IT Risk Management: Analyzing Aztek Bank's Cloud Computing Case Study

Verified

Added on  2020/03/16

|20
|5821
|53
Case Study
AI Summary
This case study examines Aztek Bank, a Melbourne-based financial institution, and its approach to IT risk management, particularly concerning its adoption of outsourced cloud computing. The study delves into the bank's strategic initiatives, including the transfer of critical business applications and data to external cloud systems. It outlines the IT security risk factors, challenges, and the impact on current security measures. A detailed risk analysis is presented, identifying threats, vulnerabilities, and infrastructural frameworks. Data security, risk assessment methodologies, and insurance considerations are also discussed. The study further explores regulatory measures, best practices, and the development of a new IT plan to mitigate potential risks. The case study highlights the importance of risk management in the financial sector, emphasizing the need for proactive strategies to address operational, financial, and reputational risks. The conclusion underscores the significance of comprehensive risk management frameworks for ensuring the success and stability of financial institutions like Aztek Bank in a rapidly evolving technological landscape.
Document Page
TRANSLATING IT RISK MANAGEMENT
Case Study
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
1.0 Executive Summary.........................................................................................................................3
2.0 Project Review.................................................................................................................................4
2.1 Outsourcing Cloud Computing....................................................................................................5
2.2 Transfer of IT Applications.........................................................................................................5
2.3 Definition of Risk........................................................................................................................5
2. 4 Regulatory measures and Best practice.......................................................................................7
3.0 Project Impact on Current Security..................................................................................................7
3.1 Current plans...............................................................................................................................7
3.2 IT Security Risk Factors..............................................................................................................8
3.3 The New Plan..............................................................................................................................8
3.4 Challenges...................................................................................................................................9
4.0 Risk Analysis.................................................................................................................................11
4.1 The Risks, Vulnerabilities and Threats..........................................................................................12
Threats.........................................................................................................................................12
Vulnerabilities.............................................................................................................................12
Risks............................................................................................................................................13
4.2 Infrastructural Framework.........................................................................................................13
5.0 Data Security.................................................................................................................................14
5.1 Assessing IT Risks.....................................................................................................................14
5.2 Insurance...................................................................................................................................16
5.3. Risk rating guide.......................................................................................................................16
6.0 Conclusion.....................................................................................................................................16
References...........................................................................................................................................17
Document Page
1.0 Executive Summary
Aztek is a banking institution situated in Melbourne Australia. Survival in the service
industry calls for a wide range of services including financial management, credit facilities,
savings, alternative investments, mortgages and loans. At the centre of its success is the IT
system, which affects all its functions and operations. The financial services encounter
numerous risks and exposure to unexpected events. In order to manage such challenges, the
banking institution safeguards from operation and financial related risks among others.
Aztecs IT management system protects different sectors and departments. The use of
innovation improves processes across the departments. It prevents losses, unexpected
occurrences and effects from the global markets. As part of strategic management, IT
contributes to the success of Aztek banks. The global market is highly volatile because of
changes in the industry and financial crisis. Cloud computing continues to transform
businesses today. Aztek’s adoption of an outsourced cloud system has benefits as well as
challenges. The risks involved place the company’s data system at a high risk. This report
narrows down its analysis on cloud computing and recommendations the management of
risks through project based approaches.
Designed to support its IT decisions, this Aztek Risk Management plan covers the operations,
financial, reputation, compliance and strategic risks factors (Aebi, Sabato, & Schmid, 2012).
Aztek is a reputable Australian bank charged with providing financial services. The company
has senior executives within its business and technology segments to manage the risks. In a
teamwork spirit, the Aztek divisions have in place a portfolio of projects from different
strategists scheduled for funding. The portfolio comprises of the following projects:
1) Employees use of mobile devices in the workplace for major tasks
2) Transfer of critical business applications and their connected data sources to an
externally managed Cloud hosting system
3) Outsourcing of crucial IT functions including network systems, desktop management
and application development for third party users
4) Upgrading and introduction of a major platform for technology applications including
mobile and migration for a better networking technology (e.g. IPv6).
