{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:45:00Z","timestamp":1742971500044,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319580760"},{"type":"electronic","value":"9783319580777"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58077-7_43","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T09:14:32Z","timestamp":1494666872000},"page":"534-549","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cloud Computing Security and Privacy: An Empirical Study"],"prefix":"10.1007","author":[{"given":"Farid","family":"Shirazi","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Seddighi","sequence":"additional","affiliation":[]},{"given":"Amna","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"43_CR1","unstructured":"Gens, F.: IDC IT Cloud Services Survey: top benefits and challenges, 15 December 2009. http:\/\/blogs.idc.com\/ie\/?p=730. Accessed 27 Sept 2016"},{"key":"43_CR2","unstructured":"Stamford, C.: Gartner: Worldwide IT spending, 18 January 2016. http:\/\/www.gartner.com\/newsroom\/id\/3186517. Accessed 27 Sept 2016"},{"key":"43_CR3","unstructured":"Stamford, C.: Gartner Says Worldwide Public Cloud Services Market Is Forecast to Reach $204 Billion in 2016, 25 January 2016. http:\/\/www.gartner.com\/newsroom\/id\/3188817. Accessed 13 Oct 2016"},{"key":"43_CR4","unstructured":"IDC. IDC FutureScape: Worldwide Cloud 2016 Predictions\u2014Mastering the Raw Material of Digital Transformation (2015). www.idc.com"},{"key":"43_CR5","unstructured":"Cisco. Cisco Global Cloud Index: Forecast and Methodology, 21 April 2016. http:\/\/www.cisco.com\/. Accessed 13 Oct 2016"},{"key":"43_CR6","unstructured":"KPMG. Clarity in the Cloud (2011). www.kpmg.com\/SG\/en\/IssuesAndInsights\/Documents\/ICE-ClarityInTheCloud.pdf"},{"key":"43_CR7","unstructured":"Hickey, A.R.: SMB Cloud Spending To Approach $100 Billion By 2014, 12 August 2010. http:\/\/www.crn.com\/"},{"key":"43_CR8","unstructured":"Ponemon Institute. 2016 Cost of Data Breach Study: Global Analysis, June 2016. http:\/\/www-03.ibm.com\/security\/data-breach\/"},{"key":"43_CR9","unstructured":"ENISA. Cloud Computing-Benefits, risks and recommendation for information security, 9 November 2009. https:\/\/www.enisa.europa.eu\/"},{"key":"43_CR10","unstructured":"IDC New IDC IT Cloud Services Survey: Top Benefits and Challenges, 15 December 2009. http:\/\/blogs.idc.com\/ie\/?p=730"},{"key":"43_CR11","unstructured":"EY. Under cyber attack EY\u2019s Global Information Security Survey 2013, October 2013. http:\/\/www.ey.com"},{"key":"43_CR12","unstructured":"Deloitte. How to ensure control and security when moving to SaaS\/cloud applications, October 2013. www.deloitte.com"},{"key":"43_CR13","unstructured":"KPMG. Elevating business in the cloud (2014). www.kpmg.com\/cloudsolutions"},{"key":"43_CR14","volume-title":"Qualitative Inhaltsanalyse. Grundlagen und Techniken","author":"P Mayring","year":"2000","unstructured":"Mayring, P.: Qualitative Inhaltsanalyse. Grundlagen und Techniken, 7th edn. Deutscher Studien Verlag, Weinheim (2000). First edition 1983","edition":"7"},{"issue":"1","key":"43_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/2192-113X-1-11","volume":"1","author":"N Gonzalez","year":"2012","unstructured":"Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., N\u00e4slund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput.: Adv. Syst. Appl. 1(1), 11 (2012)","journal-title":"J. Cloud Comput.: Adv. Syst. Appl."},{"key":"43_CR16","unstructured":"Popovi\u0107, K., Hocenski, \u017d.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International Convention, pp. 344\u2013349. IEEE Xplore, Opatija, May 2010"},{"issue":"1","key":"43_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","volume":"39","author":"C Rong","year":"2013","unstructured":"Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47\u201354 (2013)","journal-title":"Comput. Electr. Eng."},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647\u2013651, March 2012","DOI":"10.1109\/ICCSEE.2012.193"},{"issue":"4","key":"43_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"issue":"1","key":"43_CR20","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing\u2014the business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Support Syst."