云安全与电子交易安全:

Pub Date : 2023-06-10 DOI:10.47747/ijisi.v4i2.1085
H. Abdullahi
{"title":"云安全与电子交易安全:","authors":"H. Abdullahi","doi":"10.47747/ijisi.v4i2.1085","DOIUrl":null,"url":null,"abstract":"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \n ","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cloud Security And Electronic Transaction Security:\",\"authors\":\"H. Abdullahi\",\"doi\":\"10.47747/ijisi.v4i2.1085\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \\n \",\"PeriodicalId\":0,\"journal\":{\"name\":\"\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0,\"publicationDate\":\"2023-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47747/ijisi.v4i2.1085\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47747/ijisi.v4i2.1085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算的不安全性导致重要信息的丢失或暴露,从而威胁到在线交易。这些不幸的事件导致了经济损失、云服务的使用减少和投资转移。因此,本章将对云安全和电子交易安全进行评估。本章采用定性研究方法,通过对编辑过的书籍、同行评议的期刊和可靠的网络资源的内容分析,二次获取数据。它本质上是描述性的,并进行了主题分析。本文以日常活动理论和破窗理论为基础。调查结果显示,云活动受到云服务提供商的内部安全威胁和其他云服务用户的外部威胁。本章建议对云服务提供商的工作人员进行适当的背景调查,并对云安全协议进行公众启蒙。这一章对个人、云服务提供商、非政府组织和网络犯罪领域的研究人员都很有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
Cloud Security And Electronic Transaction Security:
The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes.  
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1