for several companies to limit an IS risk threshold.
Our positivist approach also revealed a transfer of IS risk from the inside to the outside during a cloud computing project through a longitudinal mathematical model. We have shown that the variation of the internal risk and external risk are mutually dependent and obeys a logic of geometric sequences of respective reasons 2/3 and 3/2 for a four-phase organizational transformation model (three intervals). Therefore, we have determined a general expression of this variation: Rin(t) = (n − 1/n)t × Rin(1) and Rex(t) = (n/n − 1)t × Rex(1).
On the other hand, we rejected the hypothesis that the sum of internal and external risks is stable throughout a migration project to cloud computing. An approximate increase of 1/5 of the total risk is noticed at the completion of the cloud computing project. It is, therefore, conceivable that cloud computing exposes the company to new risks.

Author Contributions

W.B. conceived and designed the conceptual model; W.B. conducted the case analysis; W.B. and Z.Z. drafted the initial paper; H.L. verified the model; H.L. and Z.Z. revised the paper. All authors have read and approved the final version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The MEHARI 2010 Framework

Table A1. MEHARI 2010 Standard Scale of Impact Level.
Table A1. MEHARI 2010 Standard Scale of Impact Level.
4level 4Vital
3level 3Very serious
2level 2Important
1level 1Not significant
Table A2. MEHARI 2010 Standard Scale of Potential Level.
Table A2. MEHARI 2010 Standard Scale of Potential Level.
4level 4Very probable
3level 3Probable
2level 2Improbable
1level 1Very improbable
Table A3. Effectiveness of MEHARI 2010 deterrence measures.
Table A3. Effectiveness of MEHARI 2010 deterrence measures.
level 4The deterrent effect is very important
level 3The deterrent effect is important
level 2The deterrent effect is medium
level 1The deterrent effect is very low
Table A4. Effectiveness of MEHARI 2010 preventive measures.
Table A4. Effectiveness of MEHARI 2010 preventive measures.
level 4The preventive effect is very important
level 3The preventive effect is important
level 2The preventive effect is medium
level 1The preventive effect is very low
Table A5. Effectiveness of MEHARI 2010 Containment Measures.
Table A5. Effectiveness of MEHARI 2010 Containment Measures.
level 4The confinement and limitation effect of direct consequences is very important
level 3The confinement and limitation effect of direct consequences is important
level 2The confinement and limitation effect of direct consequences is medium
level 1The confinement and limitation effect of direct consequences is very low
Table A6. Effectiveness of MEHARI 2010 palliative measures.
Table A6. Effectiveness of MEHARI 2010 palliative measures.
level 4The effect of limiting indirect consequences is very important
level 3The effect of limiting indirect consequences is important
level 2The effect of limiting indirect consequences is medium
level 1The effect of limiting indirect consequences is very low

Appendix B. Measures of Theoretical Risk Estimation—General Framework

Table A7. Measures of Theoretical Risk Estimation—General Framework.
Table A7. Measures of Theoretical Risk Estimation—General Framework.
CodeUprootingConstructionStabilizationOptimization
P(Ri)I(Ri)M(Pr,Ds)M(Pl,Cn)P(Ri)I(Ri)M(Pr,Ds)M(Pl,Cn)P(Ri)I(Ri)M(Pr,Ds)M(Pl,Cn)P(Ri)I(Ri)M(Pr,Ds)M(Pl,Cn)
AB.P.12110211021102110
AB.P.23210321022102210
AB.S.12310110011002310
AB.S.22100110011002310
AB.S.31200110011001100
AB.S.44210000000001301
AB.S.54210000000001301
AC.E.11302130113011302
AC.E.22402130113011402
AC.E.32402130113012402
AC.M.12110221012011201
AC.M.21100110011001100
AV.P.13110211011001100
ER.L.11200210022011301
ER.P.13110311021102110
ER.P.23210321022102210
ER.P.34110411031103110
IC.E.13110221012001200
IC.E.22201220112011201
IC.E.32201220112011201
IC.E.41100110011001100
IF.L.12110211021102110
IF.L.22201220122011301
IF.L.33211221112011301
IF.L.44220322023111301
MA.L.11200110012002311
MA.L.21200110012011301
MA.L.31200120013011301
MA.L.42201220113011301
MA.L.51301130113011301
MA.L.61301130113011301
MA.L.71201120112011201
MA.L.81200120013001300
MA.L.92310231014011400
MA.L.103320332033202310
MA.P.11201130113011301
MA.P.21301130113011301
MA.P.31301120112011201
MA.P.42211221122112211
PR.N.12211221112011201
PR.N.22200120012001200
PR.N.32210221012001200
PR.N.41201120112011201
IC.C.10000230113011301
IC.C.20000000022101200
IC.C.30000000042204320
IC.C.40000000000004210
IC.C.50000000000004210
RS.P.10000211022100000
RS.P.20000211022100000
RS.P.30000211022100000
RS.P.40000110011000000
RS.P.50000110011000000

Appendix C. Measures of Theoretical Risk Estimation—Type and σ E(Ri)

Table A8. Measures of Theoretical Risk Estimation—Type and σ E(Ri).
Table A8. Measures of Theoretical Risk Estimation—Type and σ E(Ri).
Family TypeCodeEvent DescriptionUprootingConstructionStabilizationOptimization
Typeσ E(Ri)Typeσ E(Ri)Typeσ E(Ri)Typeσ E(Ri)
Absence of personnel due to an accidentAB.PAbsence of personnel from partnerex2−1ex2−1ex2−1ex2−1
Absence of internal personnelin6−4in6−4in4−2in4−2
Accidental lack or unavailability of serviceAB.SAbsence of service: Power supplyin6−3ex1ex1ex6−3
Absence of service: air conditionerin2ex1ex1ex6−3
Absence of service: impossibility to have access to the premisesin2ex1ex1ex3−1
Absence or impossibility of application software maintenancein8−6in0ex0ex3−2
Absence or impossibility of information system maintenancein8−6in0ex0ex3−2
Environmental serious accidentAC.ELightning ex3−1ex3−2ex3−2ex3−1
Fireex8−4ex3−2ex3−2ex4−2
Floodingex8−4ex3−2ex3−2ex8−4
Hardware AccidentAC.MEquipment breakdownin2−1ex4−2ex2−1ex2−1
Accessory equipment breakdownin1in1in1in1
Voluntary absence of staffAV.PSocial conflict with strikein3−2in2−1in1in1
Design errorER.LSoftware blocking or malfunction due to a design or programming error (in-house software)in2ex2−1ex4−2ex3−2
Hardware error or behavioral error by personnelER.PLost or forgotten document or mediain3−2ex/in3−2ex/in2−1in2−1
Error of operation or non compliance of a procedurein6−4ex/in6−4ex/in4−2in4−2
Typing or data entry errorin4−3in4−3in3−2in3−2
Incident due to environmentIC.EDamage due to agingin3−2in4−2ex/in2ex2
Water damagein4−2in4−2ex/in2−1ex2−1
Electrical boosting or over loadin4−2in4−2ex/in2−1ex2−1
Pollution damagein1in1ex/in1ex1
Logical or functional incidentIF.LProduction incidentin2−1in2−1in2−1in2−1
Software blocking or malfunction (information system or software package)in4−2in4−2ex4−2ex3−2
Saturation due to an external cause (worm)ex6−2ex4−1ex2−1ex3−2
Virusex8−4ex6−2ex6−2ex3−2
Malevolent action (logical or functional)MA.LDeliberate blocking of accountsex/in2ex1ex2ex6−2
Deliberate erasure or massive pollution of system configurationsin2ex1ex2−1ex3−2
Deliberate erasure of files, data bases or mediain2ex/in2ex3−2ex3−2
Electromagnetic pick upex/in4−2ex4−2ex3−2ex3−2
Deliberate corruption of data or functionsin3−2in3−2ex/in3−2ex/in3−2
Forging of messages or datain3−2ex/in3−2ex/in3−2ex/in3−2
Fraudulent replay of transactionin2−1ex2−1ex2−1ex2−1
Deliberate saturation of IT equipments or networksex/in2ex2ex3ex3
Deliberate total erasure of files and backupsin6−3in6−3ex4−3ex4
Diversion of files or data (tele-load or copy)in9−3in9−3ex/in9−3ex/in6−3
Malevolent action (physical)MA.PTampering or falsification of equipmentin2−1ex3−2ex3−2ex3−2
Terrorismex/in3−2ex/in3−2ex/in3−2ex/in3−2
Vandalism or hooliganismex/in3−2ex/in2−1ex/in2−1ex/in2−1
Theft of physical assetex/in4−1ex/in4−1ex/in4−1ex/in4−1
Non compliance to proceduresPR.NInadequate proceduresin4−1in4−1in2−1in2−1
Procedures not applied due to lack of resource or meansin4in2in2in2
Procedures not applied due to ignorancein4−2in4−2in2in2
Procedures not applied deliberatelyin2−1in2−1in2−1in2−1
Cloud Computing IncidentIC.CAltering data transferred to the cloud in0ex/in6−4ex/in3−2ex/in3−2
Denial of Serviceex0ex0ex4−2ex2
Unauthorized access to data by a third party (supplier’s personnel, government access by conflict of laws, etc.)ex0ex0ex8−4ex12−6
Data backup by vendor after contract terminationex0ex0ex0ex8−6
Lack of interoperability between suppliersex0ex0ex0ex8−6
project management RiskRS.PChange in the organizational environment that may affect the project stabilityin0in2−1in4−2in0
Lack of commitment or the cooperation of the actors concernedin0in2−1in4−2in0
Poor definition or permanent change of objectivesin0in2−1in4−2in0
Poor estimation of costsin0in1in1in0
Poor estimation of maturitiesin0in1in1in0

Appendix D. Measures of Theoretical Risk Estimation from the Case

Table A9. Measures of Theoretical Risk Estimation from the Case.
Table A9. Measures of Theoretical Risk Estimation from the Case.
TypeEventUprootingConstructionStabilizationOptimization
TypeP(Ri)I(Ri)TypeP(Ri)I(Ri)TypeP(Ri)I(Ri)TypeP(Ri)I(Ri)
Absence of personnel due to an accidentAB.P.1ex00ex12ex12ex11
AB.P.2in12in12in12in11
Accidental lack or unavailability of serviceAB.S.1in12ex12ex12ex12
AB.S.2in11ex12ex12ex12
AB.S.3in11ex11ex11ex11
AB.S.4in00in00ex00ex12
AB.S.5in00in00ex00ex12
Environmental serious accidentAC.E.1ex13ex12ex12ex12
AC.E.2ex14ex13ex13ex13
AC.E.3ex14ex13ex13ex13
Hardware AccidentAC.M.1in22ex12ex12ex12
AC.M.2in31ex12ex12ex12
Voluntary absence of staffAV.P.1in12in12in12in11
Design errorER.L.1in12in12ex/in12ex/in11
Hardware error or behavioural error by personnelER.P.1in22ex/in21ex/in12in12
ER.P.2in22ex/in21ex/in12in12
ER.P.3in22in22in12in12
Incident due to environmentIC.E.1in12in12ex/in12ex12
IC.E.2in12in22ex/in22ex22
IC.E.3in23in22ex/in22ex22
IC.E.4in12in12ex/in12ex12
Logical or functional incidentIF.L.1in00in11in11in11
IF.L.2in22in21ex/in12ex/in12
IF.L.3ex22ex11ex12ex12
IF.L.4ex22ex11ex12ex12
Malevolent action (logical or functional)MA.L.1ex/in00ex12ex13ex13
MA.L.2in12ex12ex13ex13
MA.L.3in12ex/in12ex13ex13
MA.L.4ex/in11ex11ex12ex12
MA.L.5in21in21ex/in22ex/in22
MA.L.6in21ex/in21ex/in22ex/in22
MA.L.7in21ex11ex12ex12
MA.L.8ex/in21ex12ex12ex12
MA.L.9in13in14ex14ex14
MA.L.10in12in22ex/in23ex/in13
Malevolent action (physical)MA.P.1in12ex12ex12ex12
MA.P.2ex/in13ex/in13ex/in13ex/in13
MA.P.3ex/in13ex/in13ex/in13ex/in13
MA.P.4ex/in12ex/in12ex/in12ex/in11
Non compliance to proceduresPR.N.1in12in12in12in00
PR.N.2in22in12in12in00
PR.N.3in22in22in12in00
PR.N.4in11in11in11in11
Cloud Computing IncidentIC.C.1in00ex/in22ex/in23ex/in12
IC.C.2ex00ex12ex13ex13
IC.C.3ex00ex00ex22ex33
IC.C.4ex00ex00ex00ex23
IC.C.5ex00ex00ex00ex23
project management RiskRS.P.1in00in11in11in00
RS.P.2in00in12in12in00
RS.P.3in00in12in11in00
RS.P.4in00in11in11in00
RS.P.5in00in11in21in00

