Search results1 – 3 of 3
To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across…
To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy values with respect to cloud computing to define cloud privacy objectives.
For the purpose of this study, the authors adopted Keeney’s (1994) value-focused thinking approach to identify privacy objectives with respect to cloud computing.
The results of this study identified the following six fundamental cloud privacy objectives: to increase trust with cloud provider, to maximize identity management controls, to maximize responsibility of information stewardship, to maximize individual’s understanding of cloud service functionality, to maximize protection of rights to privacy, and to maintain the integrity of data.
One limitation is generalizability of the cloud privacy objectives, and the second is research bias. As this study focused on cloud privacy, the authors felt that the research participants’ increased knowledge of technology usage, including that of cloud technology, was a benefit that outweighed risks associated with not having a random selection of the general population. The newness and unique qualities of privacy issues in cloud computing are better fitted to a qualitative study where issues can emerge naturally through a holistic approach opposed to trying to force fit an existing set of variables or constructs into the context of privacy and cloud computing.
Currently, there is little to no guidance in the literature or in practice as to what organizations need to do to ensure they protect their stakeholders privacy in a cloud computing environment. This study works at closing this knowledge gap by identifying cloud privacy objectives.
The foundation collection of the printed books now forming the Library of the British Museum was that of Sir Hans Sloane. This comprised about 40,000 volumes. To it was…
The foundation collection of the printed books now forming the Library of the British Museum was that of Sir Hans Sloane. This comprised about 40,000 volumes. To it was added in 1759 the Royal collection, begun in the time of Henry VII and inherited by George II from his predecessors on the throne.
The campaign for striker replacement legislation, which began in the late 1980s and had effectively ended by the mid-1990s, was the most important political battle over…
The campaign for striker replacement legislation, which began in the late 1980s and had effectively ended by the mid-1990s, was the most important political battle over labor legislation since the defeat of the Labor Law Reform Bill in 1978. Striker replacement was the AFL-CIO’s top legislative priority in the early 1990s and, coming quickly after the passage of NAFTA, which labor had opposed, the defeat of its campaign solidified organized labor’s reputation for failure in legislative battles. As yet, however, the political campaign for striker replacement legislation has attracted surprisingly little attention from industrial relations scholars.