Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

IT Security Risk Management in the Context of Cloud Computing
Nội dung xem thử
Mô tả chi tiết
IT Security Risk Management in
the Context of Cloud Computing
André Loske
IT Security Risk
Management in the
Context of Cloud
Computing
Towards an Understanding
of the Key Role of Providers’ IT
Security Risk Perceptions
With a foreword by Prof. Dr. Peter Buxmann
André Loske
Darmstadt, Germany
Dissertation, TU Darmstadt, 2015
Hochschulkennziffer D17
ISBN 978-3-658-11339-1 ISBN 978-3-658-11340-7 (eBook)
DOI 10.1007/978-3-658-11340-7
Library of Congress Control Number: 2015954946
Springer Vieweg
© Springer Fachmedien Wiesbaden 2015
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or
part of the material is concerned, speci¿ cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on micro¿ lms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by
similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a speci¿ c statement, that such names are
exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained
herein or for any errors or omissions that may have been made.
Printed on acid-free paper
Springer Vieweg is a brand of Springer Fachmedien Wiesbaden
Springer Fachmedien Wiesbaden is part of Springer Science+Business Media
(www.springer.com)
Foreword
Cloud Computing is one of the most strongly growing types of IT outsourcing and companies,
governments, and non-profit organizations alike are increasingly leveraging this emerging
paradigm. For example, SAP recently announced a major strategy change and invests heavily
in the expansion of its Cloud business. Most of the SAP applications will be readily available
as a service in the near future. However, the acceptance of Cloud solutions by clients lags far
behind the predictions of leading market analysts. In the last years, the promised technological
and economic advantages of the Cloud were once too often accompanied by serious IT security incidents which not only jeopardized the reputation of the respective service providers but
also daunted many clients for the long term. Considering the existence-threatening consequences of IT security incidents in the context of the Cloud, it could be expected that the service providers do everything in their power to mitigate these risks. Nonetheless, a closer look
at the security whitepapers of well-established Cloud services in many cases reveals a lack of
crucial IT security measures, which are, for example, defined as minimum IT security standards for service providers by the Federal Office for Information Security. Intrigued by this
observation, the thesis investigates whether the possibility that the providers’ decision makers
underestimate their services’ IT security risks can explain the failure to implement necessary
safeguarding measures in Cloud services.
Therefore, the primary research objective of this thesis is to analyze the effects of decision
makers’ subjective risk perception on the providers’ IT security management. In this thesis’s
first part, drawing on organizational IT security planning models and findings of previous
technology threat avoidance research, a conceptual model of the influence of decision makers’
risk perception on providers’ IT security risk investment decisions is developed. A quantitative empirical survey is used to examine how the responsible decision makers of the service
providers perceive risks and how these risk estimations affect the IT security investment behavior. By transferring well-established approaches from psychological research, Mr. Loske
afterwards demonstrates that the decision makers of Cloud providers exhibit a systematic underestimation of the IT security risks that their organizations are exposed to, resulting in underinvestment in safeguarding measures.
The second part of this thesis alters the view and investigates how the providers’ assessment
of their Cloud services’ IT security risk exposure influences the adoption behavior of client
companies. Therefore, a theoretical model is developed which integrates the providers’ IT
security assessments in a technology acceptance model for Cloud services in terms of perceptual incongruence between the providers’ perceptions and those of the clients. Based on an
empirical survey with potential client companies’ executives, Mr. Loske demonstrates that the
VI Foreword
underestimation of the risks by the providers not only causes an underinvestment in IT security but also facilitates a disagreement among the providers and their clients on the IT security
risks of the services. In particular, the perceptual gap between the providers and their clients is
shown to both considerably increase the IT security risk perceptions of the clients and significantly inhibit their intentions to use those providers’ Cloud services.
Altogether, Mr. Loske makes several significant contributions to information systems science.
