User experience and security in the cloud: An empirical study in the finnish cloud consortium

Nilay Oza, Kaarina Karppinen, Reijo Savola

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    15 Citations (Scopus)

    Abstract

    This paper presents an empirical analysis of security and user experience issues in cloud computing. The study is based on the assumption that superior user experience and user-centric security are the two crucial issues that help to build an overall experience for the cloud service user. Qualitative research analysis is used to collect perspectives of eleven experts from Finnish Cloud Software Program Consortium. The perspectives of these experts are then analyzed qualitatively and a thematic analysis is presented. As a result a range of issues related to user experience and security are identified, leading to a perspective of marrying security and user experience.
    Original languageEnglish
    Title of host publicationProceedings
    Subtitle of host publication2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages621-628
    ISBN (Print)978-1-4244-9405-7, 978-0-7695-4302-4
    DOIs
    Publication statusPublished - 2010
    MoE publication typeA4 Article in a conference publication
    EventIEEE 2nd International Conference on Cloud Computing Technology and Science, CloudCom 2010 - Indianapolis, IN, United States
    Duration: 30 Nov 20103 Dec 2010

    Conference

    ConferenceIEEE 2nd International Conference on Cloud Computing Technology and Science, CloudCom 2010
    Abbreviated titleCloudCom 2010
    Country/TerritoryUnited States
    CityIndianapolis, IN
    Period30/11/103/12/10

    Keywords

    • Cloud computing
    • user experience
    • security

    Fingerprint

    Dive into the research topics of 'User experience and security in the cloud: An empirical study in the finnish cloud consortium'. Together they form a unique fingerprint.

    Cite this