Document Page
2.0 Project Review
The second project is of great interest because it involves the transfer of important
applications and linked data sources from an outsourced cloud system. This happens within a
short time and accommodates for large scale computing. Cloud computing is a platform for
sharing and accessing IT applications from an external party. Strategic IT outsourcing
maximizes on the potential and overcomes the risks (Ravi & Ramachandran, 2011)
Figure 1: Governance Risk Management & Compliance (GRC) model showing actors and
stages (Melville, 2016)
Suitable for global organizations this project considers technology risk challenges such as
future skill deficit. Banking operations at Aztek need servers, storage and databases
management systems for numerous internet applications. Outsourcing saves on costs because
Aztek only pays for services and software applications that it can accesses and use. However,
compliance to business terms is necessary.
Aligning Azteks’ project plan with its mission and values is important. It is also critical to
ensure that the resources are available for the project. Aztek has an objective of implementing
continuous improvement practices in its operations and functions. By setting aside resources
for this plan, the company is able to avert current and future risks. A good plan guides the
company in the adoption of risk management strategies such as insurance. It also encourages
compliance by the business company’s teams. The implementation of risk management
encourages the fulfilment of business goals because it scrutinizes all areas of Aztek.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2.1 Outsourcing Cloud Computing
Economies of scale in cloud computing advocate for reduced costs for IT systems as an
operational risk management tactic. Risks present liabilities and high cost of management
(Benlian & Hess, 2011). Making wrong decisions about the IT capacity needs for Aztek
contributes to the risk factors. Websites operating on common applications like ecommerce
are at a high risk of manipulation from cybercriminals. An effective transfer of IT
app1.lications requires a reliable and safe infrastructure system. The company needs updated
cloud solutions for its mobile devices, webservers, and data storage or recovery. These must
be free from fraud. Making company websites accessible to multilevel, multidimensional and
group systems requires effective models within the legal framework. The development,
configuration and administration of applications in the global environment include privacy.
2.2 Transfer of IT Applications
Samandari, Havas, & Harle ( 2016) identify future risks in the banking industry to identify
technological disruptions among the issues of focus. Although innovation provides solutions
to banks and services, it presents fresh challenges every day. Aztek deals with metadata and
technology helps in portfolio management, detecting inconsistencies and making projections.
Accuracy in the banking sector is a necessity and automated machines such as the ATM and
mobile banking cannot afford to make mistakes. IT applications lower the risks giving the
bank a competitive advantage. Of concern are privacy issues, data protection and error free
business modelling.
2.3 Definition of Risk
E-commerce is a platform for business engagements using the internet (Chiu, Wang, Fang, &
Huang, 2014). Cloud computing used in the financial sector include the website links and
knowledge management systems. These allow for third party access hence security and
training concerns emerge. The use of cloud computing in banking services is questionable
because of the banking business model. Banks are financial companies but they also stand out
as well as high-risk businesses.
Document Page
Figure 2: Risk Management Strategy development for Aztek
A risk in this case is the unexpected occurrence, which may hinder the successful
implementation of objective 2 of the planned portfolio. The foreseen danger may occur in any
form hence there is no certain definition of its magnitude or specific. The planning process
involves a cycle process of taking actions against the challenges and evaluating the controls.
This is a flow showing the mission, strategy, goals and goals of Aztek as a company and its
IT plans. Stakeholders play a key role in defining the process.
Figure 3: Aztek Stakeholders
2. 4 Regulatory measures and Best practice
Licensed under the Australian Banking Act, the financial regulations affect its operations
(Hooper, Martini, & Choo, 2013). Aztek also designs risks with consideration for the finance
Define the risk
Perform risk assessment planWrite a plan
Risk assessment team
IT department focusAssemble team
Execute plan
Determine the risk factorsRisk generation
Categories of the risksRationaize the list
Prioritize and rank
Write response plan
Review the process ( monitoring and controls)
Aztek
Stakeholders
Investors
Customers
Suppliers
Employees
Document Page
industry laws for credit facilities, labour laws, customer relations and banking services apply.
The harmonization is under the:
ï‚· Good governance and conduct
ï‚· Privacy and personal data protection
ï‚· Business regulations and operations
ï‚· E-commerce global regulations
3.0 Project Impact on Current Security
Aztek strategic risks cover wide areas including corporate banking, which accommodates for
its plans to venture into business alliances. Top on its plan is institutional compliance in
which the Bank fulfils its responsibilities of implementing, managing and providing financial
security (Rittinghouse & Ransome, 2016). The IT outsourcing plan expounds on its agenda of
providing reliable information to the stakeholders. Awareness creation and the
implementation of risk control is important for both internal and external stakeholders. The
bank has in place a system of risk management for its internal operations but it needs an
elaborate framework for an external IT related plan.
3.1 Current plans
Azteks Risk management plan comprises of an overall organizational design as well as the
departmental breakdown. The framework covers financial risks, governance, credit,
developmental, strategic and operational risk levels. This plan derives its motivation from the
global threats faced by the financial industry. Top on its list is the liquidity risk followed by
technology and organized crime (PWC, 2017). The Australian banking service is an industry,
which revolves around the consumer. Efficiency is an important factor in its value chain.
Innovation also has a major role in organizations and is a best practice for the banking
industry. Aztek as a company has a risk management team whose responsibility features:
ï‚· A risk framework for Aztek and the financial industry
ï‚· Development of a risk strategy and treatment plan
ï‚· Oversight of the risk management agenda
ï‚· Monitoring and ensuring compliance of the plan
ï‚· Coordinating risk management activities across the business
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ï‚· Carrying out internal audits for new risk framework
3.2 IT Security Risk Factors
IT Security Policies and Procedures at the company also have structures laid out 3 years ago.
Its focus was initially on risk assessment but industry trends indicate the importance of risk
management. Its agenda was to address gaps in the infrastructure and they include three
levels namely, the infrastructural, software application and development (Zissis & Lekkas,
2012). Cloud computing is an advanced technology that falls under this docket. As a software
model, it comes with a structure and model that is distinct and critical to Aztek IT systems. It
comprises of the change in technology featuring systems designed for the banking services.
This change comes from demands in the global sector.
The complexity of technology systems and applications calls for risk management by
leveraging the company installations with global expectations. Risk assessment leads to
strategic approaches to combat and deal with the impending and potential risks. Supply chain
risks are inevitable and corporate governance regulations allow the bank to undertake these
risk analysis and implementation. The drivers of value creation in risk management is the
stakeholder who comprises of large and small companies (Upper, 2011). Risk assessment
considers:
ï‚· Possible situations that could happen
ï‚· Process of his could occur
ï‚· What impact it could have on the system
ï‚· Solution to this problem
3.3 The New Plan
In the new plan, risk management considers the risk assessment factors as well as crisis
management using a modern approach (Bessis, 2011). It incorporates liquidity risk
management and the use of technology services and products. The growth of the online
business brings fresh risks for the financial IT systems because consumers now have to make
most of their transactions using credit cards. Online transaction risks include credit risks,
market challenges, operational and liquidity challenges. The contemporary system has
Document Page
configurations and computer applications to address these issues. Risk management planning
highlights the possible risk avenues in order to describe concrete solutions.
Outsourcing IT is a major factor affecting Azteks financials and business performance. Its
outsourcing framework is an interesting business model that involves a third party service
provider. Cloud computing is a new approach to collective operations. IT comprise of an
innovative structure that involves a third party supplier. This means the introduction of a new
security plan for Aztek communication and information systems plan. It starts with the
identification of its security threats and quality business processes. This brings in the IT and
Information Systems configuration.
3.4 Challenges
Advanced technology challenges keep advancing over time. This needs strategy
improvements to tackle its complex nature. The introduction of collective computing systems
provides opportunities and challenges. The new business model targets deeper connectivity
and quality management (Bessis, 2011). Reputable banks prepare for uncertainties across
through risk management services and products. Online credit risks include the protection of
customer’s personal data and unauthorized access to credit card data.
a) Value Creation
Reputational risks include loss of respect in public image or consumer trust. This happens
when the stakeholders question the capability of Aztek to carry out its financial services
effectively. Reports about the bank or its customers losing data gives a negative image on the
company. It gives a negative impression of the brand and customers lose confidence in the
company. The company needs a system for detecting crime and credit underwriting. Having
an early warning application gives it an edge over the competitions. In the IT financial
industry, having insight on the potential risks for outsourcing services is important (Low,
Chen, & Wu, 2011).
b) Operational risks
The introduction of an external cloud process brings new changes such as the introduction of
new people, systems and procedures. Change Management arrests the impending risks arising
from human and computer generated risks. The computing systems could relay incorrect data
Document Page
or it could leak information to criminals. Data management solves this problem by providing
security installations, making changes on personal data safety, permits or licenses. It checks
the facilities, capital, space, emergency, and the operational environment.
c) Liquidity risk
The reduction of losses is important for the business because it upholds the company’s assets
and customers. Liquidity risks include daily loses in cash transactions. Security installations
in mobile banking is an effort to reduce these risks. Globally secure mobile and internet
banking is a problem. Aztek needs concrete plans for this.
d) Credit risks
This covers the largest risk factor for banks in the global system. Customer’s access services
through cloud systems and installation applications. Its dangers come from loans, foreign
exchange, swiping, equities, trade financing and forex. The modern consumers uses the credit
card services for online shopping and payments. Banks face threats from unsuccessful
transactions arising from failed processes. The introduction of mobile banking services on
mobile devices is due to customer demands, and market changes. Other risks in credit loans
include credit delays, the loss of funds due to credit transactions, calculations, exchange rates
and exchange value settlement different.
e) Market risks
Economic recession and financial trends determine the pricing, interest rates, forex rates and
fines. Placed on consumers by the bank it brings about fluctuations in currency, commodity
and equity. The contemporary consumer prefers low interest costs and banks, which have
long-term strategies against their competition. Business risks include national, regional and
global management issues. There are risks arising from systematic risks, which affect the
economy of the bank. The external environment such as cloud computing shapes the trend in
the market systems. It comprise of perceived risks such as failed investor risks (Fahlenbrach
& Stiultz, 2011).
f) Compliance
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contracts address issues such as leases and sponsorship for the projects. In a global
organization such as Aztek, the Australian regulations and statutory laws apply
(Governement, 2015). These involve employees and the community as well as company
installations. Engaging in a business model with an external service provider has challenges
among them is the challenge of breach of contract. The Codes of conduct ensure compliance
to the rules. Clients need a clear understanding of the terms and penalties, loss of revenue
purchasing practices, and litigation challenges.
4.0 Risk Analysis
The success of this project depend on effective management approaches including an analysis
of the potential risks. These require an effective management support system. An effective
plan looks at the risk factors in a project in order to measure their viability. The Aztek IT
Risk Assessment lead involve different stakeholders and technologists hence an effective
decision-making process is required. The Australian government incorporates cloud
computing among ICT arrangements as illustrated below (Kluwer & Delbaere, 2016). Risk
management identifies the potential risks, vulnerabilities and the risk control processes.
When developing competitive processes, the financial organizations must be aware of the
need for compliance with the legal framework affecting business continuity, cloud service
provider, and service location.
Figure 4: ICT plan for Risk management
Document Page
4.1 The Risks, Vulnerabilities and Threats
Cloud computing and IT installation of technology from external sources poses risks. The
project plans to make installations on laptops, pads, tablets and mobile phone devices. Each
of these devices face challenges and exposure to malware and other effects. The
incorporation of a corporate-wide email for archive systems need a compatible and compliant
design. Upgrading applications on desktop operating systems also needs IT Security Policies
and procedures. In order to understand the risks, it is crucial to understand vulnerabilities,
threats and risks (Grobauer, Walloschek, & Stocker, 2011). This clarification provides a
guide on the types of risks involved in the process.
Threats
This is a potential cause of alarm for an organization. It includes system interference.
Different agents of these threats include criminals, bank fraudsters and organized criminals.
Aztek needs a plan that foresees this as a future challenge for the organization. The legal
framework admonishes the financial service provider from compromising client assets. In
order to prevent this failure, and combat theft, the plan makes provision for better security
software and the training of its employees with codes of conduct for risk aversion (Cappelli,
Moore, & Trzeciak, 2012). Employees can also become threats if they are not aware of the
risks. Competitors often use employees to steal crucial information and company data. The
company needs protection from hacking systems and unauthorised access. In some regions,
access by government and terror groups (Martini & Choo, 2012). Contemporary criminals
have the capacity to fabricate identity for unauthorised entries.
Vulnerabilities
Defined as weaknesses characterising a system, the vulnerabilities expose the system to
threats. An example is weak passwords, insecure online banking and constant cyber-attacks.
Data security requires privacy protection as one of the major safety measures (Chen & Zhao,
2012). This service delivery approach is crucial for cloud computing which involves different
IT experts and networking systems. Public clouding is vulnerable to software bugs and
information leaks. Broken financial processes also expose the system to such threats. This
calls for changes in hardware and software installations. Aztek needs effective measures such
as backup systems and prevention of human errors. As part of its customer service, the brand
Document Page
needs to inform its customers about the value of having stronger passwords and protecting
personal computer devices. Aztek might consider using top security OS such as Apple
devices.
Risks
Consequences or potential losses or damages leading to the destruction of Azteks assets. This
is a result of a vulnerable system or applications such as password access. Cybercrime is one
of the major problems facing business organizations today. Cyberstalking and profit-oriented
criminals exist in cloud systems. Aztek as a group needs to invest in software applications
and systems, which prevent such disruptions. Failure to do so exposes the company to threats
of money losses, compromised privacy, loss of confidence and legal suites. As a best
practice, the company invests in quality systems that enhance its reputation as a safe financial
service provider (Gonzalez, et al., 2012). Data damages such as service interruptions and
network unavailability is another risk. In such a case, the company needs to make changes
such as upgrading the systems of modification.
Practical law for IT in the finance industry includes outsourcing issues (Wang, Wang, Cao, &
Lou, 2012). These regulations provides guidelines for procedure such as hiring global
consultants, purchasing software applications for the office functions and integration of Aztek
services with other businesses. A merger between Aztek and a technology company needs
clear business terms. The international, local and national environments have adoption and
integration. The two companies forming the merger operate within a contract policy that
determines payment for technology services or software application. Risk management
tackles any issues of conflict that may arise. It shapes an effective framework that includes
policy changes and regulations from the industry and the two companies.
4.2 Infrastructural Framework
Poor Management of legal arrangements poses threats to the company image and workforce.
Exposing employee data, Aztek facilities and commercial processes makes the organization
vulnerable for attacks. A crisis arises when hackers access the company website and share the
information to competitors. Research indicates that Australian banks are among the most
vulnerable globally (Bavas, 2015). The findings by Kaspersky Lab a cyber-security firm
indicated the advancement of criminal networks, which monitor banks and employees to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
fleece the company of millions through customer account. Aztek has the private cloud system
for its employees across different branches and it has software installations for different
services accessed by the consumers. Other stakeholders such as partners also have portals.
A reliable infrastructural network that is free from third party access hinders interference
from hackers, and malware. Compliance with legal terms helps customers to download
applications from reputable company sites. It thus prevents the risks by controlling damage.
In case of a breach, or IT systems exposure to fraud, the company also needs a crisis
management plan. This includes reorganization of the system and infrastructural networks.
Risk management mechanisms have consideration for components such as events, changes in
technology, target profile, negative public perception and software manipulation. A
comprehensive solution has provisions for Abuse from legitimate users, illegal or rogue users
and software vulnerabilities. Sometimes additional installations pose a threat hence Aztek
needs an authentic database and Denial of Service (DoS) installations (Zargar, Joshi, &
Tipper, 2013).
5.0 Data Security
Cloud computing service models comprise of infrastructural systems (IaaS), Platform as a
Service (PaaS) and Software as a Service (SaaS) (Subashini & Kavitha, 2011). Security
installation at all these levels is necessary. Mitigating the risks calls for strengthening the IT
systems in order to prevent stolen passwords. This includes security installations in
multimedia applications for downloads and uploads. Regular hardware and software
maintenance must be in place. This includes checks against any communication
vulnerabilities that may arise. Employees and other human vulnerabilities also need to be in
check.
5.1 Assessing IT Risks
Assessing the IT systems for risk in business terms is critical because it highlights the
quantitative and qualitative risk management approaches. This comparison identifies the
external factors, internal manipulations and system errors. The quantitative analysis points
out the incremental attacks and interference from other channels. It takes note of network
weaving and frequency in authorization attacks. It facilitates for the identification of
information vulnerabilities arising from IT capacity and software disruption as well as scripts.
Document Page
The quantities risk quantifies objectives, decisions and achievable metrics such as costs and
schedules or targets for system installations and upgrades (Shaikh & Karjaluoto, 2015). This
gives a higher quality analysis with data variations for a better risk analysis. It gives
projections for the projects timelines too.
Figure 5: Types of cloud computing threats (Lekkas & Zissis, 2012)
Qualitative analysis looks at the business trends and management challenges. It recommends
weaknesses in business processes and inadequate controls for effective change management.
This form of risk assessment, which facilitates for the classification of risks. It also indicates
the relationship between causes of IT insecurities for Aztek and its cloud systems effects.
This helps to identify the pros and cons of the broad network access used in the project,
which advocates for the use of mobile phones and tablets (Benlian & Hess, 2011).
Although the quantitative analysis provides for a deeper understanding, it takes time and it
may not explain the probability. It is important to have a practical description of the threats
for an understanding of the impact and extent of the risk exposure. Therefore, both methods
are effectively used together. The qualitative analysis checks for performance metrics in
order to bring out the occurrence of the threats. The distribution of the risks helps
stakeholders in the industry to make the necessary changes such as system upgrades. Aztek
depends on the quantitative risk factors for mathematical simulations but it needs to combine
the risks for effective application across the projects. Cloud computing and installation of
external software involves a complex IT project that needs software and system applications
(Aleksandro, Fedorovich, & Victorovna, 2016).
Document Page
5.2 Insurance
As IT risks continue to advance, companies adopt smart tactics such as risk insurance
because technology is expensive. Managing risks calls for limitations or risk transfers. Based
on the fact that risks are inevitable in clouding and technology installations, this approach
examines the company profiles to create a plan for acceptable and unacceptable risks.
Business risk liability can bring down a multinational company hence liability insurance
includes IT for data protection and recovery. This is a cover plan for uncertainties (Corner,
2013). It caters for data migration, risk mitigation and insecurities faced by businesses today.
The availability of a wide variety of insurance plans includes personal devices such as
laptops, pads, and PDA. Such networks are prone to attacks from malware and the financial
industry is at the highest risk. In Australia the law is unclear about the external storage of data
hence most companies are sceptical about cloud computing insurance. General liability caters
for risks in business activities including data damages and losses (Jain & Shanbhang, 2012).
5.3. Risk rating guide
Insurance risk rating compares the losses and the compensation. In IT insurance, there are
provisions for short-term and long-term coverages for systems protection. The ratings
addresses security breaches, down time and effects that this may have on users (Cloud Insure,
2014). In this case, it protects customers from server complications and inconveniences. This
is a business strategy for Aztek as well as its IT cloud service provider. Forming partnerships
in the acquisition of insurance is one way to overcome these liability challenges.
6.0 Conclusion
Aztek is a financial service in the contemporary system where technology is part of
management practices. Innovation improves functions and operations in a financial business.
As a best practice, industry players invest in it for successful implementation. This report
analyses cloud computing and software installations as a major project underway for Aztek. It
brings out the importance of risk management and some of its challenges.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Aebi, V., Sabato, G., & Schmid, M. (2012). Risk management, corporate governance and
bank perfomance in the financiak crisis. Journal of Banking & Finance, 36(12), 3213-
3226.
Aleksandro, M. e., Fedorovich, N. A., & Victorovna, P. (2016). Potential of the internet
network in formation of the assortment of the trade organizations. European Science
review, 1-2.
Bavas, J. (2015, February 17). Australian banks fall victims to multinational hacking attack:
cyber security firm. ABC. Retrieved from
http://www.abc.net.au/news/2015-02-17/banks-victim-of-multi-national-hacking-
attack-security-firm-says/6130370
Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a service: Findings
from a survey of IT executives. Decision Support Systems , 232-246.
Bessis, J. (2011). Risk management in banking. John Wiley & Sons.
Cappelli, D. M., Moore, A. P., & Trzeciak, R. F. (2012). The CERT guide to insider threats:
how to prevent, detect, and respond to infomration technology crimes ( Theft,
Sabotage, Fraud). Addison-Wesley.
Document Page
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing.
Computer Science and Electronics engineering ( ICCSEE) (pp. 647-651). IEEE.
Chiu, C. M., Wang, E. T., Fang, Y. H., & Huang, H. Y. (2014). Understanding customers
repeat purchase intentions in B2C e-commmerce: the roles of utilitarian value,
hedonic value and percieved risk. Information Systems Journal, 24(1), 85-114.
Cloud Insure. (2014, May 16). Insurance Program Design and Management for clouds. Cloud
insure. Retrieved October 2, 2017, from http://cloudinsure.com/news/news/30
Corner, S. (2013, July 13). Insurerers laging on cloud cover. The Sydney morning Herald.
Retrieved October 2, 2017, from http://www.smh.com.au/it-pro/cloud/insurers-
lagging-on-cloud-cover-20130708-hv0qa.html
Fahlenbrach, R., & Stiultz, R. M. (2011). Bank CEO incentives and the credit Bank CEO
incentices and credit crisis. Journal of Financial Economics, 99(1), 11-26.
Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., carvalho, T., Naslund, M., & Pourzandi,
M. (2012). A quantitative analysis of current security concerns and solutions for cloud
computing. Journal of Cloud Computing: Advances, Systems, and Applications, 1(1),
11.
Governement, A. (2015, August). Information security mangement guidelines: Risk
management of outsourced ICT arrangements ( Including Cloud). Retrieved from
Protective security:
https://www.protectivesecurity.gov.au/informationsecurity/Documents/
AustralianGovernmentInformationSecurityManagementGuidelines.pdf
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing
vulnerabilities. IEEE Security & Privacy, 9(2), 50-57.
Hooper, C., Martini, B., & Choo, K. K. (2013). Cloud computing and its implications for
cybercrime investigations in Australia. Computer Law & Security Review, 29(2), 152-
163.
Jain, A. K., & Shanbhang, D. (2012). Addressing security and privacy risks in mobile
appllications. IT Professional, 14(5), 28-33.
Kluwer, W., & Delbaere, W. (2016, October 13). MAS's outsourcing risk management
guidelines: Bringing compliance closer to the cloud. Retrieved from Wolkers
Document Page
Kluwerfs: http://www.wolterskluwerfs.com/onesumx/commentary/MAS-outsourcing-
risk-management-guidelines.aspx
Lekkas, D., & Zissis, D. (2012). Adressing cloud computing security systems. Future
Geerations Computer Systems, 583-592.
Low, C., Chen, Y., & Wu. (2011). Understanding the determinants of cloud computing
adoption. Industrial Management and Data Systems, 111(7), 1006-1023.
Martini, B., & Choo, K. K. (2012). An integrated conceptula digital forensic framework for
cloud computing. Digital Investigation, 71-80.
Melville, J. (2016, October 11). The value of an integrated GRC environment. Retrieved from
LinkedIn: https://www.linkedin.com/pulse/value-integrated-grc-environment-james-
melville-fcca
PWC. (2017). Escaping the Commondity Trap: The future of banking in Australia. Retrieved
from Pwc: https://www.pwc.com.au/pdf/pwc-report-future-of-banking-in-australia.pdf
Ravi, K. J., & Ramachandran, N. (2011). Factors influencing the outsourcing in the banking
sector in India. Strategic Outsourcing: An International Journal, 4(3), 294-322.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computiing implimentation,
management and security. CRC Press.
Samandari, H., Havas, A., & Harle, P. (2016, July). The future of bank risk management.
Retrieved from McKinsey & Company: https://www.mckinsey.com/business-
functions/risk/our-insights/the-future-of-bank-risk-management
Shaikh, A. A., & Karjaluoto, H. (2015). Mobile banking adoption: A literature review.
Telematics and Informatics, 32(1), 129-142.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models
of cloud computing. Journal of network and computer applications, 1-11.
Upper, C. (2011). Simulation mehods to methods to assess the danger of contagion in
interbank markets. Journal of Financial Stability, 7(3), 111-125.
Wang, C., Wang, Q. R., Cao, N., & Lou, W. (2012). Toward secure and dependable storage
services in cloud computing. IEEE transactions on Services Computing, 220-232.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Zargar, S., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed
denial of service ( DDoS) flooding attacks. IEEE communications survey & tutorials,
20(16), 20146-2069.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future
Generation Computer Systems, 28(3), 583-592.
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]