This thesis offers theoretical explanation and empirical support for the impact of decision
makers’ subjective IT security risk perceptions on the results of the organizational IT security
risk management. Beyond that, the work offers a new perspective on IT security risk perceptions by demonstrating that there are typically two perspectives which are independently associated with downstream beliefs and behavior. Moreover, the thesis adds to the body of
knowledge about the formation of IT security risk perceptions by showing that these perceptions are often subject to systematic errors in terms of unrealistic optimism. Additionally, this
work advances our understanding of how perceptual differences between providers and their
clients concerning IT security risks affect adoption decisions of the clients by transferring the
established concepts of perceptual concurrence and cognitive dissonance to the field of IT
security. Furthermore, this work highlights the importance for researchers to incorporate both
parts of the dyad, i.e. the clients and the providers, when studying questions related to the IT
security of modern IT delivery models, such as the Cloud.
Both empirical studies and the statistical analyses show a high degree of methodological rigor
and provide numerous interesting results. This thesis will be valuable to readers in both, academia and practice, as it suggests concrete recommended actions for providers and clients that
can help to increase the IT security of services and eventually improve the market success of
Cloud Computing. Therefore, I wish this thesis a widespread distribution.
Darmstadt, May 2015 Prof. Dr. Peter Buxmann
Acknowledgements
This thesis was written during my work as a research assistant at the Chair of Information
Systems | Software Business & Information Management at the Technical University of
Darmstadt. The progress and completion of my dissertation would not have been possible
without the support of many people, whom I sincerely wish to thank with the following acknowledgments.
First, I am especially grateful to my supervisor Prof. Dr. Peter Buxmann, who greatly supported me and made my dissertation possible in the first place. Likewise, I would like to thank
and express my deepest gratitude to my advisor Dr. Thomas Widjaja, who challenged me to
achieve my highest potential and helped me to deal with those challenges by providing his
fullest guidance and support. I sincerely appreciate that he always found the time to devote to
our long research meetings, answer all my questions, and provide insightful and prompt feedback despite his busy schedule. I also would like to express my appreciation to my second
referee Prof. Dr. Alexander Benlian for his valuable advises and our productive research collaboration.
Furthermore, I would like to thank Prof. Dr. Izak Benbasat and Prof. Dr. Hasan Cavusoglu,
who invited me to work as a visiting researcher for the MIS division of the Sauder School of
Business at the University of British Columbia. I feel very fortunate that I have had the opportunity to work together with these experienced researchers which did not only broaden my
horizon but also enhanced my abilities of conducting good research.
Additionally, I thank the CASED graduate school for granting me a PhD scholarship as well
as the numerous CASED postdocs and PhD students with whom I conducted the pre-studies.
My special thanks go to my friends and colleagues Adrian, Alexander, Anton, Christoph,
Helena, Hendrik, Jasmin, Jin, Markus, Markus, Martin, Nicole, Nihal, Rabea, Ruth, Stefan,
Thorsten, Tobias, and Tobias with whom I have had many interesting and fruitful discussions
and who have provided valuable feedback on my research.
Finally, I would like to express a large gratitude to my beloved wife, my family, and to my
parents for their invaluable support and thoughtfulness. They all gave me the necessary
strength to persist through challenging times.