References

  1. Wan, J.; Zhang, D.; Zhao, S.; Yang, L.; Lloret, J. Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges, and solutions. IEEE Commun. Mag. 2014, 52, 106–113. [Google Scholar] [CrossRef]
  2. Xu, X. From cloud computing to cloud manufacturing. Robot. Comput.-Integr. Manuf. 2012, 28, 75–86. [Google Scholar] [CrossRef]
  3. Troshani, I.; Rampersad, G.; Wickramasinghe, N. Cloud Nine? An Integrative Risk Management Framework for Cloud Computing. In Proceedings of the 24th Bled e Conference e Futere, Bled, Slovenia, 12–15 June 2011; pp. 15–26. [Google Scholar]
  4. Salleh, S.M.; Teoh, S.Y.; Chan, C. Cloud Enterprise Systems: A Review of Literature and Its Adoption. In Proceedings of the PACIS 2012, Hochiminh City, Vietnam, 13–15 July 2012; p. 76. [Google Scholar]
  5. Abdul Rahman, A.A.L.; Islam, S.; Kalloniatis, C.; Gritzalis, S. A Risk Management Approach for a Sustainable Cloud Migration. J. Risk Financ. Manag. 2017, 10, 20. [Google Scholar] [CrossRef]
  6. Islam, S.; Fenz, S.; Weippl, E.; Mouratidis, H. A risk management framework for cloud migration decision support. J. Risk Financ. Manag. 2017, 10, 10. [Google Scholar] [CrossRef]
  7. Bouaynaya, W. Mise en perspective théorique du construit sécurité dans le couplage Cloud Computing-Open Source. In Proceedings of the 21ème Colloque de l’AIM, Lille, France, 18–20 May 2016. (In French). [Google Scholar]
  8. Prasad, A.; Green, P.; Heales, J. On structural considerations for governing the cloud. In Proceedings of the AMCIS 2013, Chicago, IL, USA, 15–17 August 2013. [Google Scholar]
  9. Marston, S.; Li, Z.; Bandyopadhyay, S. Cloud computing—The business perspective. Decis. Support Syst. 2011, 51, 176–189. [Google Scholar] [CrossRef]
  10. Bhattacherjee, A.; Park, S.C. Why end-users move to the cloud: A migration-theoretic analysis. Eur. J. Inf. Syst. 2014, 23, 357–372. [Google Scholar] [CrossRef]
  11. Li, Y.; Chang, K.C. A study on user acceptance of cloud computing: A multi-theoretical perspective. In Proceedings of the AMCIS 2012, Seattle, WA, USA, 9–12 August 2012; pp. 565–582. [Google Scholar]
  12. Nedbal, D.; Stieninger, M.; Erskine, M. The Adoption of Cloud Services in the Context of Organizations: An examination of drivers and barriers. In Proceedings of the AMCIS 2014, Savannah, GA, USA, 7–10 August 2014. [Google Scholar]
  13. Cheng, F.C.; Lai, W.H. The impact of cloud computing technology on legal infrastructure within internet—Focusing on the protection of information privacy. Procedia Eng. 2012, 29, 241–251. [Google Scholar] [CrossRef]
  14. Subashini, S.; Kavitha, V. A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 2011, 34, 1–11. [Google Scholar] [CrossRef]
  15. Svantesson, D.; Clarke, R. Privacy and consumer risks in cloud computing. Comput. Law Secur. Rev. 2010, 26, 391–397. [Google Scholar] [CrossRef] [Green Version]
  16. Bernard, J.G.; Rivard, S.; Aubert, B. L’exposition au risque d’implantation d’ERP: Éléments de mesure et d’atténuation. Syst. D’in. Manag. 2016, 21, 89–114. [Google Scholar] [CrossRef]
  17. Barki, H.; Rivard, S.; Talbot, J. Toward an assessment of software development risk. J. Manag. Inf. Syst. 1993, 10, 203–225. [Google Scholar] [CrossRef]
  18. Schmidt, R.; Lyytinen, K.; Keil, M. Identifying software project risks: An international Delphi study. J. Manag. Inf. Syst. 2001, 17, 5–36. [Google Scholar] [CrossRef]
  19. Keil, M.; Tiwana, A.; Bush, A. Reconciling user and project manager perceptions of IT project risk: A Delphi study 1. Inf. Syst. J. 2002, 12, 103–119. [Google Scholar] [CrossRef]
  20. Addas, S.; Pinsonneault, A. The many faces of information technology interruptions: A taxonomy and preliminary investigation of their performance effects. Inf. Syst. J. 2015, 25, 231–273. [Google Scholar] [CrossRef]
