...Is Green IT Threat to Security Dissertation Supervisor name: Student name : Student number: Intake: Contents 1 Introduction 4 1.2 purposes of study 6 1.3 Problem Gartner research on Green 6 1.4 Background and Motivation 7 1.5 Audience 8 1.6 Outcome of Study 8 2 Introduction 10 2.1 Green IT 10 2.2 Why IT Need to be Green 12 2.3 Benefits of Green IT 13 2.4 Companies Interest in Green IT 14 2.5 Green IT and Information Assurance and Security 14 2.6 Information Assurance and Security 15 2.7 Green IT from Information Assurance viewpoint 16 2.8 Dimension of Green IT 18 2.9 Green IT Initiatives 19 3 Introduction 21 3.1 Research design 21 3.2 Justification of paradigm and methodology 22 3.3 Data Collection Methods 23 3.3.1 Questionnaires 23 3.3.2 Interview 24 3.4 Data Analysis and Interpretation 25 3.5 Ethical Considerations 25 3.6 Chapter Summary 26 4 Introduction 27 4.1 Presentation and Analysis of data 28 4.1.1 Quantitative data analysis 29 4.1.2 Demographic Questions: 29 4.2 Technical question 32 4.2.1 Quantitative analysis 46 4.3 Quantitative analysis 46 4.4 Chapter summary: 47 4.5 Recommendation and suggestions 48 5 Introduction 49 5.1 Security assurance in cloud computing 50 5.1.1 Confidentiality 51 5.1.2 Correctness Assurance 51 5.1.3 Availability 51 5.1.4 Data Integrity 52 5.2 Security guideline 52 5.2.1 Cloud Service Provider Agent (CSPA)...
Words: 12275 - Pages: 50