Research Article
BibTex RIS Cite

Enterprise Risk Management and Cloud Computing System

Year 2022, Issue: 93, 31 - 52, 17.01.2022
https://doi.org/10.25095/mufad.1012896

Abstract

A Cloud computing system is a procurement model that enables a business or organization to procure
computing resources and applications from any location, via an internet connection. In addition, it also allows
business organizations to potentially increase and develop their business model capabilities and computing
resource demands. The aim of this study is to concisely present the risks and impact of cloud computing systems
on businesses by associating cloud computing systems with COSO's enterprise risk management principles. As a
result, it is foreseen that the cloud computing system will benefit businesses when used in parallel with the
COSO enterprise risk management framework, by specifying the enterprise risk management-focused cloud
computing system responsibilities of business managers, and it will help business managers to evaluate the risks
they may face in more detail and comprehensively by using the cloud computing system

References

  • Ali, M. - Khan, S.U. - Vasilakos, A. V. (2015), “Security in Cloud Computing: Opportunities and Challenges’, Information Sciences, 305(3), pp. 357-383.
  • Armbrust, M. - Fox, A. - Griffith, R. - Joseph, A. D. - Katz, R. - Konwinski, A. - Lee, G. - Patterson, D. - Rabkin, A. - Stoica, I. - Zaharia, M. (2010), “A View of Cloud Computing”, ACM Communications, 53, pp. 50–58.
  • Carlyle, A. G. - Harrell, S. L. - Smith, P. M. (2010), “Cost-effective HPC: The Community or The Cloud?”, Cloud Computing technology and science, IEEE Second International Conference, pp. 169-176.
  • Chang, V. - Kuo, Y. H. - Ramachandran, M. (2016), “Cloud Computing Adoption Framework: A Security Framework for Business Clouds”, Future Generation Computer Systems, 57(1), pp. 24-41.
  • Christodorescu, M. - Sailer, R. - Schales, D. L. – Sgandurra, D. – Zamboni, D. (2009), “Cloud Security is not (just) Virtualization Security: A Short Chapter”, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 97-102.
  • Coso, (2012), “Enterprise Risk Management for Cloud Computing”, Committee of Sponsoring Organizations of The Treadway Commission (COSO), New York.
  • Desender, K. A. (2007) “On The Determinants of Enterprise Risk Management Implementation”, SSRN Electronic Journal, pp. 1-26.
  • Feng, D. G. - Zhang, M. - Zhang, Y. (2011), “Study on Cloud Computing Security”, Journal of Software, 22(1), pp. 71-83.
  • Florio, C. - Leoni, G. (2017), “Enterprise Risk Management and Firm Performance: The Italian Case”, The British Accounting Review, 49(1), pp. 56-74.
  • Ghosh, A. (2013), “An Empirical Investigation into Enterprise Risk Management in India”, Working Paper Series, pp. 1-22.
  • Godson K. M. - Werner D. G. (2016), “Enterprise Risk Management: Factors Assocıated with Effective Implementation”, Risk Governance & Control: Financial Markets & Institutions, 6(4), pp. 1-32.
  • Grace, M. F. - Leverty J. T. - Phillips, R. D. - Shimpi, P. (2015), “The Value of Investing in Enterprise Risk Management”, The Journal of Risk and Insurence, 82(2), pp. 289-316.
  • Hoyt, R. E. – Liebenberg, A. P. (2011), “The Value of Enterprise Risk Management”, Journal of Risk and Insurance, 78(4), pp. 795-822.
  • Johnston, J. - Soileau, J. (2020), “Enterprise Risk Management and Accruals Estimation Error”, Journal of Contemporary Accounting & Economics, pp. 1-39.
  • Khan, A. - Yan, X. - Tao, S. - Anerousis, N. (2012), “Workload Characterization and Prediction in The Cloud: A Multiple Time Series Approach”, Network Operations and Management Symposium (NOMS), pp. 1287-1294.
  • Krutz, R. L. - Vines, R. D. (2010), Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Indianapolis: Wiley Publishing.
  • Malik, M. - Zaman, M. - Buckby, S. (2020), “Enterprise Risk Management and Firm Performance: Role of the Risk Committee”, Journal of Contemporary Accounting and Economics, 16, pp. 1-20.
  • Mansour, N. (2016), “Adaptive Data Replication Strategy in Cloud Computing for Performance Improvement”, Frontiers of Computer Science, 10(5), pp. 925-935.
  • Marsh, M. “Kurumsal Risk Yönetimi: Risk Yönetiminde Daha Stratejik Yaklaşım Arayışları”, Http://www.Marsh.Com.Tr/Documents/Press_Release_ERM.Pdf, (23/04/2021).
  • Mell, P. - Grance, T. “The NIST Definition of Cloud Computing”, http://csrc.nist.gov/publications/PubsSPs.html#800-145, (13.08.2021).
  • Mulia, W. D. - Sehgal, N. - Sohoni, S. - Acken, J. M. - Stanberry, C. L. - Fritz, D. J. (2013), “Cloud Workload Characterization”, IETE Technical Review, 30(5), pp. 382-397.
  • Oscar, R. - Daniel, M. - Eduardo, F. M. (2015), “Empirical Evaluation of A Cloud Computing Information Security Governance Framework”, Information and Software Technology, 58(2), pp. 44-57.
  • Özyiğit, Hüseyin (2021), Bağımsız Denetim Odaklı Kurumsal Risk Yönetimi Sisteminin Oluşturulması: İşletmelere Yönelik Model Önerisi, Gazi Kitabevi, Ankara.
  • PwC, (2004), “7th Annual Global CEO Survey Managing Risk: An Assessment of CEO Preparedness”, New York.
  • Ramgovind, S. - Eloff, M. M., - Smith, E. (2010), “The Management of Security in Cloud Computing”, Information Security for South Africa (ISSA), Sandton, South Africa, pp. 1-7.
  • Rasheed, H. (2014), “Data and Infrastructure Security Auditing in Cloud Computing Environments”, International Journal of Information Management, 34(3), pp. 364-368.
  • Ryan, M. D. (2013), “Cloud Computing Security: The Scientific Challenge, and A Survey of Solutions”, The Journal of Systems and Software, 86(9), pp. 2263–2268.
  • Sılva, J. - Sılva, A. - Chan, B. (2019), “Enterprise Risk Management and Firm Value: Evidence from Brazil”, Emerging Markets Finance & Trade, 55, pp. 687-703.
  • Shi Y. - Meng X. - Zhao J. - Hu X. - Liu B. - Wang H. (2010), “Benchmarking Cloud-Based Data Management Systems”, In: Proceedings of the 2nd International CIKM Workshop on Cloud Data Management, pp. 1-8.
  • Baxter, R. - Bedard, J. - Hoitash, R. - Yezegel, A. (2013), “Enterprise Risk Management Program Quality: Determinants, Value Relevance, and The Financial Crisis”, Contemporary Accounting Research, 30(4), pp. 1264–1295.
  • Xiang, Y. - Martino, B. D. - Wang, G. L. (2015), “Cloud Computing: Security, Privacy and Practice”, Future Generation Computer Systems, 52(11), pp. 59-60.
  • Yao, Z. Q. - Xiong, J. B. - Ma, J. F. (2013), “Access Control Requirements for Structured Document in Cloud Computing”, International Journal of Grid and Utility Computing, 4(2), pp. 95-102.
  • Yavuz, Selahattin - Özyiğit, Hüseyin (2018), “Kurumsal Risk Yönetimi ve Firma Performansı: Bankacılık Sektörüne Yönelik Bir Araştırma”, 1. Uluslararası Bankacılık Kongresi, ss. 769-778.
  • Zhu, X.D. - Li, H. - Li, F.H. (2013), “Privacy-Preserving Logistic Regression Outsourcing in Cloud Computing”, International Journal of Grid and Utility Computing, 4(2), pp. 144-150.
  • https://www2.deloitte.com/global/en.html (14.08.2021).

Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi

Year 2022, Issue: 93, 31 - 52, 17.01.2022
https://doi.org/10.25095/mufad.1012896

Abstract

Bulut bilişim sistemi; bir işletmenin veya kuruluşun bilgi işlem kaynaklarını ve uygulamalarını herhangi
bir konumdan, internet bağlantısı aracılığıyla temin etmesini sağlayan tedarik modelidir. Ayrıca, işletme
organizasyonlarının; iş modeli yeteneklerini ve bilgi işlem kaynağı taleplerini potansiyel olarak artırmalarına ve
geliştirmelerine olanak tanımaktadır. Bu çalışmanın amacı; bulut bilişim sistemini COSO’nun (Committee of
Sponsoring Organizations of the Treadway Commission) kurumsal risk yönetimi ilkeleriyle bağdaştırarak, bulut
bilişim sisteminin işletmeler üzerindeki risklerini ve etkisini özlü bir şekilde ortaya koymaktır. Sonuç olarak
işletme yöneticilerinin kurumsal risk yönetimi odaklı bulut bilişim sistemi sorumlulukları belirtilerek; bulut
bilişim sisteminin COSO kurumsal risk yönetimi çerçevesi paralelinde kullanıldığında işletmelere fayda
sağlayacağı ve işletme yöneticilerinin bulut bilişim sistemini kullanarak, karşılaşabilecekleri riskleri daha
detaylı ve kapsamlı değerlendirmelerine yardımcı olacağı öngörülmektedir

References

  • Ali, M. - Khan, S.U. - Vasilakos, A. V. (2015), “Security in Cloud Computing: Opportunities and Challenges’, Information Sciences, 305(3), pp. 357-383.
  • Armbrust, M. - Fox, A. - Griffith, R. - Joseph, A. D. - Katz, R. - Konwinski, A. - Lee, G. - Patterson, D. - Rabkin, A. - Stoica, I. - Zaharia, M. (2010), “A View of Cloud Computing”, ACM Communications, 53, pp. 50–58.
  • Carlyle, A. G. - Harrell, S. L. - Smith, P. M. (2010), “Cost-effective HPC: The Community or The Cloud?”, Cloud Computing technology and science, IEEE Second International Conference, pp. 169-176.
  • Chang, V. - Kuo, Y. H. - Ramachandran, M. (2016), “Cloud Computing Adoption Framework: A Security Framework for Business Clouds”, Future Generation Computer Systems, 57(1), pp. 24-41.
  • Christodorescu, M. - Sailer, R. - Schales, D. L. – Sgandurra, D. – Zamboni, D. (2009), “Cloud Security is not (just) Virtualization Security: A Short Chapter”, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 97-102.
  • Coso, (2012), “Enterprise Risk Management for Cloud Computing”, Committee of Sponsoring Organizations of The Treadway Commission (COSO), New York.
  • Desender, K. A. (2007) “On The Determinants of Enterprise Risk Management Implementation”, SSRN Electronic Journal, pp. 1-26.
  • Feng, D. G. - Zhang, M. - Zhang, Y. (2011), “Study on Cloud Computing Security”, Journal of Software, 22(1), pp. 71-83.
  • Florio, C. - Leoni, G. (2017), “Enterprise Risk Management and Firm Performance: The Italian Case”, The British Accounting Review, 49(1), pp. 56-74.
  • Ghosh, A. (2013), “An Empirical Investigation into Enterprise Risk Management in India”, Working Paper Series, pp. 1-22.
  • Godson K. M. - Werner D. G. (2016), “Enterprise Risk Management: Factors Assocıated with Effective Implementation”, Risk Governance & Control: Financial Markets & Institutions, 6(4), pp. 1-32.
  • Grace, M. F. - Leverty J. T. - Phillips, R. D. - Shimpi, P. (2015), “The Value of Investing in Enterprise Risk Management”, The Journal of Risk and Insurence, 82(2), pp. 289-316.
  • Hoyt, R. E. – Liebenberg, A. P. (2011), “The Value of Enterprise Risk Management”, Journal of Risk and Insurance, 78(4), pp. 795-822.
  • Johnston, J. - Soileau, J. (2020), “Enterprise Risk Management and Accruals Estimation Error”, Journal of Contemporary Accounting & Economics, pp. 1-39.
  • Khan, A. - Yan, X. - Tao, S. - Anerousis, N. (2012), “Workload Characterization and Prediction in The Cloud: A Multiple Time Series Approach”, Network Operations and Management Symposium (NOMS), pp. 1287-1294.
  • Krutz, R. L. - Vines, R. D. (2010), Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Indianapolis: Wiley Publishing.
  • Malik, M. - Zaman, M. - Buckby, S. (2020), “Enterprise Risk Management and Firm Performance: Role of the Risk Committee”, Journal of Contemporary Accounting and Economics, 16, pp. 1-20.
  • Mansour, N. (2016), “Adaptive Data Replication Strategy in Cloud Computing for Performance Improvement”, Frontiers of Computer Science, 10(5), pp. 925-935.
  • Marsh, M. “Kurumsal Risk Yönetimi: Risk Yönetiminde Daha Stratejik Yaklaşım Arayışları”, Http://www.Marsh.Com.Tr/Documents/Press_Release_ERM.Pdf, (23/04/2021).
  • Mell, P. - Grance, T. “The NIST Definition of Cloud Computing”, http://csrc.nist.gov/publications/PubsSPs.html#800-145, (13.08.2021).
  • Mulia, W. D. - Sehgal, N. - Sohoni, S. - Acken, J. M. - Stanberry, C. L. - Fritz, D. J. (2013), “Cloud Workload Characterization”, IETE Technical Review, 30(5), pp. 382-397.
  • Oscar, R. - Daniel, M. - Eduardo, F. M. (2015), “Empirical Evaluation of A Cloud Computing Information Security Governance Framework”, Information and Software Technology, 58(2), pp. 44-57.
  • Özyiğit, Hüseyin (2021), Bağımsız Denetim Odaklı Kurumsal Risk Yönetimi Sisteminin Oluşturulması: İşletmelere Yönelik Model Önerisi, Gazi Kitabevi, Ankara.
  • PwC, (2004), “7th Annual Global CEO Survey Managing Risk: An Assessment of CEO Preparedness”, New York.
  • Ramgovind, S. - Eloff, M. M., - Smith, E. (2010), “The Management of Security in Cloud Computing”, Information Security for South Africa (ISSA), Sandton, South Africa, pp. 1-7.
  • Rasheed, H. (2014), “Data and Infrastructure Security Auditing in Cloud Computing Environments”, International Journal of Information Management, 34(3), pp. 364-368.
  • Ryan, M. D. (2013), “Cloud Computing Security: The Scientific Challenge, and A Survey of Solutions”, The Journal of Systems and Software, 86(9), pp. 2263–2268.
  • Sılva, J. - Sılva, A. - Chan, B. (2019), “Enterprise Risk Management and Firm Value: Evidence from Brazil”, Emerging Markets Finance & Trade, 55, pp. 687-703.
  • Shi Y. - Meng X. - Zhao J. - Hu X. - Liu B. - Wang H. (2010), “Benchmarking Cloud-Based Data Management Systems”, In: Proceedings of the 2nd International CIKM Workshop on Cloud Data Management, pp. 1-8.
  • Baxter, R. - Bedard, J. - Hoitash, R. - Yezegel, A. (2013), “Enterprise Risk Management Program Quality: Determinants, Value Relevance, and The Financial Crisis”, Contemporary Accounting Research, 30(4), pp. 1264–1295.
  • Xiang, Y. - Martino, B. D. - Wang, G. L. (2015), “Cloud Computing: Security, Privacy and Practice”, Future Generation Computer Systems, 52(11), pp. 59-60.
  • Yao, Z. Q. - Xiong, J. B. - Ma, J. F. (2013), “Access Control Requirements for Structured Document in Cloud Computing”, International Journal of Grid and Utility Computing, 4(2), pp. 95-102.
  • Yavuz, Selahattin - Özyiğit, Hüseyin (2018), “Kurumsal Risk Yönetimi ve Firma Performansı: Bankacılık Sektörüne Yönelik Bir Araştırma”, 1. Uluslararası Bankacılık Kongresi, ss. 769-778.
  • Zhu, X.D. - Li, H. - Li, F.H. (2013), “Privacy-Preserving Logistic Regression Outsourcing in Cloud Computing”, International Journal of Grid and Utility Computing, 4(2), pp. 144-150.
  • https://www2.deloitte.com/global/en.html (14.08.2021).
There are 35 citations in total.

Details

Primary Language Turkish
Subjects Business Administration
Journal Section Articles
Authors

Hüseyin Özyiğit 0000-0002-0632-7931

Publication Date January 17, 2022
Submission Date October 21, 2021
Published in Issue Year 2022 Issue: 93

Cite

APA Özyiğit, H. (2022). Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi. Muhasebe Ve Finansman Dergisi(93), 31-52. https://doi.org/10.25095/mufad.1012896
AMA Özyiğit H. Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi. Muhasebe ve Finansman Dergisi. January 2022;(93):31-52. doi:10.25095/mufad.1012896
Chicago Özyiğit, Hüseyin. “Kurumsal Risk Yönetimi Ve Bulut Bilişim Sistemi”. Muhasebe Ve Finansman Dergisi, no. 93 (January 2022): 31-52. https://doi.org/10.25095/mufad.1012896.
EndNote Özyiğit H (January 1, 2022) Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi. Muhasebe ve Finansman Dergisi 93 31–52.
IEEE H. Özyiğit, “Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi”, Muhasebe ve Finansman Dergisi, no. 93, pp. 31–52, January 2022, doi: 10.25095/mufad.1012896.
ISNAD Özyiğit, Hüseyin. “Kurumsal Risk Yönetimi Ve Bulut Bilişim Sistemi”. Muhasebe ve Finansman Dergisi 93 (January 2022), 31-52. https://doi.org/10.25095/mufad.1012896.
JAMA Özyiğit H. Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi. Muhasebe ve Finansman Dergisi. 2022;:31–52.
MLA Özyiğit, Hüseyin. “Kurumsal Risk Yönetimi Ve Bulut Bilişim Sistemi”. Muhasebe Ve Finansman Dergisi, no. 93, 2022, pp. 31-52, doi:10.25095/mufad.1012896.
Vancouver Özyiğit H. Kurumsal Risk Yönetimi ve Bulut Bilişim Sistemi. Muhasebe ve Finansman Dergisi. 2022(93):31-52.