{"id":"https://openalex.org/W2586315114","doi":"https://doi.org/10.1108/ics-09-2015-0037","title":"Cloud computing assurance \u2013 a review of literature guidance","display_name":"Cloud computing assurance \u2013 a review of literature guidance","publication_year":2017,"publication_date":"2017-03-01","ids":{"openalex":"https://openalex.org/W2586315114","doi":"https://doi.org/10.1108/ics-09-2015-0037","mag":"2586315114"},"language":"en","primary_location":{"id":"doi:10.1108/ics-09-2015-0037","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-09-2015-0037","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020056259","display_name":"Rossouw von Solms","orcid":"https://orcid.org/0000-0002-9860-2346"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Rossouw von Solms","raw_affiliation_strings":["School of ICT, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"School of ICT, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056123128","display_name":"Melanie Willett","orcid":null},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Melanie Willett","raw_affiliation_strings":["School of ICT, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa"],"affiliations":[{"raw_affiliation_string":"School of ICT, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020056259"],"corresponding_institution_ids":["https://openalex.org/I99712911"],"apc_list":null,"apc_paid":null,"fwci":1.4509,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.85891668,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"25","issue":"1","first_page":"26","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.954800009727478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9474999904632568,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8270567655563354},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.6594854593276978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4841635823249817},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4341159462928772},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.42839592695236206},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.41452986001968384},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39567452669143677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33314085006713867},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1982118785381317}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8270567655563354},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.6594854593276978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4841635823249817},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4341159462928772},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.42839592695236206},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.41452986001968384},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39567452669143677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33314085006713867},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1982118785381317},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-09-2015-0037","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-09-2015-0037","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W21955322","https://openalex.org/W1502542138","https://openalex.org/W2042260418","https://openalex.org/W2078393478","https://openalex.org/W2209768828","https://openalex.org/W2740901904","https://openalex.org/W4239538780"],"related_works":["https://openalex.org/W2002383399","https://openalex.org/W644644594","https://openalex.org/W642180557","https://openalex.org/W2506073049","https://openalex.org/W4244478748","https://openalex.org/W2780591772","https://openalex.org/W3122105723","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416"],"abstract_inverted_index":{"Purpose":[0],"This":[1,167],"paper":[2,120,149,168],"aims":[3,169],"to":[4,37,45,96,112,153,170,179,194],"provide":[5],"guidance":[6],"on":[7,123,222],"cloud":[8,105,140,155,191,210,229],"computing":[9,106,141,156,211],"assurance":[10,157,181,221],"from":[11,134,147],"an":[12,124],"IT":[13,138,163,187],"governance":[14,28,51,164],"point":[15],"of":[16,29,40,49,104,118,127,162,177,209,224],"view.":[17],"The":[18,116,145],"board":[19],"and":[20,75,84,89,132,142,202,213,227],"executive":[21],"management":[22,196],"are":[23,77,82,203],"tasked":[24],"with":[25,55,87,94],"ensuring":[26],"proper":[27,73],"organizations,":[30],"which":[31,52],"should":[32],"in":[33,57,78,107,206],"the":[34,97,102,113,135,175,198,207],"end":[35],"contribute":[36],"a":[38,47,58],"sense":[39],"assurance.":[41,143],"Assurance":[42],"is":[43,92,121],"understood":[44],"be":[46,151,218],"part":[48,161],"corporate":[50],"provides":[53],"stakeholders":[54],"confidence":[56],"subject":[59,66,98],"matter":[60],"by":[61,173],"evaluating":[62],"evidence":[63,158],"about":[64,197],"that":[65,72,80,85,200,215],"matter.":[67,99],"Evidence":[68],"will":[69],"include":[70],"proof":[71],"controls":[74],"structures":[76],"place,":[79],"risks":[81],"managed":[83],"compliance":[86],"internal":[88],"external":[90],"requirements":[91],"demonstrated":[93],"regard":[95],"Decisions":[100],"regarding":[101],"use":[103],"organizations":[108,225],"bring":[109],"these":[110,216],"responsibilities":[111],"fore.":[114],"Design/methodology/approach":[115],"design":[117],"this":[119,148],"based":[122],"extensive":[125],"review":[126],"literature,":[128],"predominantly":[129],"best":[130],"practices":[131],"standards,":[133],"fields":[136],"covering":[137],"governance,":[139],"Findings":[144],"results":[146],"can":[150],"used":[152,219],"formulate":[154],"statements,":[159],"as":[160,190],"mandates.":[165],"Originality/value":[166],"add":[171],"value":[172],"highlighting":[174],"responsibility":[176],"managers":[178],"ensure":[180],"when":[182],"exploiting":[183],"opportunities":[184],"presented":[185],"through":[186],"advances,":[188],"such":[189],"computing;":[192],"serving":[193],"inform":[195],"advances":[199],"have":[201],"being":[204],"made":[205],"field":[208],"guidelines;":[212],"motivating":[214],"guidelines":[217],"for":[220],"behalf":[223],"adopting":[226],"using":[228],"computing.":[230]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
