Skip to main content
Erschienen in: Telecommunication Systems 3/2021

20.08.2021

A risk comparison framework for evaluating the impact of telecom cloudification in organizational risk profile

verfasst von: Binesh Jose, T. Radha Ramanan, S. D. Madhu Kumar

Erschienen in: Telecommunication Systems | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has provided new dimensions and opportunities to telecom providers to enhance their ability in creating new revenue streams, reduce operational costs and increase customer satisfaction. In recent years, the progression of evolving cloud computing systems is huge. Conversely, it also encountered a lot of new challenges to the institutions utilizing cloud systems. It is critical to evaluate the change in organizational risk profile before deciding the level of cloud adoption. The conventional risk assessment framework of telecom providers may be unsuitable for cloud computing owing to the difficulties in the configuration. This paper aims to propose a system to quantify the influences of cloud adoption in telecom risk profile. This study also provides a comparison of overall risk profile change between clouds enabled infrastructure, traditional on-premises information technology solutions, and a combination of both in the telecom sector. The result encourages the selective adoption of the hybrid cloud model which demonstrated a relatively low organizational risk score. This work contributes to cloud computing business research by providing a holistic risk comparison model which reflects the distinctiveness of telecom service provider’s assets and capabilities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Peter M. Mell, Timothy Grance (2011). SP 800-145. The NIST Definition of Cloud Computing, National Institute of Standards & Technology, Gaithersburg, MD. Peter M. Mell, Timothy Grance (2011). SP 800-145. The NIST Definition of Cloud Computing, National Institute of Standards & Technology, Gaithersburg, MD.
9.
Zurück zum Zitat Varadharajan, V., & Tupakula, U. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11, 60–75.CrossRef Varadharajan, V., & Tupakula, U. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11, 60–75.CrossRef
10.
Zurück zum Zitat Machado, C. C., Granville, L. Z., & Schaeffer-Filho, A. (2016). ANSwer: Combining NFV and SDN features for network resilience strategies. In IEEE symposium on computers and communication (ISCC), Messina (pp. 391–396). Machado, C. C., Granville, L. Z., & Schaeffer-Filho, A. (2016). ANSwer: Combining NFV and SDN features for network resilience strategies. In IEEE symposium on computers and communication (ISCC), Messina (pp. 391–396).
11.
Zurück zum Zitat Merna, T., & Al-Thani, F. F. (2008). Corporate risk management. Wiley. Merna, T., & Al-Thani, F. F. (2008). Corporate risk management. Wiley.
13.
Zurück zum Zitat Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk assessment framework for cloud computing environments. Security and Communication Networks, 7(11), 2114–2124.CrossRef Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk assessment framework for cloud computing environments. Security and Communication Networks, 7(11), 2114–2124.CrossRef
18.
Zurück zum Zitat Chen, X., & Wen, N. (2010). Information security risk assessment model based on OCTAVE for E-Government. In 2010 International conference on internet technology and applications, Wuhan (pp. 1–5). Chen, X., & Wen, N. (2010). Information security risk assessment model based on OCTAVE for E-Government. In 2010 International conference on internet technology and applications, Wuhan (pp. 1–5).
19.
Zurück zum Zitat Zhao, X., Hwang, B.-G., & Low, S. P. (2015) Risk management and enterprise risk management. Enterprise risk management in international construction operations, pp. 33–83. Zhao, X., Hwang, B.-G., & Low, S. P. (2015) Risk management and enterprise risk management. Enterprise risk management in international construction operations, pp. 33–83.
20.
Zurück zum Zitat Quon, T. K., Zeghal, D., & Maingot, M. (2012). (2012) Enterprise risk management and firm performance. Procedia—Social and Behavioral Sciences, 62, 263–267.CrossRef Quon, T. K., Zeghal, D., & Maingot, M. (2012). (2012) Enterprise risk management and firm performance. Procedia—Social and Behavioral Sciences, 62, 263–267.CrossRef
21.
Zurück zum Zitat Kyleen, P., & Terry, A. (2018). COSO’s updated enterprise risk management framework—A quest for depth and clarity. The Journal of Corporate Accounting and Finance, 29, 16–22.CrossRef Kyleen, P., & Terry, A. (2018). COSO’s updated enterprise risk management framework—A quest for depth and clarity. The Journal of Corporate Accounting and Finance, 29, 16–22.CrossRef
23.
Zurück zum Zitat Misra, S. C., Kumar, V., & Kumar, U. (2007). A strategic modeling technique for information security risk assessment. Information Management and Computer Security, 15(1), 64–77.CrossRef Misra, S. C., Kumar, V., & Kumar, U. (2007). A strategic modeling technique for information security risk assessment. Information Management and Computer Security, 15(1), 64–77.CrossRef
25.
Zurück zum Zitat Jack, F., & Jones, J. (2014). Measuring and managing information risk: A FAIR approach (1st ed.). Butterworth-Heinemann Press. Jack, F., & Jones, J. (2014). Measuring and managing information risk: A FAIR approach (1st ed.). Butterworth-Heinemann Press.
26.
Zurück zum Zitat Chavez, P. J. A., & Seow, C. (2012). Managing food quality risk in global supply chain: A risk management framework. International Journal of Engineering Business Management, 4, 3.CrossRef Chavez, P. J. A., & Seow, C. (2012). Managing food quality risk in global supply chain: A risk management framework. International Journal of Engineering Business Management, 4, 3.CrossRef
28.
Zurück zum Zitat Ronald, S. (2018). Risk management framework for information systems and organizations: A system life cycle approach for security and privacy, Special Publication (NIST SP), 800-37 Rev. 2 Ronald, S. (2018). Risk management framework for information systems and organizations: A system life cycle approach for security and privacy, Special Publication (NIST SP), 800-37 Rev. 2
29.
Zurück zum Zitat Wynn, J., Whitmore, G., Upton, L., Spriggs, D., McKinnon, R., McInnes, R., Graubart, L., & Clausen, J. (2011). Threat assessment and remediation analysis (TARA) methodology description version 1.0. Bedford, MA. Wynn, J., Whitmore, G., Upton, L., Spriggs, D., McKinnon, R., McInnes, R., Graubart, L., & Clausen, J. (2011). Threat assessment and remediation analysis (TARA) methodology description version 1.0. Bedford, MA.
36.
Zurück zum Zitat Saaty, T. L. (2004). Fundamentals of the analytic network process—multiple networks with benefits, costs, opportunities and risks. Journal of Systems Science and Systems Engineering, 13–3, 348–379.CrossRef Saaty, T. L. (2004). Fundamentals of the analytic network process—multiple networks with benefits, costs, opportunities and risks. Journal of Systems Science and Systems Engineering, 13–3, 348–379.CrossRef
38.
Zurück zum Zitat Charity, O. (2015). Markov chain models in discrete time space and application to personnel management. Journal for Studies in Management and planning, 1, 351–358. Charity, O. (2015). Markov chain models in discrete time space and application to personnel management. Journal for Studies in Management and planning, 1, 351–358.
Metadaten
Titel
A risk comparison framework for evaluating the impact of telecom cloudification in organizational risk profile
verfasst von
Binesh Jose
T. Radha Ramanan
S. D. Madhu Kumar
Publikationsdatum
20.08.2021
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2021
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-021-00827-5

Weitere Artikel der Ausgabe 3/2021

Telecommunication Systems 3/2021 Zur Ausgabe

Neuer Inhalt