Narayana Samy G.Albakri S.H.Maarop N.Magalingam P.Wong D.H.-T.Shanmugam B.Perumal S.2024-05-292024-05-29201997833200000002194535710.1007/978-3-319-99007-1_532-s2.0-85053886948https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053886948&doi=10.1007%2f978-3-319-99007-1_53&partnerID=40&md5=a423eb3b94e974f2eddec207335b5dc7https://oarep.usim.edu.my/handle/123456789/9902Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment. � Springer Nature Switzerland AG 2019.en-USCloud computing securityInformation security risk assessment methodMedical research design and methodBioinformaticsSecurity of dataSecurity systemsSoft computingSoftware as a service (SaaS)Cloud computing environmentsCloud computing securitiesEconomic benefitsInformation security risk assessmentInformation security threatsMedical researchRisk assessment methodsSecurity risk assessmentsRisk assessmentNovel risk assessment method to identify information security threats in cloud computing environmentConference Paper566578843