Darmstadt, May 2015 André Loske
Table of Contents
1 Introduction ....................................................................................................................... 1
1.1 Problem Description and Motivation ........................................................................ 1
1.2 Objectives and Benefits ............................................................................................. 5
1.3 Structure of the Thesis ............................................................................................... 9
2 Foundations ..................................................................................................................... 15
2.1 Cloud Computing .................................................................................................... 15
2.1.1 Essential Characteristics .............................................................................. 16
2.1.2 Delivery Models........................................................................................... 17
2.1.3 Deployment Models ..................................................................................... 18
2.2 IT Security Risk Perception .................................................................................... 20
2.2.1 The Nature of Perceived Risks .................................................................... 21
2.2.2 Perceived IT Security Risks in the Context of the Cloud ............................ 23
2.3 Organizational IT Security Risk Management ........................................................ 26
2.3.1 Phase I: Identification of IT Security Threat ............................................... 27
2.3.2 Phase II: IT Security Risk Analysis ............................................................. 28
2.3.3 Phase III: Solution Analysis ......................................................................... 30
2.3.4 Phase IV: Decision ....................................................................................... 31
2.3.5 Phase V: Implementation ............................................................................. 33
3 Part I: The Inhibiting Role of Unrealistic Optimism in Providers’ IT Security
Risk Management ........................................................................................................... 35
3.1 Theoretical Background and Hypotheses Development ......................................... 35
3.1.1 Organizational IT Security Risk Management ............................................ 36
3.1.2 Technology Threat Avoidance Theory ........................................................ 37
3.1.3 Institutional Theory ...................................................................................... 46
3.1.4 Decision Makers’ IT Security Risk Perceptions .......................................... 50
3.1.5 Unrealistic Optimism in Decision Makers’ IT Security Risk Perceptions .. 55
3.2 Research Methodology ............................................................................................ 59
3.2.1 Measurement Model .................................................................................... 59
3.2.1.1 Measurement of Absolute Unrealistic Optimism ........................ 60
3.2.1.2 Measurement of Comparative Unrealistic Optimism .................. 66
3.2.2 Survey Administration ................................................................................. 67
3.2.3 Sample Characteristics ................................................................................. 67
3.2.4 Data Analyses .............................................................................................. 69
X Table of Contents
3.3 Results ..................................................................................................................... 71
3.3.1 Impacts of Decision Makers’ IT Security Risk Perceptions on
Providers’ IT Security Risk Management.................................................... 71
3.3.1.1 Assessment of Measurement Validation ..................................... 71
3.3.1.2 Results of the Structural Model Testing ...................................... 73
3.3.2 Existence of Unrealistic Optimism in the IT Security Risk Perceptions
of Providers’ Decision Makers .................................................................... 79
3.3.2.1 Analysis of Absolute Unrealistic Optimism ................................ 79
3.3.2.2 Analysis of Comparative Unrealistic Optimism ......................... 85
3.4 Discussion of Study Findings .................................................................................. 88
4 Part II: Perceptual Incongruences regarding the IT Security Risks as a Barrier
to Cloud Adoption ........................................................................................................... 93
4.1 Theoretical Background and Hypotheses Development ......................................... 93
4.1.1 Perceptual Congruence ................................................................................ 93
4.1.2 Perceptual Incongruences regarding the IT Security Risks ......................... 95
4.1.3 Cognitive Dissonance Theory ...................................................................... 97
4.1.4 Expectation Confirmation Theory ............................................................... 99
4.1.5 Cloud Adoption .......................................................................................... 100
4.2 Research Methodology .......................................................................................... 103
