Enterprise Security

Why Do We Make It So Difficult?

Bob Duncan, Mark Whittington, Victor Chang

Research output: Contribution to conferencePaper

Abstract

Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.
Original languageEnglish
Pages1-6
Number of pages6
Publication statusPublished - 27 Oct 2016
Event33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference - Xi'an Jiaotong-Liverpool University (XJTLU), in the city of Suzhou, Suzhou, China
Duration: 27 Oct 201630 Oct 2016

Conference

Conference33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference
Abbreviated titleEAMSA 2016
CountryChina
CitySuzhou
Period27/10/1630/10/16

Fingerprint

Software engineering
Security of data
Ecosystems
Industry

Keywords

  • Cloud security and privacy
  • legacy software

Cite this

Duncan, B., Whittington, M., & Chang, V. (2016). Enterprise Security: Why Do We Make It So Difficult?. 1-6. Paper presented at 33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, Suzhou, China.

Enterprise Security : Why Do We Make It So Difficult? / Duncan, Bob; Whittington, Mark; Chang, Victor.

2016. 1-6 Paper presented at 33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, Suzhou, China.

Research output: Contribution to conferencePaper

Duncan, B, Whittington, M & Chang, V 2016, 'Enterprise Security: Why Do We Make It So Difficult?' Paper presented at 33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, Suzhou, China, 27/10/16 - 30/10/16, pp. 1-6.
Duncan B, Whittington M, Chang V. Enterprise Security: Why Do We Make It So Difficult?. 2016. Paper presented at 33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, Suzhou, China.
Duncan, Bob ; Whittington, Mark ; Chang, Victor. / Enterprise Security : Why Do We Make It So Difficult?. Paper presented at 33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, Suzhou, China.6 p.
@conference{63f6d695426d411d9e7f6dd03fd90b12,
title = "Enterprise Security: Why Do We Make It So Difficult?",
abstract = "Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.",
keywords = "Cloud security and privacy , legacy software",
author = "Bob Duncan and Mark Whittington and Victor Chang",
year = "2016",
month = "10",
day = "27",
language = "English",
pages = "1--6",
note = "33rd Euro-Asia Management Studies Association (EAMSA) Annual Conference, EAMSA 2016 ; Conference date: 27-10-2016 Through 30-10-2016",

}

TY - CONF

T1 - Enterprise Security

T2 - Why Do We Make It So Difficult?

AU - Duncan, Bob

AU - Whittington, Mark

AU - Chang, Victor

PY - 2016/10/27

Y1 - 2016/10/27

N2 - Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.

AB - Achieving information security and privacy is not a trivial exercise. This becomes much more challenging in the cloud, due to the multi-tenancy nature of cloud ecosystems. We are concerned that the traditional legacy compatible approach to software development is holding enterprises back from achieving effective security and privacy, particularly in the cloud. In this paper we discuss the implications of the traditional approach to software development and question why we stick to this approach, despite the fact that this approach makes the job of security and privacy far more difficult.

KW - Cloud security and privacy

KW - legacy software

M3 - Paper

SP - 1

EP - 6

ER -