Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Whittington is active.

Publication


Featured researches published by Mark Whittington.


security of information and networks | 2014

Compliance with standards, assurance and audit: does this equal security?

Bob Duncan; Mark Whittington

Managing information security is a challenge. Traditional checklist approaches to meeting standards may well provide compliance, but do not guarantee to provide security assurance. The same might be said for audit. The complexity of IT relationships must be acknowledged and explicitly managed by recognising the implications of the self-interest of each party involved. We show how tensions between these parties can lead to a misalignment of the goals of security and what needs to be done to ensure this does not happen.


ieee international conference on cloud computing technology and science | 2013

Developing a Conceptual Framework for Cloud Security Assurance

Bob Duncan; David J. Pym; Mark Whittington

Managing information security in the cloud is a challenge. Traditional checklist approaches to standards compliance may well provide compliance, but do not guarantee to provide security assurance. The complexity of cloud relationships must be acknowledged and explicitly managed by recognising the implications of self-interest of each party involved. We begin development of a conceptual modelling framework for cloud security assurance that can be used as a starting point for effective continuous security assurance, together with a high level of compliance.


ieee international conference on cloud computing technology and science | 2014

Reflecting on Whether Checklists Can Tick the Box for Cloud Security

Bob Duncan; Mark Whittington

All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.


Accounting Education | 2009

The Customer Is King. Enthroned or In Exile? An Analysis of the Level of Customer Focus in Leading Management Accounting Textbooks

Ken Bates; Mark Whittington

In response to fierce criticism of irrelevancy and the need to adapt management accounting (MA) to fully support modern managerial priorities, there is a growing body of MA literature seeking to address the perceived weakness of customer-focused techniques and measures. This paper investigates the impact of this literature on mainstream MA textbooks and, by extension, teaching. The customer-focused content and, in particular, coverage of customer profitability analysis (CPA), is found to be relatively low in quantity and diverse in relation to the choice of techniques being discussed. No generally-accepted way of approaching this area is revealed, perhaps because it is so contingent on circumstances, and it seems that CPA is not yet part of mainstream MA. In the area of customer focus at least, there remain questions over the relevance of mainstream textbooks, teaching and, by further extension, the day-to-day practice of MA.


ieee international conference on cloud computing technology and science | 2015

The Importance of Proper Measurement for a Cloud Security Assurance Model

Bob Duncan; Mark Whittington

Defining proper measures for evaluating the effectiveness of an assurance model, which we have developed to ensure cloud security, is vital to ensure the successful implementation and continued running of the model. We need to understand that with security being such an essential component of business processes, responsibility must lie with the board. The board must be responsible for defining their security posture on all aspects of the model, and therefore must also be responsible for defining what the necessary measures should be. Without measurement, there can be no control. However, it will also be necessary to properly engage with cloud service providers to achieve a more meaningful degree of security for the cloud user.


ieee international conference on cloud computing technology and science | 2015

Information Security in the Cloud: Should We be Using a Different Approach?

Bob Duncan; Mark Whittington

Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume and in value. The business architecture of a company comprises people, process and technology. Is it not time to consider a different approach?


Journal of Applied Accounting Research | 2008

Financial statement analysis and accounting policy choice: What history can teach us

Rhoda Brown; Mark Whittington

The choice of accounting policies by a company has implications for the market’s understanding of corporate performance. Whilst the critical areas of choice may change over time with new developments and changes in standards, the underlying issue remains relevant. This paper examines the effect of accounting techniques upon the relationship between accounting variables and UK share prices.


International Workshop on Enterprise Security | 2017

Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements

Bob Duncan; Mark Whittington; Martin Gilje Jaatun; Alfredo Ramiro Reyes Zúñiga

In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.


Journal of Marketing Management | 2008

Accounting is from Mars, marketing is from Venus: establishing common ground for the concept of customer profitability

R. Gleaves; Jamie Burton; J. Kitshoff; Ken Bates; Mark Whittington


trust, security and privacy in computing and communications | 2015

Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement

Bob Duncan; Mark Whittington

Collaboration


Dive into the Mark Whittington's collaboration.

Top Co-Authors

Avatar

Bob Duncan

University of Aberdeen

View shared research outputs
Top Co-Authors

Avatar

Victor Chang

Xi'an Jiaotong-Liverpool University

View shared research outputs
Top Co-Authors

Avatar

Ken Bates

Victoria University of Wellington

View shared research outputs
Top Co-Authors

Avatar

David J. Pym

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

J. Kitshoff

University of Manchester

View shared research outputs
Top Co-Authors

Avatar

Jamie Burton

University of Manchester

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alfredo Ramiro Reyes Zúñiga

Norwegian University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge