Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa
Abstract
:1. Introduction
- RQ1: What security evaluation tools do SMEs use when selecting Cloud BI and other cloud services?
- RQ2: What challenges do SMEs face when using existing security evaluation tools?
- RQ3: What security evaluation best practice do SMEs consider when evaluating Cloud BI for adoption?
- RQ4: What can be the main components of a security evaluation framework for Cloud BI applications suitable for SMEs in small towns?
2. South African Economic Sectors
3. Security Evaluation Initiatives for Cloud BI Applications
4. Methods
4.1. Population
4.2. Sampling
4.3. Questionnaire Design, Validity, and Reliability
4.4. Data Collection
5. Results
5.1. Demographic Information
5.2. Security Evaluation Tools Used by SMEs in Selecting Cloud BI
5.3. Challenges Faced by SMEs When Using Traditional Security Evaluation Tools
5.4. Use of Existing Best Practices by SMEs When Selecting Cloud BI Applications
5.4.1. Alignment of Data Management Processes and Security with Business Needs
5.4.2. Assessing Cloud Models’ Security Vulnerabilities, Threats and Risks
5.4.3. Assessing Security, Trust and Reliability of CSPs
5.4.4. Assessing the Potential Financial Risks of Using Cloud BI
5.5. Components of the Conceptual Framework, Checklists and Validation
5.5.1. Components of the Conceptual Framework
5.5.2. Checklists for Use with the Framework
5.5.3. Framework and Checklist Validation
6. Discussion of Findings
6.1. RQ1: What Security Evaluation Tools Do SMEs Use When Selecting Cloud BI and Other Cloud Services?
6.2. RQ2: What Challenges Do SMEs Face When Using Existing Security Evaluation Tools?
6.3. RQ3: What Security Evaluation Best Practice Do SMEs Consider When Evaluating Cloud BI for Adoption?
6.4. RQ4: What Can Be the Main Components of a Security Evaluation Framework for Cloud BI Applications Suitable for SMEs in Small Towns?
6.4.1. Aligning Business and Data Security Needs
6.4.2. Assessing Cloud BI Operational and Security Functionality
6.4.3. Assessing Cloud Deployment Models’ Vulnerabilities, Threats, and Risks
6.4.4. Assessing Security, Trust and Reliability of CSPs
6.4.5. Assessing the Potential Financial Risks of Using Cloud BI
6.4.6. Checklists for Use in the Evaluation of Cloud BI Applications
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Mashandudze, E.; Dwolatzky, B. Major Challenges Impeding the Fast Adoption of Cloud Computing: A Case Study of South African Organisations and Emerging Economics. Open J. Mob. Comput. Cloud Comput. 2015, 2, 1–18. [Google Scholar]
- Mohlameane, M.; Ruxwana, N. Exploring the impact of cloud computing on existing South African regulatory frameworks. S. Afr. J. Inf. Manag. 2020, 22, 1–9. [Google Scholar] [CrossRef]
- Osman, A.I.; Musah, A. Small and Medium Enterprises in the Cloud in Developing Countries: A Synthesis of the Literature and Future Research Directions. J. Manag. Sustain. 2015, 5, 115–139. [Google Scholar]
- Turner, G. How Technology is Reshaping South Africa’s Small Business Economy. 2018. Available online: https://www.xero.com/content/dam/xero/pdf/southafrica-tech-adoption-report.pdf (accessed on 15 November 2020).
- Olszak, C. Business Intelligence in Cloud. Pol. J. Manag. Stud. 2014, 10, 116–127. [Google Scholar]
- Widyastuti, D.; Irwansyah, I. Benefits and Challenges of Cloud Computing Technology Adoption in Small and Medium Enterprises (SMEs). Adv. Econ. Bus. Manag. Res. 2018, 41, 241–246. [Google Scholar]
- Patil, S.S.; Chavan, R. Cloud Business Intelligence: An Empirical study. Stud. Indian Place Names UGC Care J. 2020, 27, 747–754. [Google Scholar]
- Thompson, W.J.; van der Walt, J.S. Business intelligence in the cloud. S. Afr. J. Inf. Manag. 2010, 12, 13–17. [Google Scholar] [CrossRef]
- Elmalah, K.; Nasr, M. Cloud Business Intelligence. Int. J. Adv. Netw. Appl. 2019, 10, 4120–4124. [Google Scholar] [CrossRef]
- Kalidas, S.; Magwentshu, N.; Rajagopaul, A. How South African SMEs Can Survive and Thrive Post-COVID-19. 2020. Available online: https://www.mckinsey.com/featured-insights/middle-east-and-africa/how-south-african-smes-can-survive-and-thrive-post-covid-19#.11 (accessed on 10 December 2020).
- SME South Africa. An Assessment of South Africa’s SME Landscape: Challenges, Opportunities, Risks and Next Steps. 2019. Available online: https://www.smallbusinessinstitute.co.za/wp-content/uploads/2019/12/AssessmentOfSAsSMELandscape.pdf (accessed on 21 July 2020).
- Small Enterprise Development Agency. Small, Medium and Micro Enterprises: Quarterly Update-3rd Quarter 2019. 2020. Available online: http://www.seda.org.za/Publications/Publications/SMMEQuarterly2019-Q3.pdf (accessed on 20 January 2021).
- Akinola, K.E.; Odumosu, A.A. Threat Handling and Security Issue in Cloud Computing. Int. J. Sci. Eng. Res. 2015, 6, 1371–1385. [Google Scholar]
- Salim, A.; Li, M.; He, Q.; Shen, J. Cloud computing services adoption in Australian SMEs: A firm-level investigation. In Proceedings of the Pacific Asia Conference on Information Systems, Chiayi, Taiwan, 27 June–1 July 2016; pp. 1–11. [Google Scholar]
- Thompson, A. South Africans Are Turning Their Offline Businesses into Online Ones in the Face of Covid-19 Closures. 2020. Available online: https://www.mendeley.com/catalogue/253605fb-2268-38b2-947b-53571cd307e8/?utm_source=desktop&utm_medium=1.19.6&utm_campaign=open_catalog&userDocumentId=%7Bafabe5a4-d112-4acf-b37f-8429a95db8fc%7D (accessed on 20 December 2020).
- Papachristodoulou, E.; Koutsaki, M.; Kirkos, E. Business intelligence and SMEs: Bridging the gap. J. Intell. Stud. Bus. 2017, 7, 70–78. [Google Scholar] [CrossRef] [Green Version]
- Gupta, A.; Kaur, K. Vulnerability assessment and penetration testing. Int. J. Eng. Trends Technol. 2013, 4, 328–333. [Google Scholar]
- Mirai Security Inc. Security Frameworks for Small Enterprise. 2019. Available online: https://www.miraisecurity.com/blog/security-frameworks-for-small-enterprise (accessed on 3 August 2020).
- Boonsiritomachai, W.; McGrath, M.; Burgess, S. A research framework for the adoption of Business Intelligence by Small and Medium-Sized enterprises. In Proceedings of the 27th Annual SEAANZ Proceedings for Small Enterprise Association of Australia and New Zealand Conference, Sydney, Australia, 16–18 July 2014; pp. 16–28. [Google Scholar]
- Export Enterprises SA. The Economic Context of South Africa. 2020. Available online: https://www.nordeatrade.com/fi/explore-new-market/south-africa/economical-context (accessed on 21 January 2021).
- STATS SA. Economic Sectors that Contribute to South Africa’s GDP: Q3 2017. 2017. Available online: http://www.statssa.gov.za/?p=10775#:~:text=Thelargestcontributortogrowth,percentagepointtoGDPgrowth.%0A (accessed on 15 December 2020).
- Geldenhuys, J. Internet Access: Survey Reveals South African Connectivity Statistics. 2019. Available online: https://www.moonstone.co.za/internet-access-survey-reveals-south-african-connectivity-statistics (accessed on 15 December 2020).
- International Trade Administration. South Africa—Country Commercial Guide: Information Technology. 2020. Available online: https://www.trade.gov/knowledge-product/south-africa-information-technology (accessed on 17 December 2020).
- STATS SA. General Household Survey 2017. 2018. Available online: https://www.statssa.gov.za/publications/P0318/P03182017.pdf (accessed on 23 January 2020).
- Modimogale, L.; Kroeze, J.H. Using ICTs to Become a Competitive SME in South Africa. In Proceedings of the 13th International Business Information Management Association Conference (13th IBIMA), Marrakech, Morocco, 9–10 November 2009; pp. 504–513. [Google Scholar]
- Hislop, R. Ideas for Solving Rural South African Internet Connection. 2018. Available online: https://www.ee.co.za/article/ideas-for-solving-rural-south-african-internet-connection.html (accessed on 21 January 2021).
- STATS SA. Category Archives: Economic Growth; Pretoria, South Africa. 2020. Available online: http://www.statssa.gov.za/?cat=30 (accessed on 21 January 2020).
- Chou, T. Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. Inf. Technol. 2013, 5, 79–88. [Google Scholar] [CrossRef]
- Ramachandran, M.; Chang, V. Towards performance evaluation of cloud service providers for cloud data security. Int. J. Inf. Manag. 2016, 36, 618–625. [Google Scholar] [CrossRef]
- Serrano, J.; Heymann, E.; Cesar, E.; Miller, B.P. Vulnerability assessment enhancement for middleware for computing and informatics. Comput. Inform. 2012, 31, 103–118. [Google Scholar]
- Rajan, A.; Erturk, E. Web Vulnerability Scanners: A Case Study. Eastern Institute of Technology, Hawke’s Bay. 2017. Available online: https://arxiv.org/ftp/arxiv/papers/1706/1706.08017.pdf (accessed on 7 July 2020).
- Kupsch, J.A.; Miller, B.P.; Heymann, E.; Cesar, E. First Principles Vulnerability Assessment. In Proceedings of the 2010 ACM Workshop on Cloud Computing security, the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 8 October 2010; Association for Computing Machinery: New York, NY, USA, 2010; pp. 87–92. [Google Scholar]
- Ahmed, M.; Hossain, M.A. Cloud Computing and Security Issues in the Cloud. Int. J. Netw. Secur. Appl. 2014, 6, 25–36. [Google Scholar] [CrossRef]
- Cloud Security Alliance. Cloud Computing Top Threats in 2016: Treacherous 1. 2017. Available online: http://oemhub.bitdefender.com/top-threats-to-securing-the-cloud (accessed on 23 June 2020).
- Llave, M. Business Intelligence and Analytics in Small and Medium-Sized Enterprises: A Systematic Literature Review. Procedia Comput. Sci. 2017, 121, 194–205. [Google Scholar] [CrossRef]
- Indriasari, E.; Prabowo, H.; Meyliana, K.; Hidayanto, A.N. Key Benefits of Cloud Business Intelligence: A Systematic Literature Review. Int. J. Mech. Eng. Technol. 2018, 9, 819–831. [Google Scholar]
- Rupra, S.S.; Karie, N.; Rabah, K. A Framework for Assessing Security in a SaaS Cloud Paradigm for SMEs. Mara Int. J. Sci. Res. Publ. 2019, 1, 1–14. [Google Scholar]
- Ukil, A.; Jana, D.; De Sarkar, A. A Security Framework in Cloud Computing Infrastructure. Int. J. Netw. Secur. Appl. 2013, 5, 11–24. [Google Scholar] [CrossRef]
- Tot, L.; Marta, T. Introducing the information security management system in Cloud Computing Environment. Acta Polytech. Hung. 2015, 12, 147–166. [Google Scholar]
- Pantić, Z.; Babar, M.A. Guidelines for Building a Private Cloud Infrastructure. 2019. Available online: http://nexgsd.org/wp-content/uploads/2012/05/Guidelines-to-BuildingPrivateCloud-Infrastructure-Technical-Report.pdf (accessed on 18 April 2020).
