The cloud computing adoption in higher learning institutions in Kenya: Hindering factors and recommendations for the way forward

2019 ◽  
Vol 38 ◽  
pp. 225-246 ◽  
Author(s):  
Kenndy Njenga ◽  
Lalit Garg ◽  
Amit Kumar Bhardwaj ◽  
Vijay Prakash ◽  
Seema Bawa
Author(s):  
Dina Moloja ◽  
Ephias Ruhode

Cloud Computing is one of the most important trends and newest area in the field of information technology in which resources (e.g. CPU and storage) can be leased and released by customers through the Internet in an on-demand basis. The adoption of Cloud Computing in Higher Learning Institution is a real opportunity. Although Cloud computing has gained popularity in the world especially in education and industry, but its impact in colleges is still unexplored. This exploratory qualitative research seeks to identify the factors affecting the adoption of Cloud Computing in South Africa, focusing on Matjhabeng TVET colleges. 35 IT stakeholders from two TVET colleges was interviewed. Thematic analysis was utilised to analase data. After data was analysed, the findings revealed that data security, lack of internet access and lack of infrastructure resources are key factors that affects Cloud computing adoption in Matjhabeng TVET colleges. This paper contributes to the literature on Cloud Computing adoption in Higher Learning Institutions in South Africa.


Author(s):  
Adel Ismail Al-Alawi ◽  
Arpita A. Mehrotra ◽  
Sara Abdulrahman Al-Bassam

The internet has revolutionized the way people communicate, how they manage their business, and even how they conduct their studies. Organizations can conduct meetings virtually and store all their data online. With this convenience, however, comes the risk of cybercrime (CC). Some of the world's most renowned organizations have found themselves having to incur huge recovery costs after falling prey to CC. Higher learning institutions' databases are increasingly falling victim to CCs, owing to the vast amounts of personal and research data they harbor. Despite this, the area of CCs in learning institutions remains understudied. This chapter seeks to identify how CC is manifested in such institutions and the specific cybersecurity measures that stakeholders could use to minimize their exposure to the same. The qualitative case study was designed to explore the research questions, and collected data through semistructured interviews. The findings showed hacking, phishing, and spoofing as the most common manifestations of cybercrime in higher learning institutions.


Author(s):  
Eduardo Correia

Virtualization has the potential to revolutionise the way networking is taught in higher learning institutions. This article outlines, through the use of a case study, the way in which VMware Workstation and VMware ESX Server are used so that each student in the class runs his or her own set of seven virtual servers, including a Linux router. The Linux router connects virtual networks within the context of student physical machines to one another as well as a lecturer virtual server, which runs on an ESX server. In this way, a class of twenty two students can together run an enterprise-like network comprising of some 177 servers and implement Microsoft Active Directory sites and associated services in order to optimize a specific scenario-based replication topology.


2015 ◽  
Vol 77 (18) ◽  
Author(s):  
Hanifah Abdul Hamid ◽  
Mokhtar Mohd Yusof

Cloud computing has made a significant transformation of information technology environment as well as the way the business is conducted in any organizations. While its advantages are obvious, its challenges need to be clearly addressed to ensure successful adoption. This article provides an insights of cloud computing adoption in Malaysia at the national level as well as a review of cloud adoption from various fields and domains in Malaysia which led to research direction in the future. Malaysia is being dedicated towards cloud adoption nationally, and keep its good progress to equip itself as a cloud-friendly country. However, security challenges seem to slow down the effort, thus these need to be dealt with properly. 


2017 ◽  
Vol 10 (36) ◽  
pp. 1-19 ◽  
Author(s):  
Rashidah F. Olanrewaju ◽  
Burhan ul Islam Khan ◽  
Mueen Ul Islam Mattoo ◽  
Farhat Anwar ◽  
Anis Nurashikin Bt. Nordin ◽  
...  

offering perpetual statistics safety for petabytes of facts is important for handed on enrolling. A ordinary overview on cloud safety imparts that the safety of customers' records has the maximum lifted need and moreover challenge. We acquire this need in order to accomplish with a manner of thinking this is succesful, adoptable and all around made. consequently, this paper has constructed up a device known as Cloud Computing Adoption Framework (CCAF)which has been modified for verifying cloud information. This paper clears up the chart, device for deduction and regions within the CCAF to make certain statistics safety. CCAF is outlined through using the framework route of action depending on the fundamentals and the execution confirmed up thru the CCAF multi-layered protection. while you do not forget that our records center has 10 petabytes of data, there can be splendid challenge to provide nonstop safety and detach. We use business agency manner Modeling Notation (BPMN) to mirror how information is getting used. using BPMN redirection allows us to assess the picked protection introductions in advance than showed execution. outcomes show that an opportunity to assume duty for security break may have a few spot inside the extent of 50 and 100 twenty 5 hours. The server farms have skilled problems of brisk increase within the data. as an example, in a server broaden that the lead writer used to art work with, properly ordered option of 100 terabytes of statistics modified into elegant this proposes greater safety is needed to guarantee all statistics is particularly ensured inside the squeezing a hundred twenty five hours. This paper has correspondingly tested that CCAF multi-layered protection can ensure statistics coherently and it has 3 layers of safety: 1) firewall and get admission to govern; 2) personality affiliation and obstruction adjusting movement and 3) joined encryption. To avow CCAF, this paper has gotten a deal with on techniques of proper hacking assessments required with attack trying out with 10,000 Trojans and pollutions. The CCAF multi-layered security can rectangular 9,919 illnesses and Trojans which can be beaten like a burst and the staying ones may be disengaged or disconnected. The tests seem paying little admire to the way in which that the diploma of blockading can decrease for steady aggregate of ailments and Trojans, 90 seven.forty three percent of them can be restricted. Our CCAF multi-layered safety has a humdrum of 20 percentage ideal execution over the singlelayered manner of thinking which can simply block7, 438 defilements and Trojans


Sign in / Sign up

Export Citation Format

Share Document