[
Al-Anzi, F.S., Yadav, S.K., & Soni, J. (2014, September). Cloud computing: Security model comprising governance, risk management and compliance. International Conference on Data Mining and Intelligent Computing (ICDMIC), 1-6, IEEE.
]Search in Google Scholar
[
Bickley, S.J., & Torgler, B. (2021). A systematic approach to public health – Novel application of the human factors analysis and classification system to public health and COVID-19. Safety Science, Vol. 140, 105312.
]Search in Google Scholar
[
Brandao, P.R. (2019). Cloud computing security. IJCST, Vol. 10, Issue 1.
]Search in Google Scholar
[
Cloud Security Alliance (CSA). (2017). Security guidance: For critical areas of focus in cloud computing v4.0. Available at: https://cloudsecurityalliance.org/guidance/#_overview
]Search in Google Scholar
[
Cohen, T.N., Wiegmann, D.A., & Shappell, S.A. (2015). Evaluating the reliability of the human factors analysis and classification system. Aerospace Medicine and Human Performance, Vol. 86, Issue 8, 728-735, available at: https://doi.org/10.3357/AMHP.4218.2015
]Search in Google Scholar
[
Coker, J. (2020, July 23). Cloud misconfiguration a major compliance risk, say IT decision-makers. Available at: https://www.infosecurity-magazine.com/news/cloud-misconfigurations-compliance/
]Search in Google Scholar
[
dos Santos, V.A., Manacero, A., Lobato, R.S., Spolon, R., & Cavenaghi, M.A. (2020, June). A systematic review of fault tolerance solutions for communication errors in open source cloud computing. 15th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-6). IEEE.
]Search in Google Scholar
[
Express Computer. (2020, April 9). Misconfiguration is the number one risk to cloud environments, finds Trend Micro Research. Express Computer. Available at: https://advance-lexis-com.ezproxy1.lib.asu.edu/api/document?collection=news&id=urn:contentItem:5YMD-MMR1-JB5M-W3YX-00000-00&context=1516831.
]Search in Google Scholar
[
Forrest, C. (2018, April 4). Human error led to 424 % increase in misconfigured cloud servers, prompting hacks. Available at: https://www.techrepublic.com/article/human-error-led-to-424-increase-in-misconfigured-cloud-servers-prompting-hacks/
]Search in Google Scholar
[
Gohary, M.M., Hussin, C., & Razak, A. (2013). Human factors’ impact leveraging cloud-based applications adoption. Journal of Information Systems Research and Innovation (JISRI), Vol. 5, 87-97.
]Search in Google Scholar
[
Hale, A., Walker, D., Walters, N., & Bolt, H. (2012). Developing the understanding of underlying causes of construction fatal accidents. Safety Science, Vol. 50, Issue 1, 2020-2027.
]Search in Google Scholar
[
Jangjou, M., & Sohrabi, M.K. (2022). A Comprehensive Survey on Security Challenges in different network layers in cloud computing. Archives of Computational Methods in Engineering, 1-22.
]Search in Google Scholar
[
Kalluri, R.K., & Rao, C.G. (2014). Addressing the security, privacy and trust challenges of cloud computing. International Journal of Computer Science and Information Technologies, Vol. 5, Issue 5, 6094-6609.
]Search in Google Scholar
[
Linthicum, D. (2018). Cloud misconfiguration: The security threat too often overlooked. Available at: http://login.ezproxy1.lib.asu.edu/login?url=https://www-proquest-com.ezproxy1.lib.asu.edu/trade-journals/cloud-misconfiguration-security-threat-toooften/docview/2116530107/se-2?accountid=4485
]Search in Google Scholar
[
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (Special Publication 800-145). Gaithersburg MD: National Institute of Standards and Technology.
]Search in Google Scholar
[
Paganini, P. (2021, April 28). Cloud misconfiguration, a major risk for cloud security. Available at: https://securityaffairs.co/wordpress/117305/security/cloud-misconfiguration-risks.html
]Search in Google Scholar
[
Rapid 7 Research. (2021, September). 2021 Cloud Misconfigurations Report. Available at: https://www.rapid7.com/info/2021-cloud-misconfigurations-research-report/
]Search in Google Scholar
[
Reinach, S., & Viale, A. (2006). Application of a human error framework to conduct train accident/incident investigations. Accident Analysis & Prevention, Vol. 38, Issue 2, 396-406.
]Search in Google Scholar
[
Rundle, J. (2019, August 27). Human error often the culprit in cloud data breaches. Available at: https://www.wsj.com/articles/human-error-often-the-culprit-in-cloud-data-breaches-11566898203
]Search in Google Scholar
[
Shappell, S.A., & Wiegmann, D.A. (2000). The Human Factors Analysis and Classification System – HFACS. Available at: https://commons.erau.edu/publication/737
]Search in Google Scholar
[
Simmon, E. (2018). Evaluation of cloud computing services based on NIST SP 800-145. NIST Special Publication, Vol. 500, 322.
]Search in Google Scholar
[
Stella, J. (2021). How to secure cloud infrastructure across the development lifecycle. Available at: http://login.ezproxy1.lib.asu.edu/login?url=https://www-proquest-com.ezproxy1.lib.asu.edu/trade-journals/how-secure-cloud-infrastructure-across/docview/2577216022/se-2?accountid=4485
]Search in Google Scholar
[
Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing, Vol. 76, Issue 12, 9493-9532.
]Search in Google Scholar
[
Tang, N., Hu, H., Xu, F., Yeoh, J.K.W., Chua, D.K.H., & Hu, Z. (2022). A personalized Human Factors Analysis and Classification System (HFACS) for construction safety management based on context-aware technology. Enterprise Information Systems, Vol. 16, Issue 1, 141-166.
]Search in Google Scholar