- Kumar, S.; Padmapriya, S. A Survey on Cloud Computing Security Threats and Vulnerabilities. Int. J. Innov. Res. Electr. Electron. Instrum. Control Eng. 2014, 2, 622–625. [Google Scholar]
- Khan, N.; Al-Yasiri, A. Framework for cloud computing adoption: A roadmap for SMEs to cloud migration. Int. J. Cloud Comput. Serv. Archit. 2015, 5, 258–269. [Google Scholar] [CrossRef]
- Calumpang, J.C.; Dilan, R.E. Evaluation Framework on System Security Requirements for Government-Owned Agencies in the Philippines. Int. J. Inf. Educ. Technol. 2016, 6, 398–403. [Google Scholar] [CrossRef] [Green Version]
- Rostek, K.; Wisniewski, M.; Kucharska, A. Cloud Business Intelligence for SMEs Consortium. Found. Manag. 2012, 4, 105–122. [Google Scholar] [CrossRef] [Green Version]
- European Union Agency for Network and Information Security. Security Framework for Governmental Clouds. 2015. Available online: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/governmental-cloud-security/security-framework-for-govenmental-clouds (accessed on 21 August 2020).
- Sadoughi, F.; Ali, O.; Erfannia, L. Evaluating the factors that influence cloud technology adoption: A comparative case analysis of health and non-health sectors: A systematic review. Health Inform. J. 2019, 33, 1–29. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Johnson, T.P. Snowball Sampling. In Encyclopedia of Biostatistics; Wiley & Sons, Ltd.: New Jersey, NJ, USA, 2005; pp. 12–1441. [Google Scholar]
- Wright, K. Researching Internet-Based Populations: Advantages and Disadvantages of Online Survey Research, Online Questionnaire Authoring Software Packages, and Web Survey Services. J. Comput. Commun. 2005, 10, 230–249. [Google Scholar] [CrossRef]
- Krippendorff, K. Content Analysis. An Introduction to Its Methodology, 3rd ed.; Sage Publications: Thousands & Oaks, CA, USA, 2013. [Google Scholar]
- Taber, K. The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education. Res. Sci. Educ. 2018, 2018, 1273–1296. [Google Scholar] [CrossRef]
- Rykiel, E.J. Testing ecological models: The meaning of validation. Ecol. Model. 1996, 90, 229–244. [Google Scholar] [CrossRef]
- Crocker, L. Content Validity. In International Encyclopedia of the Social & Behavioral Sciences; Elsevier Ltd.: Amsterdam, The Netherlands, 2015; pp. 774–777. [Google Scholar]
- Al Nadab, Z. A Validation Framework for an Online English Language Exit Test: A Case Study Using Moodle as an Assessment Management System. Master’s Thesis, The University of Queensland, Brisbane, Australia, 2017. [Google Scholar]
- Yusoff, M.S.B. ABC of Content Validation and Content Validity Index Calculation. Educ. Med. J. 2019, 11, 49–54. [Google Scholar] [CrossRef]
- Müller, K.; Roodt, G. Content validation: The forgotten step-child or a crucial step in assessment centre validation? S. Afr. J. Ind. Psychol. 2013, 39, 12–29. [Google Scholar] [CrossRef] [Green Version]
- Vohradsky, D. Feature Cloud Risk: 10 Principles and a Framework for Assessment. ISACA J. 2012, 5, 1–11. [Google Scholar]
- European Union Agency for Network and Information Security. Guidelines for SMEs on the Security of Personal Data Processing. 2016. Available online: www.enisa.europa.eu (accessed on 23 October 2020).
- Perkins, J. Information Security Policy. 2016. Available online: https://www2.gov.bc.ca/assets/gov/british-columbians-our-governments/services-policies-for-government/policies-procedures/information-security-policy/isp.pdf (accessed on 26 October 2017).
