Toni Kusnandar


In recent years, Cloud Computing has evolved into a promising business concept as one of the segments of the industry's fastest growing of information technology. Many companies are increasingly aware that by leveraging the Cloud, they can gain quick access to the best business applications or drastically improve their infrastructure resources, with almost no additional cost. But as more and more individuals and corporate information stored in the Cloud, concerns began to grow about how safe the Cloud. Risk management to use SaaS selection decisions necessary so an organization can get the most of the advantages of cloud computing technologies. Risk analysis helps reduce uncertainty in decision making rational, and as long as there is uncertainty in decision making, risk evaluation will be an important component of the decision-making process. Reducing uncertainty can only be done by achieving and process more information on the initiative of the decision domain of risk analysis.


Keywords: Cloud Computing, Software as a Service.

Full Text:



Arora, Pankaj. (2010). Cloud Computing Security Issues inInfrastructure as a Service. International Journal of Advanced Research in Computer Science and Software Engineering.

Bernard, Leonel. (2011). A Risk Assessment Framework for Evaluating Software-as-a-Service (SaaS) Cloud Services BeforeAdoption. University of Maryland University.

Gilboa, I. (2009). Theory of decision under uncertainty (Vol. 1). Cambridge: Cambridge university press.

Hofstede, G. (1998). Attitudes, values and organizational culture: Disentangling the concepts. Organization studies, 19(3), 477-493.

Kitchenham, B. A., Pickard, L., Linkman, S., & Jones, P. (2005). A framework for evaluating a software bidding model. Information and Software Technology,47(11), 747-760.

Ncube, C., & Maiden, N. A. (1999, May). PORE: Procurement-oriented requirements engineering method for the component-based systems engineering development paradigm. In International Workshop on Component-Based Software Engineering (pp. 130-140).

Paul, Mano. (2010). CSSLP, CISSP, AMBCI, MCAD, MCSD, Network+, ECSA M., Security in the Skies - Cloud Computing Security Concerns, Threats, and Controls. ISC.

Saaty, T.L., (1980). The Analytic Hierarchy Process. McGraw-Hill, Inc.,


  • There are currently no refbacks.

Copyright (c) 2012 JURNAL COMPUTECH & BISNIS