Business and Government Organizations' Adoption of Cloud Computing

Cloud computing is very much accepted and acknowledged worldwide as a promising computing paradigm. On-demand provisioning based on a pay-per-use business model helps reduce costs through sharing computing and storage resources. Although cloud computing has become popular, some business and government organizations are still lagging behind in adopting cloud computing. This study reports the status of cloud utilization among business and government organizations, and the concerns of organizations regarding the adoption of cloud computing. The study shows that some government agencies are lagging behind in cloud computing use, while others are leading the way. Security is identified as the major reason for delay in adopting cloud computing. The outcomes of the data analysis process prove that some security measures such as encryption, access authentication, antivirus protection, firewall, and service availability are required by clients for adoption of cloud computing in the future.

[1]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[2]  Antonio Pescapè,et al.  Cloud monitoring: A survey , 2013, Comput. Networks.

[3]  J. R. Vic Winkler Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2011 .

[4]  K. Barriball,et al.  Collecting data using a semi-structured interview: a discussion paper. , 1994, Journal of advanced nursing.

[5]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[6]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[7]  Daniel Muijs,et al.  Doing Quantitative Research in Education with SPSS , 2004 .

[8]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..

[9]  Dorothy Marinucci,et al.  Advances in Cyber Security , 2013 .

[10]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[11]  Sungyoung Lee,et al.  Adoption issues for cloud computing , 2009, iiWAS.

[12]  Bofeng Zhang,et al.  Comparison of Several Cloud Computing Platforms , 2009, 2009 Second International Symposium on Information Science and Engineering.

[13]  R. Gorden,et al.  Interviewing: Strategy, techniques, and tactics , 1987 .

[14]  Vic Winkler Securing the Cloud: Data Security , 2011 .

[15]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[16]  P. Burnard A method of analysing interview transcripts in qualitative research. , 1991, Nurse education today.

[17]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[18]  Philip E. T. Lewis,et al.  Research Methods for Business Students , 2006 .

[19]  Philip E. T. Lewis,et al.  Research Methods for Business Students (5th edn) , 2007 .

[20]  D. Ogrizovic,et al.  Open source science clouds , 2010, The 33rd International Convention MIPRO.

[21]  J. Creswell Qualitative inquiry and research design: Choosing among five approaches, 2nd ed. , 2007 .

[22]  Douglas Thain,et al.  A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[23]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[24]  John Krogstie Model-Based Development and Evolution of Information Systems: A Quality Approach , 2012 .

[25]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[26]  J. R. Freer Computer Communications and Networks , 1988 .

[27]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[28]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[29]  Laurie Hirsch,et al.  Guide to Cloud Computing: Principles and Practice , 2012 .

[30]  Norman G. Finkelstein How To Books , 2002 .

[31]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[32]  Arun Venkataramani,et al.  Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges , 2010, HotCloud.

[33]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.