},{"issue":"2","key":"43_CR21","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DA Fernandes","year":"2014","unstructured":"Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113\u2013170 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. In: 2010 Information Security for South Africa, pp. 1\u20137. IEEE, August 2010","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"43_CR23","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85\u201390. ACM, November 2009","DOI":"10.1145\/1655008.1655020"},{"issue":"2","key":"43_CR24","first-page":"1","volume":"24","author":"H Katzan","year":"2010","unstructured":"Katzan, H.: On the privacy of cloud computing. Int. J. Manag. Inf. Syst. (IJMIS) 24(2), 1 (2010)","journal-title":"Int. J. Manag. Inf. Syst. (IJMIS)"},{"key":"43_CR25","unstructured":"Bowen, J.A.: Cloud computing: issues in data privacy\/security and commercial considerations. Comput. Lawyer (2011)"},{"key":"43_CR26","unstructured":"Bender, D.: Privacy and security issues in cloud computing. Comput. Internet Lawyer (2012)"},{"issue":"6","key":"43_CR27","first-page":"19","volume":"18","author":"C Wolf","year":"2012","unstructured":"Wolf, C.: Privacy and data security in the cloud: what are the issues? IP Litig.: Devoted Intellect. Prop. Litig. Enforc. 18(6), 19\u201328 (2012)","journal-title":"IP Litig.: Devoted Intellect. Prop. Litig. Enforc."},{"key":"43_CR28","unstructured":"Cavoukian, A.: Privacy by Design: The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Information and Privacy Commissioner Ontario, Canada (2009)"},{"key":"43_CR29","doi-asserted-by":"publisher","unstructured":"De Cristofaro, E., Wright, M. (eds.): PETS 2013. LNCS, vol. 7981. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39077-7. See also Security and Privacy http:\/\/www.parc.com\/work\/competencies.html","DOI":"10.1007\/978-3-642-39077-7"},{"key":"43_CR30","doi-asserted-by":"crossref","unstructured":"Balfanz, D., Durfee, G., Smetters, D.K., Grinter, R.E.: In Search of usable security: five lessons from the field. IEEE Secur. Priv. 2(5), 19\u201324 (2004). http:\/\/www.parc.com\/work\/competencies.html","DOI":"10.1109\/MSP.2004.71"},{"issue":"5","key":"43_CR31","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1108\/14684520710832315","volume":"31","author":"VL Casalo","year":"2007","unstructured":"Casalo, V.L., Flavian, C., Miguel Guinaliu, M.: The role of security, privacy, usability and reputation in the development of online banking. Online Inf. Rev. 31(5), 583\u2013603 (2007)","journal-title":"Online Inf. Rev."},{"key":"43_CR32","unstructured":"Yahoo 2016. Recognize and secure a hacked Yahoo Mail account. https:\/\/investor.yahoo.net\/releasedetail.cfm?ReleaseID=1004285"},{"key":"43_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-319-07863-2_60","volume-title":"Human Interface and the Management of Information. Information and Knowledge in Applications and Services","author":"SR Tehrani","year":"2014","unstructured":"Tehrani, S.R., Shirazi, F.: Factors influencing the adoption of cloud computing by small and medium size enterprises (SMEs). In: Yamamoto, S. (ed.) HCI 2014. LNCS, vol. 8522, pp. 631\u2013642. Springer, Cham (2014). doi:10.1007\/978-3-319-07863-2_60"},{"key":"43_CR34","unstructured":"Motherboard.: Hacker Tries To Sell 427 Million Stolen MySpace Passwords For $2,800, 27 May 2016. http:\/\/motherboard.vice.com"},{"key":"43_CR35","unstructured":"Satter, R.: And this password breach could have ripple effects well beyond Yahoo (2016). http:\/\/www.theglobeandmail.com\/"},{"key":"43_CR36","unstructured":"Sporck, L.: 8 of the Largest Data Breaches of All Time, 17 January 2016. https:\/\/www.opswat.com\/"},{"key":"43_CR37","unstructured":"Leswing, K.: Yahoo confirms major breach\u2014and it could be the largest hack of all time, 22 September 2016. http:\/\/uk.businessinsider.com"},{"key":"43_CR38","unstructured":"Beekman, D.: Hackers hit Nasdaq, 7-Eleven, others for $300 million: Feds, 26 July 2013. http:\/\/www.nydailynews.com"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Interaction Contexts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58077-7_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:20:13Z","timestamp":1625102413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58077-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319580760","9783319580777"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58077-7_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"14 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hci2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2017.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}