|
|
|
|
| LEADER |
05139nam a22004573i 4500 |
| 001 |
EBC6381237 |
| 003 |
MiAaPQ |
| 005 |
20231204023215.0 |
| 006 |
m o d | |
| 007 |
cr cnu|||||||| |
| 008 |
231204s2020 xx o ||||0 eng d |
| 020 |
|
|
|a 9783030546601
|q (electronic bk.)
|
| 020 |
|
|
|z 9783030546595
|
| 035 |
|
|
|a (MiAaPQ)EBC6381237
|
| 035 |
|
|
|a (Au-PeEL)EBL6381237
|
| 035 |
|
|
|a (OCoLC)1243545632
|
| 040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
| 050 |
|
4 |
|a HD45
|
| 082 |
0 |
|
|a 004.6782
|
| 100 |
1 |
|
|a Lynn, Theo.
|
| 245 |
1 |
0 |
|a Data Privacy and Trust in Cloud Computing :
|b Building Trust in the Cloud Through Assurance and Accountability.
|
| 250 |
|
|
|a 1st ed.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing AG,
|c 2020.
|
| 264 |
|
4 |
|c ©2021.
|
| 300 |
|
|
|a 1 online resource (166 pages)
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 490 |
1 |
|
|a Palgrave Studies in Digital Business and Enabling Technologies Series
|
| 505 |
0 |
|
|a Intro -- Preface -- Acknowledgement -- Contents -- Abbreviations -- Notes on Contributors -- List of Figures -- List of Tables -- Chapter 1: Understanding Trust and Cloud Computing: An Integrated Framework for Assurance and Accountability in the Cloud -- 1.1 Introduction -- 1.2 Trust -- 1.2.1 Knowledge Based Antecedents -- 1.2.2 Heuristic Antecedents -- 1.3 Cloud Computing -- 1.4 Trust Barriers to Cloud Adoption -- 1.5 Existing Approaches to Overcoming Trust Barriers to Cloud Adoption -- 1.6 Assurance and Accountability Framework -- 1.7 Conclusions -- References -- Chapter 2: Dear Cloud, I Think We Have Trust Issues: Cloud Computing Contracts and Trust -- 2.1 Introduction -- 2.2 Trust, Contracts and Contract Law -- 2.3 The Form of General Cloud Computing Contracts -- 2.4 Common Challenges and Issues in General Cloud Computing Contracts -- 2.4.1 Choice of Law -- 2.4.2 Service Level Agreements and Limitation of Liability -- 2.4.3 Acceptable Use Policies -- 2.4.4 Data Protection and Privacy Policies -- 2.4.5 Variation in Terms -- 2.4.6 Intellectual Property -- 2.4.7 Termination -- 2.4.8 Dispute Settlement -- 2.5 Future of Cloud Contracts -- 2.6 Conclusion -- 2.7 Cases -- References -- Chapter 3: Competing Jurisdictions: Data Privacy Across the Borders -- 3.1 Introduction -- 3.2 Data Privacy Across the Atlantic -- 3.3 Regulating Borderless Cloud Computing -- 3.4 Data Localisation and Digital Sovereignty -- 3.5 Conclusion -- References -- Chapter 4: Understanding and Enhancing Consumer Privacy Perceptions in the Cloud -- 4.1 Introduction -- 4.2 Cloud Computing: Privacy and Security Issues -- 4.2.1 Information Security -- 4.2.2 Information Privacy -- 4.3 Examining Privacy Perceptions in the Cloud -- 4.4 Enhancing Privacy Perceptions in the Cloud -- 4.4.1 Institutional Assurances -- 4.4.2 Just-in-Time Interventions -- 4.4.3 Building Privacy Knowledge.
|
| 505 |
8 |
|
|a 4.5 Future Research Directions -- 4.6 Concluding Remarks -- References -- Chapter 5: Justice vs Control in Cloud Computing: A Conceptual Framework for Positioning a Cloud Service Provider's Privacy Orientation -- 5.1 Introduction -- 5.2 Privacy as a Control or Justice Behavior -- 5.2.1 Privacy as Control -- 5.2.2 Privacy as Justice -- 5.3 Privacy and Cloud Computing -- 5.4 The Privacy Orientation Framework -- 5.4.1 Framework Dimensions -- 5.4.1.1 Compliers -- 5.4.1.2 Integrators -- 5.4.1.3 Citizens -- 5.4.1.4 Warriors -- 5.5 Conclusion -- References -- Chapter 6: Ethics and Cloud Computing -- 6.1 Introduction -- 6.2 An Overview of Ethics and Ethical Theories for Analysis of Cloud Computing -- 6.3 Ethics and Cloud Computing -- 6.3.1 The Ethics of Data in Cloud Computing -- 6.3.1.1 Data Ownership -- 6.3.1.2 Data Security and Privacy -- 6.3.2 The Ethics of Providers of Cloud Computing Services -- 6.3.2.1 Codes of Ethics for Cloud Computing: Promoting Trust -- 6.3.2.2 Green and Sustainable Cloud Computing -- 6.3.2.3 Concentration of Power and Oligopolies in the Cloud Computing Industry -- 6.3.3 The Ethics of Cloud Computing Users -- 6.4 Conclusions -- References -- Chapter 7: Trustworthy Cloud Computing -- 7.1 Introduction -- 7.2 Security and Privacy -- 7.3 Reliability -- 7.4 Business Integrity -- 7.5 Conclusion -- References -- Index.
|
| 588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
| 590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
| 655 |
|
4 |
|a Electronic books.
|
| 700 |
1 |
|
|a Mooney, John G.
|
| 700 |
1 |
|
|a van der Werff, Lisa.
|
| 700 |
1 |
|
|a Fox, Grace.
|
| 776 |
0 |
8 |
|i Print version:
|a Lynn, Theo
|t Data Privacy and Trust in Cloud Computing
|d Cham : Springer International Publishing AG,c2020
|z 9783030546595
|
| 797 |
2 |
|
|a ProQuest (Firm)
|
| 830 |
|
0 |
|a Palgrave Studies in Digital Business and Enabling Technologies Series
|
| 856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6381237
|z Click to View
|