  21. Stieninger, M.; Nedbal, D.; Wetzlinger, W. Impacts on the organizational adoption of cloud computing: A reconceptualization of influencing factors. Procedia Technol. 2014, 16, 85–93. [Google Scholar] [CrossRef]
  22. Armbrust, M.; Fox, A.; Griffith, R. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
  23. Buyya, R.; Yeo, C.S.; Venugopal, S. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In Proceedings of the High Performance Computing and Communication (IEEE 2008), Dalian, China, 25–27 September 2008; pp. 5–13. [Google Scholar] [CrossRef]
  24. Koehler, P.; Anandasivam, A.; Dan, M.A. Cloud services from a consumer perspective. In Proceedings of the International Conference on Autonomous and Intelligent Systems (AIS 2010), Povoa de Varzim, Portugal, 21–23 June 2010. [Google Scholar]
  25. Sultan, N.A. Reaching for the “cloud”: How SMEs can manage. Int. J. Inf. Manag. 2011, 31, 272–278. [Google Scholar] [CrossRef]
  26. Boehm, B.W. Software risk management: Principles and practices. IEEE Softw. 1991, 8, 32–41. [Google Scholar] [CrossRef]
  27. Linnerooth, B.J.; Wahlström, B. Applications of Probabilistic Risk Assessments: The Selection of Appropriate Tools 1. Risk Anal. 1991, 11, 239–248. [Google Scholar] [CrossRef]
  28. Aubert, B.A.; Bernard, J.G. Mesure Intégrée du Risque Dans les Organisations; Press of the University of Montreal: Montreal, QC, Canada, 2004; ISBN 2-7606-1966-4. [Google Scholar]
  29. McCutcheon, D.; Stuart, F.I. Issues in the choice of supplier alliance partners. J. Oper. Manag. 2000, 18, 279–301. [Google Scholar] [CrossRef]
  30. Siponen, M.T. Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods. Inf. Organ. 2005, 15, 339–375. [Google Scholar] [CrossRef]
  31. Siponen, M.; Baskerville, R. A new paradigm for adding security into IS development methods. In Proceedings of the Advances in Information Security Management & Small Systems Security, Las Vegas, NV, USA, 27–28 September 2001; pp. 99–111. [Google Scholar] [CrossRef]
  32. Organ, J.; Stapleton, L. Information systems risk through a socio-technical lens: Future directions in systems risk research. IFAC Proc. Vol. 2012, 45, 138–143. [Google Scholar] [CrossRef]
  33. Furnell, S.; Clarke, N. Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 2012, 31, 983–988. [Google Scholar] [CrossRef]
  34. Organ, J.; Stapleton, L. Information systems risk paradigms: Towards a new theory on systems risk. IFAC Proc. Vol. 2013, 46, 116–121. [Google Scholar] [CrossRef]
  35. Coles-Kemp, L. Information security management: An entangled research challenge. Inf. Secur. Tech. Rep. 2009, 14, 181–185. [Google Scholar] [CrossRef]
  36. Ashenden, D. Information Security management: A human challenge? Inf. Secur. Tech. Rep. 2008, 13, 195–201. [Google Scholar] [CrossRef] [Green Version]
  37. Dhillon, G.; Backhouse, J. Current directions in IS security research: Towards socio-organizational perspectives. Inf. Syst. J. 2001, 11, 127–153. [Google Scholar] [CrossRef]
  38. Becker, J.; Bailey, E. A comparison of IT governance & control frameworks in cloud computing. In Proceedings of the AMCIS 2014, Savannah, GA, USA, 7–10 August 2014. [Google Scholar]
  39. Pettigrew, A.M. What is a processual analysis. Scand. J. Manag. 1997, 13, 4. [Google Scholar] [CrossRef]
  40. Besson, P.; Rowe, F. Perspectives sur le phénomène de la transformation organisationnelle. Syst. D’in. Manag. 2011, 16, 3–34. [Google Scholar] [CrossRef]
  41. Alter, S.; Sherer, S.A. A general, but readily adaptable model of information system risk. Commun. Assoc. Inf. Syst. 2004, 14, 35. [Google Scholar]
  42. Barlette, Y. Une étude des comportements liés à la sécurité des systèmes d’information en PME. Syst. D’in. Manag. 2008, 13, 7–30. [Google Scholar] [CrossRef]
