
In Proc. of the 9th Int. Conf. on Information Systems
Security and Privacy (ICISSP), pages 543–551.
European Union (2018). Regulation (EU) 2018/1724 of the
European Parliament and of the Council of 2 October
2018 establishing a single digital gateway to provide
access to information, to procedures and to assistance
and problem-solving services and amending Regula-
tion (EU) No 1024/2012.
Galletta, A., Ardo, O., Celesti, A., Kissa, P., and Villari, M.
(2017). A recommendation-based approach for cloud
service brokerage: A case study in public administra-
tion. In Proc. of the 3rd Int. Conf. on Collaboration
and Internet Computing (CIC), pages 227–234. IEEE.
Ge, M. and Buhnova, B. (2022). Disda: Digital service
design architecture for smart city ecosystems. In Proc.
of the 12th Int. Conf. on Cloud Computing and Service
Science (CLOSER), pages 207–214.
Henze, M., Matzutt, R., Hiller, J., M
¨
uhmer, E., Ziegeldorf,
J. H., van der Giet, J., and Wehrle, K. (2020). Com-
plying with data handling requirements in cloud stor-
age systems. IEEE Transactions on Cloud Computing,
10(3):1661–1674.
Jaatun, M. G., Tøndel, I. A., Moe, N. B., Cruzes, D. S.,
Bernsmed, K., and Haugset, B. (2017). Accountabil-
ity requirements for the cloud. In Proc. of the 8th Int.
Conf. on Cloud Computing Technology and Science
(CloudCom), pages 375–382. IEEE.
Lange, J. (2024). Kommunaler Notbetrieb: IT-
Sicherheitsvorf
¨
alle in Kommunalverwaltungen.
https://kommunaler-notbetrieb.de.
Lins, S., Schneider, S., Szefer, J., Ibraheem, S., and Sun-
yaev, A. (2019). Designing monitoring systems for
continuous certification of cloud services: deriving
meta-requirements and design guidelines. Commu-
nications of the Association for Information Systems,
pages 460–510.
Mazza, R. (2009). Introduction to information visualiza-
tion. Springer Science & Business Media.
Meier, S., Fuchs, L., and Pernul, G. (2013). Managing the
access grid-a process view to minimize insider misuse
risks. In Proc. of the 11th Int. Conf. on Wirtschaftsin-
formatik (WI2013).
Mell, P., Grance, T., et al. (2011). The NIST definition of
cloud computing.
Nanos, I., Manthou, V., and Androutsou, E. (2019). Cloud
computing adoption decision in e-government. In
Operational Research in the Digital Era–ICT Chal-
lenges: 6th International Symposium and 28th Na-
tional Conference on Operational Research, Thessa-
loniki, Greece, June 2017, pages 125–145. Springer.
Nycz, M. and Polkowski, Z. (2015). Cloud computing in
government units. In Proc. of the 5th Int. Conf. on Ad-
vanced Computing & Communication Technologies,
pages 513–520. IEEE.
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., Mc-
Cormac, A., and Zwaans, T. (2017). The human as-
pects of information security questionnaire (hais-q):
two further validation studies. Computers & Security,
66:40–51.
Peffers, K., Tuunanen, T., Rothenberger, M. A., and Chat-
terjee, S. (2007). A design science research method-
ology for information systems research. Journal of
management information systems, 24(3):45–77.
Proenc¸a, D. and Borbinha, J. (2018). Information secu-
rity management systems-a maturity model based on
iso/iec 27001. In Proc. of the 21st Int. Conf. of
Business Information Systems (BIS), pages 102–114.
Springer.
Rath, M., Keller, L., and Spies, A. (2023). Sovereign
clouds—an overview of the current privacy challenges
associated with the use of us cloud services, and how
sovereign clouds can address these challenges. Com-
puter Law Review International, 24(3):78–84.
Sasubilli, M. K. and Venkateswarlu, R. (2021). Cloud com-
puting security challenges, threats and vulnerabilities.
In Proc. of the 6th Int. Conf. on Inventive Computation
Technologies (ICICT), pages 476–480. IEEE.
Schmitz, C., Schmid, M., Harborth, D., and Pape, S.
(2021). Maturity level assessments of information se-
curity controls: An empirical analysis of practition-
ers assessment capabilities. Computers & Security,
108:102306.
Stephanow, P. and Fallenbeck, N. (2015). Towards contin-
uous certification of Infrastructure-as-a-Service using
low-level metrics. In Proc. of the 12th Int. Conf. on
Ubiquitous Intelligence and Computing (UbiComp),
pages 1485–1492. IEEE.
Su, P., Chen, Y., and Lu, M. (2022). Smart city information
processing under internet of things and cloud com-
puting. The Journal of Supercomputing, pages 3676–
3695.
Syynimaa, N. and Viitanen, T. (2018). Is my office 365
gdpr compliant?: Security issues in authentication and
administration. In International Conference on En-
terprise Information Systems. SCITEPRESS Science
And Technology Publications.
Yermalovich, P. (2020). Dashboard visualization techniques
in information security. In Proc. of the 7th Int. Sympo-
sium on Networks, Computers and Communications
(ISNCC), pages 1–6.
Zaharia-R
˘
adulescu, A.-M., Radu, I., et al. (2017). Cloud
computing and public administration: approaches in
several european countries. In Proc. of the Int. Conf.
on Business Excellence, volume 11, pages 739–749.
Sciendo.
Visualizing the Information Security Maturity Level of Public Cloud Services Used by Public Administrations
203