scholarly journals Understanding Trust and Cloud Computing: An Integrated Framework for Assurance and Accountability in the Cloud

Author(s):  
Theo Lynn ◽  
Lisa van der Werff ◽  
Grace Fox

Abstract Trust is regularly cited as one the main barriers for increased adoption of cloud computing, however conceptualisations of trust in cloud computing literature can be simplistic. This chapter briefly introduces the trust literature including definitions and antecedents of trust. Following an overview of cloud computing, we discuss some of the cited barriers to trust in cloud computing, and proposed mechanisms for building trust in the cloud. We present a high-level framework for exploring assurance (trust building) and accountability (trust repair) in the cloud and call for a more integrated multi-stakeholder approach to trust research in this multi-faceted context.

2012 ◽  
Vol 2 (2) ◽  
pp. 1-11 ◽  
Author(s):  
Saad T. Alharbi

Cloud computing has become a popular topic in the research community because of its ability to transform computer software, platforms, and infrastructure as a service. However, cloud computing literature currently lacks user studies despite the fact that users play a crucial role in the success and failure of emerging technologies. This paper presents a study aimed at investigating users’ acceptance of cloud computing in Saudi Arabia. As a baseline, it utilizes the Technology Acceptance Model (TAM) along with five additional factors believed to affect users’ acceptance of new technology in the region in order to achieve the study goals. These factors are gender, age, education level, job domain, and nationality. The results demonstrated a high level of acceptance of cloud computing and a valid TAM in its standard form. The results also indicated that age, education, job domain, and nationality have a significant effect on users’ attitudes toward the adoption of cloud computing. However, no difference was found in the attitude toward the adoption of cloud computing between male and female employees.


Author(s):  
Brid Murphy ◽  
Marta Rocchi

Abstract While the benefits of cloud computing are widely acknowledged, it raises a range of ethical concerns. The extant cloud computing literature reports specific ethical perspectives on focussed topics in this domain, but does not explicitly refer to a specific ethical conception or reference point. This chapter provides an overview of ethics and ethical theories, which can be used to analyse the use of cloud technology and the complex multi-stakeholder structure of the industry. It is critical that cloud providers and users recognise that they effectively shape the morality of the cloud computing context through their interactions with other providers and users, and with the platform itself. Both stakeholder sets must be accountable for the possibilities offered by the technology. While pertinent regulation is continuously evolving, it is unlikely to advance at a similar rapid pace to that of innovation in the cloud computing industry. It is therefore essential that ethics is carefully considered to orient cloud computing towards the good of society.


2020 ◽  
Vol 35 ◽  
Author(s):  
Arina Alexandra Muresan

The Second High-Level United Nations (UN) Conference on South-South Cooperation (also known as BAPA+40), held in Buenos Aires, Argentina, from 20 to 22 March 2019, promised to reinvigorate efforts to further achieve and implement South-South cooperation (SSC). Forty years on, the Global South is shaping its image as a solutions provider. Immense strides have been made in improving access to allow a multitude of state and non-state actors to cooperate, while broadening and deepening modes of cooperation and facilitating the exchange of knowledge and transfer of technology, thus moving beyond the simplistic view that developing countries require aid to function and move forward. However, noting these symbolic strides, the Global South should move forward by building understanding of monitoring and evaluation (M&E) frameworks; integrating multi-stakeholder models; improving the visibility of peace and security in South-South programming; and building effective communications systems.


Author(s):  
Cynthia M. Horne

This chapter examines the conditions under which lustration and truth commissions affected trust in targeted public institutions, such as the judiciary, the parliament, the police, and political parties, or composites of institutions, such as oversight institutions or elected institutions. I find strong and consistent relationships between lustration and political trust, except for the most highly politicized public institutions. More extensive and compulsory programs were associated with the largest trust-building effects. Truth commissions were not associated with political trust-building. This chapter also demonstrates that delayed reforms were more effective than reforms initiated right after the transition for most of the institutions, except for highly politicized institutions. This runs contrary to assumptions about the necessity of starting reforms immediately after the transition or not at all. The chapter presents the paired cases of Bulgaria and Romania and illustrates the possibilities for public disclosure programs to effect lustration-like reforms.


Computers ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 63
Author(s):  
Fahd Alhaidari ◽  
Taghreed Zayed Balharith

Recently, there has been significant growth in the popularity of cloud computing systems. One of the main issues in building cloud computing systems is task scheduling. It plays a critical role in achieving high-level performance and outstanding throughput by having the greatest benefit from the resources. Therefore, enhancing task scheduling algorithms will enhance the QoS, thus leading to more sustainability of cloud computing systems. This paper introduces a novel technique called the dynamic round-robin heuristic algorithm (DRRHA) by utilizing the round-robin algorithm and tuning its time quantum in a dynamic manner based on the mean of the time quantum. Moreover, we applied the remaining burst time of the task as a factor to decide the continuity of executing the task during the current round. The experimental results obtained using the CloudSim Plus tool showed that the DRRHA significantly outperformed the competition in terms of the average waiting time, turnaround time, and response time compared with several studied algorithms, including IRRVQ, dynamic time slice round-robin, improved RR, and SRDQ algorithms.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hongjiang Xu ◽  
Sakthi Mahenthiran

Purpose This study aims to develop a scale to measure the cloud provider’s performance and it investigates the factors that impact that performance from the users’ perspective. Design/methodology/approach This paper proposes a research framework, develops hypotheses and conducts a survey to test the framework. Findings The results from both ordinary least square regression and structural equation modeling analyzes indicate that information technology complexity negatively and significantly affects users’ perception of the cloud computing providers’ performance. Additionally, the trust in the supervisor significantly enhances the otherwise insignificant positive relationship between providers’ cybersecurity capability and users’ perception of their providers’ performance. Originality/value The research makes important contributions to the cloud computing literature, as it measures users’ perception of the cloud computing provider’s performance and links it with cybersecurity, technical complexity and incorporates both the trust in the client firm’s supervisor and the strength of cybersecurity offered by cloud computing provider.


2018 ◽  
Vol 6 (5) ◽  
pp. 340-345
Author(s):  
Rajat Pugaliya ◽  
Madhu B R

Cloud Computing is an emerging field in the IT industry. Cloud computing provides computing services over the Internet. Cloud Computing demand increasing drastically, which has enforced cloud service provider to ensure proper resource utilization with less cost and less energy consumption. In recent time various consolidation problems found in cloud computing like the task, VM, and server consolidation. These consolidation problems become challenging for resource utilization in cloud computing. We found in the literature review that there is a high level of coupling in resource utilization, cost, and energy consumption. The main challenge for cloud service provider is to maximize the resource utilization, reduce the cost and minimize the energy consumption. The dynamic task consolidation of virtual machines can be a way to solve the problem. This paper presents the comparative study of various task consolidation algorithms.


Sign in / Sign up

Export Citation Format

Share Document