- Gleeson, N.C.; Walden, I. It’s a jungle out there? Cloud computing, standards and the law. Eur. J. Law Technol. 2014, 5, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Salim, S.; Sedera, D.; Sawang, S.; Alarifi, A.; Atapattu, M. Moving from Evaluation to Trial: How do SMEs start adopting Cloud ERP? Australas. J. Inf. Syst. 2015, 2015, S219–S254. [Google Scholar] [CrossRef]
- Carcary, M.; Doherty, E.; Conway, G. The Adoption of Cloud Computing by Irish SMEs—An Exploratory Study. Electron. J. Inf. Syst. Eval. 2014, 17, 3–14. [Google Scholar]
- Hussein, N.H.; Khalid, A. A Survey of Cloud Computing Security Challenges and Solutions. Int. J. Comput. Sci. Inf. Secur. 2016, 14, 52–56. [Google Scholar]
- Information Security Forum. Standard of Good Practice for Information Security. 2016. Available online: https://www.securityforum.org/uploads/2016/07/SoGP-2016-Exec-Summary-FINAL-260716.pdf (accessed on 26 June 2020).
- Osorio-Gallego, C.A.; Londono-Metaute, J.H.; Lopez-Zapata, E. Analysis of factors that influence the ICT adoption by SMEs in Colombia. Intang. Cap. 2016, 12, 666–732. [Google Scholar] [CrossRef] [Green Version]
- Chang, V.; Kuob, Y.; Ramachandrana, M. Cloud Computing Adoption Framework: A Security Framework for Business Clouds. Futur. Gener. Comput. Syst. 2015, 57, 24–41. [Google Scholar] [CrossRef] [Green Version]
- Choi, M.; Lee, C. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations. Sustainability 2015, 7, 12032–12051. [Google Scholar] [CrossRef] [Green Version]
- Durg, K.; Podder, S. Navigating the Interoperability Challenge in Multi-Cloud Environments. 2020. Available online: https://www.accenture.com/us-en/blogs/cloud-computing/kishore-durg-cloud-interoperability-challenges (accessed on 29 August 2020).
- European Network and Information Security Agency. Cloud Computing—Benefits, Risks and Recommendations for Information Security. Computing 2012, 72, 1–50. [Google Scholar]
- Youssef, A.; Alageel, M. A Framework for Secure Cloud Computing. Int. J. Comput. Sci. 2012, 9, 487–500. [Google Scholar]
- Cloud Industry Forum. 8 Criteria to Ensure You Select the Right Cloud Service Provider. 2019. Available online: https://www.cloudindustryforum.org/content/8-criteria-ensure-you-select-right-cloud-service-provider (accessed on 23 September 2020).
- Heiser, J. How to Evaluate Cloud Service Provider Security. 2019. Available online: https://www.gartner.com/en/doc/3833968-how-to-evaluate-cloud-service-provider-security (accessed on 5 December 2019).
- Opara-Martins, J.; Sahandi, R.; Tian, T. Critical analysis of vendor lock-in and its impact on cloud computing migration: A business perspective. J. Cloud Comput. Adv. Syst. Appl. 2016, 5, 1–18. [Google Scholar] [CrossRef] [Green Version]
- Tofan, D.C. Information Security Standards. J. Mob. Embed. Distrib. Syst. 2011, 3, 128–135. [Google Scholar]
- Vacca, J.R. Security in the Private Cloud, 1st ed.; Taylor and Francis Group, LLC: Denver, CO, USA, 2017. [Google Scholar]
- Shimamoto, C.D. How to Evaluate Cloud Security? 2015. Available online: https://www.techsoup.org/support/articles-and-how-tos/how-to-evaluate-cloud-security (accessed on 20 August 2020).
- National Computing Centre Group. The Hidden Cost of Cloud Failure. 2018. Available online: https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/the-hidden-cost-of-cloud-failure/ (accessed on 16 July 2020).
- Ereth, J.; Dahl, D. Business intelligence in the cloud: Fundamentals for a service-based evaluation concept. Innov. Bus. Intell. Forsch. 2013, 1049, 1–20. [Google Scholar]
- Hooda, A. Business intelligence over the Cloud. Int. J. Manag. 2014, 5, 90–100. [Google Scholar]
- Tamer, C.; Kiley, M.; Ashrafi, N.; Kuilboer, J.P. Risks and Benefits of Business Intelligence in the Cloud. In Proceedings of the Northeast Decision Sciences Institute Annual Meeting, New York, NY, USA, 5–7 April 2013; Volume 86, pp. 3–10. [Google Scholar]
Province | Estimated of SMEs | % |
---|---|---|
Gauteng | 277,917 | 35.3 |
KwaZulu-Natal | 154,311 | 19.6 |
Western Cape | 124,393 | 15.8 |
Mpumalanga | 61,409 | 7.8 |
Limpopo | 48,025 | 6.1 |
Eastern Cape | 41,727 | 5.3 |
North West | 36,216 | 4.6 |
Free State | 33,854 | 4.3 |
Northern Cape | 9448 | 1.2 |
Total | 787,300 | 100 |
SME Type | Frequency | % |
---|---|---|
Car sales | 12 | 21.1 |
Wholesales | 12 | 21.1 |
Motor spares | 9 | 15.8 |
Accommodation | 8 | 14 |
Car rentals | 6 | 10.5 |
Finance | 6 | 10.5 |
Internet services | 4 | 7 |
Total | 57 | 100 |
Ratings (n = 57) | |||
---|---|---|---|
Challenges in Using Evaluation Tools | Agree % | Not Sure (%) | Disagree (%) |
Human factors | |||
I do not know any tools used to evaluate IT systems | 73.4 | 2.1 | 24.5 |
I have limited IT skills to use existing evaluation tools | 84.2 | 3.5 | 12.3 |
I cannot choose a tool from several existing ones | 88.3 | 1.1 | 10.6 |
I am unable to customise tools to suit enterprise needs | 75.4 | 3.5 | 21.1 |
I am not confident in using evaluation tools | 90.8 | 2.5 | 6.7 |
I cannot get proper assistance from IT specialists | 85.2 | 3.5 | 11.3 |
Technological factors | |||
Evaluation tools are too big and complex for me to use | 82.8 | 5.1 | 12.1 |
Tools do not address the problems faced by SMEs in selecting IT apps | 68.4 | 7.1 | 24.5 |
I find evaluation tools user-friendly | 10.2 | 2.3 | 87.5 |
I cannot customise existing security tools to meet business needs | 77.5 | 2.3 | 20.2 |
Time factor | |||
I take a lot of time to understand evaluation tools | 85.9 | 3.5 | 10.6 |
Existing tools require a lot of my time and effort to use | 74.8 | 4.3 | 20.9 |
I take a lot of time to find a relevant evaluation tool from the web | 69.9 | 18.8 | 11.3 |
Ratings (n = 57) | ||||
---|---|---|---|---|
Best Practice Security Evaluation Statements | Most Likely % | More Likely % | Less Likely % | Not Likely % |
Alignment of data management processes and security to business needs | ||||
Identifying sensitive data to be migrated and managed in the cloud | 54.4 | 45.6 | 0 | 0 |
Identifying enterprise data and application security needs | 35.1 | 57.8 | 7.1 | 0 |
Deciding security requirements of data to be migrated | 36.8 | 59.6 | 3.6 | 0 |
Assessing Cloud BI operational and security functionalities | ||||
Assessing the integration of Cloud BI applications with existing enterprise information system | 73.7 | 24.5 | 1.8 | 0 |
Checking the usability of the application by standard users | 66.7 | 31.5 | 1.8 | 0 |
Assessing access control and authentication features | 61.4 | 35 | 3.6 | 0 |
Identifying Cloud BI data management functionalities | 64.9 | 33.3 | 1.8 | 0 |
Evaluating the effectiveness of security controls in each Cloud BI application | 45.6 | 50.8 | 3.6 | 0 |
Identifying security vulnerabilities, threats and risks | 45.6 | 49.1 | 5.3 | 0 |
Assessing Cloud deployment models security vulnerabilities, threats, and risks | ||||
Assessing data portability and cloud interoperability | 80.7 | 19.3 | 0 | 0 |
Assessing data accessibility publicly by unauthorised cloud users | 68.5 | 31.5 | 0 | 0 |
Verifying security breaches by CSP employees and other cloud tenants | 66.6 | 22.8 | 10.6 | 0 |
Assessing security, trust and reliability of Cloud service providers | ||||
Assessing service reliability and performance of CSPs | 84.3 | 15.7 | 0 | 0 |
Checking security responsibilities of enterprises and CSPs | 72.8 | 28.2 | 0 | 0 |
Assessing security reliability of CSPs | 78.9 | 19.3 | 1.8 | 0 |
Scrutinising the terms and conditions of contracts and service level agreements (SLAs) | 68.3 | 28.1 | 3.6 | 0 |
Requesting reports on service downtime and unavailability to users | 57.8 | 36.9 | 5.3 | 0 |
Assessing CSP’s adherence to certification and standards | 56.1 | 42.2 | 1.7 | 0 |
Assessing CSP’s data security and governance | 54.4 | 43.8 | 1.8 | 0 |
Confirming the level of control of data in the cloud of the enterprise | 42.2 | 54.2 | 2.5 | 1.1 |
Scrutinising the business standing of CSP history | 28.1 | 56.3 | 10.4 | 5.2 |
Assessing the physical security of the CSPS | 24.6 | 40.3 | 22.8 | 12.3 |
Assessing potential financial risks of using Cloud BI applications | ||||
Identify loss of revenue due to downtime of the cloud service | 85.9 | 14.1 | 0 | 0 |
Assessing the cost of subscribing to Cloud BI applications | 82.5 | 12.2 | 5.3 | 0 |
Assessing litigation costs by customers after exposure of sensitive data | 64.8 | 31.6 | 3.6 | 0 |
Assessing financial risks due to hidden subscription costs | 56.1 | 42.1 | 1.8 | 0 |
Assessing penalty cost for misuse of service | 22.8 | 61.5 | 12.2 | 3.5 |
SME Respondents (n = 57) | IT Security Specialist (n = 35) | |||
---|---|---|---|---|
Proposed Component of the Framework | Yes | No | Yes | No |
Aligning data management processes and security with business needs | 80.7 | 19.3 | 94.2 | 5.8 |
Cloud BI operational and security functionalities assessment | 84.2 | 15.8 | 91.4 | 8.6 |
Cloud deployment security vulnerabilities, threats and risk assessment | 77.2 | 22.8 | 82.9 | 17.1 |
Security, trust and reliability assessment of CSPs | 89.5 | 10.5 | 97.1 | 2.9 |
Financial risks of using Cloud BI applications assessment | 82.5 | 17.5 | 85.7 | 14.3 |
Component of the Security Framework | The overall Relevance of the Framework | |
---|---|---|
Pearson Correlation | Sig. (2-Tailed) | |
Aligning data management processes and security with business needs | 0.735 ** | 0.000 |
Cloud BI operational and security functionalities assessment | 0.407 ** | 0.004 |
Cloud deployment security vulnerabilities, threats and risk assessment | 0.782 ** | 0.000 |
Security, trust and reliability assessment of CSP | 0.671 ** | 0.002 |
Financial risks of using Cloud BI applications assessment | 0.674 ** | 0.002 |
The relevance of framework in addressing traditional security standards and frameworks during the evaluation | 0.509 ** | 0.020 |
The relevance of checklist criteria in addressing the evaluation of key issues in Cloud BI adoption | 0.601 | 0.021 |
Evaluation summary sheet | 0.642 | 0.011 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Moyo, M.; Loock, M. Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa. Information 2021, 12, 128. https://doi.org/10.3390/info12030128
Moyo M, Loock M. Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa. Information. 2021; 12(3):128. https://doi.org/10.3390/info12030128
Chicago/Turabian StyleMoyo, Moses, and Marianne Loock. 2021. "Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa" Information 12, no. 3: 128. https://doi.org/10.3390/info12030128
APA StyleMoyo, M., & Loock, M. (2021). Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa. Information, 12(3), 128. https://doi.org/10.3390/info12030128