{"title":"云安全与电子交易安全:","authors":"H. Abdullahi","doi":"10.47747/ijisi.v4i2.1085","DOIUrl":null,"url":null,"abstract":"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \n ","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cloud Security And Electronic Transaction Security:\",\"authors\":\"H. Abdullahi\",\"doi\":\"10.47747/ijisi.v4i2.1085\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \\n \",\"PeriodicalId\":0,\"journal\":{\"name\":\"\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0,\"publicationDate\":\"2023-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47747/ijisi.v4i2.1085\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47747/ijisi.v4i2.1085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Security And Electronic Transaction Security:
The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes.