@inproceedings{scholars9861, year = {2018}, doi = {10.1109/ICCOINS.2018.8510612}, note = {cited By 10; Conference of 4th International Conference on Computer and Information Sciences, ICCOINS 2018 ; Conference Date: 13 August 2018 Through 14 August 2018; Conference Code:141665}, journal = {2018 4th International Conference on Computer and Information Sciences: Revolutionising Digital Landscape for Sustainable Smart Society, ICCOINS 2018 - Proceedings}, publisher = {Institute of Electrical and Electronics Engineers Inc.}, title = {Data Governance Cloud Security Assessment at Data Center}, isbn = {9781538647431}, author = {Saed, K. A. and Aziz, N. and Ramadhani, A. W. and Hafizah Hassan, N.}, abstract = {Data and information are very important as it contains company's identity and all business transaction. Every employee from higher position to the lowest position are responsible for the security of the data. Data should be treated as company asset and must be taken care of properly. Data governance will guide all employees in managing the data and make sure the security of data. Lack of awareness and poor data governance can lead to data breach and business disaster. By implementing data governance, every data in the company will have ownership, and access level. It will make the data more secured as the access level will be limited. This study intended to use extensive literature review for questions development and in-depth interview for data collection. The target respondents for this study must have expert knowledge in cloud security area. Finally, a data governance security assessment focusing on IaaS in cloud data center will be proposed and tested in HPC3 (High Performance Cloud Computing Center). {\^A}{\copyright} 2018 IEEE.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057104183&doi=10.1109\%2fICCOINS.2018.8510612&partnerID=40&md5=1219c35dd47ddfa26be9bb9a9a774ea2}, keywords = {Personnel, Business transaction; Cloud data centers; Data and information; Data centers; Data governances; In-depth interviews; security; Security assessment, Security of data} }