4.2.1 Measurement Model .................................................................................. 103
4.2.2 Survey Administration ............................................................................... 104
4.2.3 Sample Characteristics ............................................................................... 105
4.2.4 Data Analyses ............................................................................................ 107
4.3 Results ................................................................................................................... 109
4.3.1 Existence of Perceptual Incongruences between Providers and
Customers regarding the IT Security Risks ............................................... 109
4.3.2 Impacts of Perceptual Incongruences between Providers and Customers
regarding the IT Security Risks on Cloud Adoption ................................. 111
4.3.2.1 Assessment of Measurement Validation ................................... 112
4.3.2.2 Results of the Structural Model Testing .................................... 113
4.4 Discussion of Study Findings ................................................................................ 116
5 Conclusion and Summary of Key Findings ................................................................ 119
5.1 Implications for Theory and Research .................................................................. 119
5.2 Implications for Practice ....................................................................................... 123
5.2.1 Implications and Recommended Actions for Providers ............................ 123
5.2.2 Implications and Recommended Actions for (Potential) Customers ......... 126
5.3 Limitations and Future Research Directions ......................................................... 127
Table of Contents XI
5.4 Résumé .................................................................................................................. 130
Appendix ............................................................................................................................... 133
A.1 Supporting Material for Part I (Chapter 3) ............................................................ 133
A.1.1 Measurement Items .................................................................................... 133
A.1.2 Validity Analysis ....................................................................................... 138
A.1.3 Consistency Analysis of the Absolute Unrealistic Optimism Classifier ... 139
A.1.4 Multi-Group Analysis of the Structural Model .......................................... 140
A.2 Supporting Material for Part II (Chapter 4) .......................................................... 141
A.2.1 Measurement Items .................................................................................... 141
A.2.2 Validity Analysis ....................................................................................... 142
A.2.3 Formation of IT Security Risk Perceptions in the Context of the Cloud ... 143
References ............................................................................................................................. 145
List of Tables
Table 1-1: Mapping of Research Questions to Parts and Chapters .......................................... 13
Table 2-1: Perceived IT Security Risks in the Context of the Cloud ....................................... 25
Table 3-1: The Faces of Unrealistic Optimism ........................................................................ 56
Table 3-2: Variables of the Classifier for Absolute Unrealistic Optimism .............................. 65
Table 3-3: Sample Characteristics of the IT Security Risk Management Study ...................... 69
Table 3-4: Assessment of the IT Security Risk Management Measurement Model ................ 72
Table 3-5: Effects of Absolute Unrealistic Optimism on IT Security Risk Management ....... 82
Table 3-6: Existence of Comparative Unrealistic Optimism ................................................... 86
Table 4-1: Sample Characteristics of the Perceptual Incongruence Study ............................ 106
Table 4-2: Perceptual Incongruences regarding the IT Security Risk Dimensions ............... 111
Table 4-3: Assessment of the Perceptual Incongruence Measurement Model ...................... 112
Table A-1: Measurement Items of the IT Security Risk Management Study ........................ 133
Table A-2: Correlation Statistics of the IT Security Risk Management Study ...................... 138
Table A-3: Effects of Different Thresholds of Error on the Results of the Classifier ........... 139
Table A-4: Effects of Absolute Unrealistic Optimism on the Structural Model Results ....... 140
Table A-5: Measurement Items of the Perceptual Incongruence Study ................................. 141
Table A-6: Correlation Statistics of the Perceptual Incongruence Study ............................... 142
List of Figures
Figure 1-1: Structure and Brief Research Summary of the Thesis .......................................... 10
Figure 2-1: Organizational IT Security Risk Management ...................................................... 26
Figure 3-1: Theoretical Foundations of the IT Security Risk Management Model ................. 36
Figure 3-2: Research Model of the IT Security Risk Management Study ............................... 43
Figure 3-3: Effect of Comparative Risk on Competitive Pressure Perceptions ....................... 54
