Perceived Security and Privacy of Cloud Computing Applications Used in Educational Ecosystem

被引:0
|
作者
Orehovacki, Tihomir [1 ]
Etinger, Darko [1 ]
Babic, Snjezana [2 ]
机构
[1] Juraj Dobrila Univ Pula, Dept Informat & Commun Technol, Pula, Croatia
[2] Polytech Rijeka, Dept Business, Rijeka, Croatia
关键词
ISSUES; PERCEPTIONS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When employed in educational settings, cloud computing applications enable users to create, store, organize, and share divergent artefacts with their peers. As an outcome, they have a large number of users worldwide which makes them vulnerable to a variety of security and privacy related threats. With an aim to examine the extent of the perceived security and privacy in the context of cloud computing applications that are most commonly used for educational purposes, an empirical study was carried out. Participants in the study were students from two Croatian higher education institutions. Data was gathered by means of the post-use questionnaire. Study findings uncovered pros and cons of examined cloud computing applications with respect to the manner they are addressing security and privacy concerns of their users.
引用
收藏
页码:717 / 722
页数:6
相关论文
共 50 条
  • [31] Security and Privacy Challenges in Cloud Computing Environments
    Takabi, Hassan
    Joshi, James B. D.
    Ahn, Gail-Joon
    IEEE SECURITY & PRIVACY, 2010, 8 (06) : 24 - 31
  • [32] Challenges on Privacy and Reliability in Cloud Computing Security
    Tse, Daniel W. K.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1180 - 1186
  • [33] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [34] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [35] Review of Security and Privacy Techniques in Cloud Computing Environment
    Mote, Rutuja
    Pawar, Ambika
    Dani, Ajay
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 543 - 551
  • [36] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [37] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [38] Editorial of special issue on security and privacy in cloud computing
    Hao, Feng
    Yi, Xun
    Bertino, Elisa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 27-28 : 1 - +
  • [39] A Security Model for the Enhancement of Data Privacy in Cloud Computing
    Sharma, Yoshita
    Gupta, Himanshu
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 898 - 902
  • [40] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160