REFERENCES
Al-Shargabi, B., Al-Jawarneh, S., and Hayajneh, S. (2020).
A cloudlet based security and trust model for e-
government web services. Journal of Theoretical and
Applied Information Technology, pages 27–37.
Antunes, M., Maximiano, M., and Gomes, R. (2022). A
Client-Centered Information Security and Cybersecu-
rity Auditing Framework. Applied Sciences.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz,
R. H., Konwinski, A., Lee, G., Patterson, D. A.,
Rabkin, A., Stoica, I., et al. (2009). Above the clouds:
A berkeley view of cloud computing.
BSI (2021). IT-Grundschutz-Compendium. Standard, Fed-
eral Office for Information Security, Bonn, DE.
Choodakowska, A., Ka
´
nduła, S., and Przybylska, J. (2022).
Cybersecurity in the Local Government Sector in
Poland: More Work Needs to be Done. Lex Localis.
Cidres, E., Vasconcelos, A., and Leit
˜
ao, F. (2020). Cloud
calculator: a cloud assessment tool for the public ad-
ministration. In Proc. of the 21st Annual International
Conference on Digital Government Research, pages
130–137.
Diener, M., Blessing, L., and Rappel, N. (2016). Tackling
the cloud adoption dilemma - A user centric concept
to control cloud migration processes by using machine
learning technologies. In Proc. of the 11th Int. Conf.
on Availability, Reliability and Security (ARES), pages
776–785. IEEE.
EU Commission (2022). The Digital Economy and Society
Index (DESI).
European Union (2018). Regulation (EU) 2018/1724 of the
European Parliament and of the Council of 2 October
2018 establishing a single digital gateway to provide
access to information, to procedures and to assistance
and problem-solving services and amending Regula-
tion (EU) No 1024/2012.
Feldman, R. (2013). Techniques and applications for sen-
timent analysis. Communications of the ACM, pages
82–89.
Gartner (2022). Umsatz mit Cloud Computing weltweit von
2010 bis 2021 und Prognose bis 2023. Statista.
KonBriefing Research (2022). Statistics: Major cyber at-
tacks on the public sector 1st quarter 2022. Technical
report.
Lins, S., Schneider, S., Szefer, J., Ibraheem, S., and Sun-
yaev, A. (2019). Designing monitoring systems for
continuous certification of cloud services: deriving
meta-requirements and design guidelines. Commu-
nications of the Association for Information Systems,
pages 460–510.
Markus, H. and Meuche, T. (2022). IT-Sicherheit, Daten-
schutz und Vergaberecht als Bremsen der Digital-
isierung der
¨
offentlichen Verwaltung? In Auf dem Weg
zur digitalen Verwaltung: Ein ganzheitliches Konzept
f
¨
ur eine gelingende Digitalisierung in der
¨
offentlichen
Verwaltung, pages 205–242. Springer.
Mell, P., Grance, T., et al. (2011). The NIST definition of
cloud computing.
Moses, F., Sandkuhl, K., and Kemmerich, T. (2022). Em-
pirical Study on the State of Practice of Information
Security Management in Local Government. In Proc.
of the Conference on Human Centred Intelligent Sys-
tems (HCIS), pages 13–25. Springer.
M
¨
uller, I., Han, J., Schneider, J.-G., and Versteeg, S. (2011).
Idea: a reference platform for systematic information
security management tool support. In Prof. of the third
Int. Symposium on Engineering Secure Software and
Systems (ESSoS), pages 256–263. Springer.
Osliak, O., Saracino, A., Martinelli, F., and Dimitrakos, T.
(2021). Towards Collaborative Cyber Threat Intelli-
gence for Security Management. In Proc. of the 7th
Int. Conf. on Information Systems Security and Pri-
vacy (ICISSP), pages 339–346.
Rehbohm, T., Sandkuhl, K., and Kemmerich, T. (2019).
On challenges of cyber and information security man-
agement in federal structures - the example of ger-
man public administration. In Proc. of the Joint Int.
Conf. on Perspectives in Business Informatics Re-
search Workshops and Doctoral Consortium (BIR-WS
2019), volume 2443, pages 1–13. CEUR-WS.
Samonas, S. and Coss, D. (2014). The CIA strikes back:
Redefining confidentiality, integrity and availability
in security. Journal of Information System Security,
pages 21–45.
Sein, M. K., Henfridsson, O., Purao, S., Rossi, M., and
Lindgren, R. (2011). Action design research. MIS
quarterly, pages 37–56.
Stephanow, P. and Banse, C. (2017). Evaluating the per-
formance of continuous test-based cloud service cer-
tification. In Proc. of the 17th IEEE/ACM Interna-
tional Symposium on Cluster, Cloud and Grid Com-
puting (CCGRID), pages 1117–1126. IEEE.
Sterbak, M., Segec, P., and Jurc, J. (2021). Automation
of risk management processes. In Proc. of the 19th
Int. Conf. on Emerging eLearning Technologies and
Applications (ICETA), pages 381–386. IEEE.
Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., and
Klepacki, B. (2020). Information security assessment
in public administration. Computers & Security.
Tambou, O. and Pato, A. (2021). Covid-19 vaccination
and data protection issues: A european comparative
study with focuses on france, germany, belgium, and
switzerland. MPILux Research Paper.
Taniguchi, T., Maruyama, Y., Kurita, D., and Tanaka, M.
(2018). Analysis and classification of university stu-
dents’ educational skills using a computer-assisted
web-interviewing questionnaire. Procedia computer
science, pages 2021–2029.
Wang, T. and Bashir, M. N. (2022). An Analysis of Cloud
Certifications’ Performance on Privacy Protections. In
Proc. of the 8th Int. Conf. on Information Systems Se-
curity and Privacy (ICISSP), pages 299–306.
Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds
551