.

A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing

LAUR Repository

Show simple item record

dc.contributor.author Kouatli, Issam en_US
dc.date.accessioned 2016-05-06T13:02:17Z en_US
dc.date.available 2016-05-06T13:02:17Z en_US
dc.date.copyright 2014 en_US
dc.date.issued 2016-05-06
dc.identifier.issn 1751-1348 en_US
dc.identifier.uri http://hdl.handle.net/10725/3700 en_US
dc.description.abstract Purpose - The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud. Design/methodology/approach – A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific. Findings – After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s). Practical implications – Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them. Originality/value – A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique. en_US
dc.language.iso en en_US
dc.title A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing en_US
dc.type Article en_US
dc.description.version Published en_US
dc.author.school SOB en_US
dc.author.idnumber 200301034 en_US
dc.author.department Department of Information Technology and Operations Management (ITOM) en_US
dc.description.embargo N/A en_US
dc.relation.journal Journal of Management History en_US
dc.journal.volume 20 en_US
dc.journal.issue 4 en_US
dc.article.pages 409-433 en_US
dc.keywords Comparative method en_US
dc.keywords Business ethics en_US
dc.keywords Cloud computing en_US
dc.keywords Work ethic en_US
dc.keywords Technology management en_US
dc.keywords Network security en_US
dc.keywords Work motivation en_US
dc.keywords Vulnerability categories en_US
dc.keywords Cloud ethics en_US
dc.keywords Business security en_US
dc.keywords Cloud business protection en_US
dc.keywords Cloud malware attacks en_US
dc.identifier.doi http://dx.doi.org/10.1108/JMH-02-2014-0018 en_US
dc.identifier.ctation Kouatli, I. (2014). A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing. Journal of Management History, 20(4), 409-433. en_US
dc.author.email issam.kouatli@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://www.emeraldinsight.com/doi/full/10.1108/JMH-02-2014-0018 en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account