  43. Thiétart, R.A. Méthodes de Recherche en Management, 4th ed.; Dunod: Paris, France, 2014; ISBN 978-2-10-071109-3. [Google Scholar]
  44. Tsoukas, H.; Chia, R. On organizational becoming: Rethinking organizational change. Organ. Sci. 2002, 13, 567–582. [Google Scholar] [CrossRef]
  45. Gersick, C.J. Time and transition in work teams: Toward a new model of group development. Acad. Manag. J. 1988, 31, 9–41. [Google Scholar] [CrossRef]
  46. Xavier, M.G.; Neves, M.V.; Rossi, F.D. Performance evaluation of container-based virtualization for high performance computing environments. In Proceedings of the 21st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2013), Belfast, UK, 27 February–1 March 2013; pp. 233–240. [Google Scholar] [CrossRef]
  47. Bui, T. Analysis of docker security. arXiv 2015, arXiv:1501.02967. [Google Scholar]
  48. Miles, M.B.; Huberman, A.M. Analyse des Données Qualitatives, 2nd ed.; De Boeck Supérieur: Brussels, Belgium, 2003; ISBN 2-7445-0090-3. [Google Scholar]
  49. Gephart, R.P., Jr. Qualitative research and the Academy of Management Journal. Acad. Manag. J. 2004, 47, 454–462. [Google Scholar] [CrossRef]
Figure 1. Evolution of external risks according to time.
Figure 1. Evolution of external risks according to time.
Sensors 18 03488 g001
Figure 2. Evolution of internal risks according to time.
Figure 2. Evolution of internal risks according to time.
Sensors 18 03488 g002
Figure 3. Unmitigated risk transfer model.
Figure 3. Unmitigated risk transfer model.
Sensors 18 03488 g003
Figure 4. Mitigated risk transfer model.
Figure 4. Mitigated risk transfer model.
Sensors 18 03488 g004
Figure 5. Measured internal risk variation.
Figure 5. Measured internal risk variation.
Sensors 18 03488 g005
Figure 6. Measured external risk variation.
Figure 6. Measured external risk variation.
Sensors 18 03488 g006
Figure 7. Measured IT risk transfer.
Figure 7. Measured IT risk transfer.
Sensors 18 03488 g007
Table 1. Summary of Notations.
Table 1. Summary of Notations.
NotationMeaning
RiAAttenuated risk
P(Ri)Scenario probability
I(Ri)Severity of impact
M(Pr)Preventive measures
M(Ds)Dissuasive measures
M(Pl)Palliative measures
M(Cn)Containment measures
Table 2. Total Risks for Each Phase.
Table 2. Total Risks for Each Phase.
UprootingConstructionStabilizationOptimization
Σ Unmitigated internal risks: R1in12384.55337
Σ Mitigated internal risks: R2in77.54731.522.5
Σ Unmitigated external risks: R1ex4457.586125
Σ Mitigated external risks: R2ex21.53550.577.5
Table 3. Client Features.
Table 3. Client Features.
Creation Date2010
Legal Formjoint stock company
Capitalization (2015)14 million Euros
Turnover (2014)4.2 million Euros
Number of staff 200
Table 4. Cloud Provider Features.
Table 4. Cloud Provider Features.
Creation Date2010
Legal Formjoint stock company
Share capital18,000 euro
Turnover (2012)84,000 euro
Number of employees 10
Table 5. Risk variation measured.
Table 5. Risk variation measured.
UprootingConstructionStabilizationOptimization
External Risk24.5457599
Internal Risk76.55234.523.5
Table 6. Theoretical risk variation.
Table 6. Theoretical risk variation.
UprootingConstructionStabilizationOptimization
External Risk23355379
Internal Risk73493322

Share and Cite

MDPI and ACS Style

Bouaynaya, W.; Lyu, H.; Zhang, Z. Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model. Sensors 2018, 18, 3488. https://doi.org/10.3390/s18103488

AMA Style

Bouaynaya W, Lyu H, Zhang Z. Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model. Sensors. 2018; 18(10):3488. https://doi.org/10.3390/s18103488

Chicago/Turabian Style

Bouaynaya, Wafa, Hongbo Lyu, and Zuopeng (Justin) Zhang. 2018. "Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model" Sensors 18, no. 10: 3488. https://doi.org/10.3390/s18103488

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop