Negotiating Cloud Security Requirements with Vendors

Daniel S. Soper

California State University,

Fullerton, California


19.1  Introduction

19.2  Structure-centric negotiation

19.3  Strategy-centric negotiation

19.4  Process-centric negotiation

19.5  Behavior-centric negotiation

19.6  Bad-faith negotiation

19.7  Integrative negotiation

19.8  Summary



Organizations of all kinds are increasingly adopting cloud-based services to meet their information technology needs. In the wake of many very visible and embarrassing information security breaches, organizations are also increasingly aware of security-related issues with respect to their information assets. The simultaneous rise of these two phenomena ...

Get Cloud Computing Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.