Figure 3-4: Example of Absolute Unrealistic Optimism Classification .................................. 64
Figure 3-5: Empirical Testing of IT Security Risk Management Model ................................. 76
Figure 4-1: Research Model of Perceptual Incongruence Study .............................................. 97
Figure 4-2: Perceptual Incongruences regarding the IT Security Risk Items ........................ 110
Figure 4-3: Empirical Testing of Perceptual Incongruence Model ........................................ 114
Figure A-1: Formation of IT Security Risk Perceptions in the Context of the Cloud ........... 143
List of Abbreviations
API Application Programming Interface
ASP Application Service Provision
AVE Average Variance Extracted
BC Bootstrap Confidence
BPO Business Process Outsourcing
CA Cronbach’s Alpha
CaaS Communication as a Service
CB-SEM Covariance-Based Structural Equation Modeling
CDT Cognitive Dissonance Theory
CEO Chief Executive Officer
CIO Chief Information Officer
Cloud Cloud Computing
CMB Common Method Bias
CO Comparative Optimism
CPR Calculated Protection Ranking
CPU Central Processing Unit
CR Composite Reliability
CRM Customer Relationship Management
CSA Cloud Security Alliance
ECT Expectation Confirmation Theory
EDI Electronic Data Interchange
EFA Exploratory Factor Analyses
ENISA European Network and Information Security Agency
EPPM Extended Parallel Process Model
ERP Enterprise Resource Planning
HBM Health Belief Model
HRA Health Risk Appraisal
HTMT Heterotrait-Monotrait
IaaS Infrastructure as a Service
IEEE Institute of Electrical and Electronics Engineering
IS Information System(s)
ISO International Organization for Standardization
IT Information Technology
ITO Information Technology Outsourcing
XVIII List of Abbreviations
ITSR Information Technology Security Risk
LISREL Linear Structural Relations
MIMIC Multiple Indicators, Multiple Causes
MIS Management Information Systems
MTMM Multitrait-Multimethod
NIST National Institute of Standards and Technology
OLS Ordinary Least Squares
PaaS Platform as a Service
PITSR Perceived Information Technology Security Risk
PLS Partial Least Squares
PMT Protection Motivation Theory
PPR Perceived Protection Ranking
ROI Return on Investment
ROSI Return on Security Investment
RQ Research Question
SaaS Software as a Service
SD Standard Deviation
SEM Structural Equation Modeling
SIEM Security Information and Event Management
SLA Service Level Agreement
TAM Technology Acceptance Model
TTAT Technology Threat Avoidance Theory
UO Unrealistic Optimism
VAR Variance
VIF Variance Inflation Factor
XaaS Everything as a Service
Abstract
Although providers’ decision makers constantly emphasize a low IT security risk (ITSR) in
the Cloud, numerous serious IT security incidents have occurred over the last few years. Considering the theoretical availability of effective safeguards against most of these risks, it
seems that in many cases, the Cloud providers’ decision makers may have underestimated the
ITSRs. The psychological research terms comparable phenomena “unrealistic optimism”.
While prior research has intensively studied the ITSR perceptions of (potential) Cloud customers, the provider side has been completely neglected. In general, even though correct IT
security risk assessments are the foundation for effective IT security risk management in organizations, no research has been dedicated to the effects of organizational decision makers’
subjective ITSR perceptions on the implementation of necessary safeguards. Even more importantly, little or no attention has been paid to the existence and consequences of possible
systematic errors in ITSR perceptions.
Against this backdrop, the first part of this thesis adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of
decision makers’ ITSR perceptions. Drawing on psychological risk perception theory, we
propose an extended theoretical IT security risk management model that explicates how the
subjective ITSR perceptions of decision-makers predict the outcome of providers’ IT security
risk management. Additionally, we transfer established methods of measuring unrealistic optimism to the IT context, which enables us to systematically capture and analyze a potential
underestimation of the ITSRs at the provider side. Based on a large-scale empirical study of
Cloud providers located in North America, we reveal that in many cases, the providers’ decision makers significantly underestimate their services’ ITSR exposure, which inhibits the implementation of necessary safeguarding measures.
We also demonstrate that even though the prevalence of ITSR perceptions among customers
considering Cloud adoption is widely recognized, providers only pay very limited attention to
the concerns expressed by customer companies. In this regard, the specific characteristics of
the Cloud and the systematic underestimation of ITSRs by providers’ decision makers are
likely to cause serious disagreements with (potential) customers about the ITSRs of the
Cloud. Drawing on perceptual congruence literature, the second part of this thesis examines
matched survey responses of Cloud providers and their (potential) customers located in Germany, showing a consistent pattern of perceptual differences across all ITSRs relevant to the
Cloud. In this context, this thesis proposes an extended theoretical model of Cloud adoption
that reveals that this disagreement has strong adverse effects on important downstream beliefs