Performance Barriers to Cloud Services in Africa’s Public Sector: A Latency Perspective

Author(s):  
Josiah Chavula ◽  
Amreesh Phokeer ◽  
Enrico Calandro
2020 ◽  
Vol 5 (1) ◽  
pp. 73-88
Author(s):  
Devi Puspitasari

This study aims to determine and examine the effect of auditor perceptions on auditor performance in the attack district inspectorate. The object in this study is the inspectorate in the district government attack. Sampling is done by survey method. The type of data used is subject data, and the data source used is primary data. Processing and analysis of data using the help of SPSS vesi 19.00 application with multiple linear regression models. Based on the results of hypothesis testing obtained Audit Effectiveness has a positive and significant effect on the performance of public sector auditors, Auditor Policy has a positive and significant effect on the performance of public sector auditors, External Auditor Professionals have a significant and positive effect on the performance of public sector auditors, Other Expert Professionals have a positive and significant effect on public sector auditor performance, barriers have a positive and significant effect on the performance of public sector auditors, Public Administration has a positive effect on the performance of public sector auditors.


Author(s):  
Yaser Mirza

This research explores critical aspects of procurement of ICT cloud services for South Australian public sector organisations with the case of South Australia Police (SAPOL) for evaluation. SAPOL as one of the state government agencies at the time is initiating this transition to the cloud environment. This exploratory research takes place when this public sector agency is doing its due diligence to ensure a successful implementation. In this study the researcher started off with surfacing the challenges in this journey for a public sector organisation before the actual journey commenced. SAPOL being a public sector organisation operates differently from private enterprises and has certain constraints and limitations that pose additional challenges for the organisation to transition towards the cloud. Interview with the CIO of the organisation responsible for the cloud migration initiative was organised. After detailed literature review, an interview questionnaire was prepared in accordance with the subject of interest. The information gathered in the interviews was recorded for detailed analysis. This paper contains a detailed report on the information analysed highlighting fourteen important challenges faced by the organisation in this cloud migration journey.


2021 ◽  
pp. 39-45
Author(s):  
B. HLUSHCHENKO

The global trend of development of cloud technologies and services is outlined. The principles and priorities of the American Cloud First concept are considered. The models of legislative support of cloud technologies (services) in the advanced foreign countries and the People's Republic of China are researched. Peculiarities of using cloud services for the needs of the public sector are determined. The directions of building the domestic composite Cloud First strategy are detailed. The concepts of domestic legislative initiatives dedicated to the development of cloud services in Ukraine are highlighted.


2018 ◽  
Vol 325 ◽  
pp. 137-144
Author(s):  
Kálmán Hadarics ◽  
Ferenc Leitold ◽  
Anthony Arrott

Since the introduction of personal computing over the Internet, cyber-security has developed primarily as commercial services providing protection to organizations and individuals as customers of paid services. However, since the introduction of cloud-services and smartphones over a decade ago, this development has been radically altered. Effective cyber-security can no longer be provided as simplistic protective walls around trusted zones of computing (for organizations: isolated private corporate networks with secure network gateways; for individuals: stand-alone personal computers protected by locally-running anti-virus applications). These approaches have always assumed that cyber-threats do not originate from inside trusted zones. Increasingly, cybersecurity is more effectively achieved through detecting and mitigating vulnerabilities discovered through coordinated assessment of malware threats, user behaviors, and IT infrastructure weaknesses. Unlike the traditional focus on malware threats alone, this integrated approach treats the IT infrastructure and user behavior of each individual and each organization department separately. This distributed approach makes no assumptions about the origins of cyber-threats. In this paper, we examine the implications of using this distributed approach in the public sector. Particular emphasis is placed on aspects where the traditional framework of cyber-security as a commercial service can be usefully abandoned and replaced by more effective public sector practices. The recent evolution of the Digital Divide in Central and Eastern Europe has not been a simple story of those with less opportunity and access (old, poor, less educated) being able close the gap by “catching up” with those of greater opportunity and access (young, wealthy, well educated). Rather, the closing of the Digital Divide has been achieved more through the adoption of very different digital activities provided through very differently organized services – activities and services that require very different public sector approaches to cyber-security. These include new approaches to measuring citizen cyber-health; making citizens savvier about their personal cybersecurity; and providing more secure online public services.


2013 ◽  
Author(s):  
H. Westerlund ◽  
J. Ferrie ◽  
J. Hagberg ◽  
K. Jeding ◽  
G. Oxenstierna ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document