Cloud Security And Electronic Transaction Security:

Pub Date : 2023-06-10 DOI:10.47747/ijisi.v4i2.1085
H. Abdullahi
{"title":"Cloud Security And Electronic Transaction Security:","authors":"H. Abdullahi","doi":"10.47747/ijisi.v4i2.1085","DOIUrl":null,"url":null,"abstract":"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \n ","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47747/ijisi.v4i2.1085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes.  
分享
查看原文
云安全与电子交易安全:
云计算的不安全性导致重要信息的丢失或暴露,从而威胁到在线交易。这些不幸的事件导致了经济损失、云服务的使用减少和投资转移。因此,本章将对云安全和电子交易安全进行评估。本章采用定性研究方法,通过对编辑过的书籍、同行评议的期刊和可靠的网络资源的内容分析,二次获取数据。它本质上是描述性的,并进行了主题分析。本文以日常活动理论和破窗理论为基础。调查结果显示,云活动受到云服务提供商的内部安全威胁和其他云服务用户的外部威胁。本章建议对云服务提供商的工作人员进行适当的背景调查,并对云安全协议进行公众启蒙。这一章对个人、云服务提供商、非政府组织和网络犯罪领域的研究人员都很有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信