scholarly journals Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan Vs Regional SMEs

Author(s):  
Ishan Senarathna ◽  
William Yeoh ◽  
Matthew Warren ◽  
Scott Salzman

New national infrastructure initiatives such as National Broadband Network (NBN) could enable Small and Medium-sized Enterprises (SMEs) in Australia to further embrace Cloud computing service. However, the ability of Cloud computing to store data remotely and share services in a dynamic environment bring along with it Cloud security and privacy concerns. In this study, we examined the influence of privacy and security factors on Cloud adoption by Australian SMEs through a questionnaire survey. Data was collected from 150 SMEs (i.e. 79 metropolitan SMEs and 71 regional SMEs) and structural equation modelling was used for data analysis. The findings show that Cloud privacy and security factors are not the most critical concern for Australian SMEs. Moreover, the results indicate that Cloud computing adoption is not influenced by the geographical location of the SMEs. This study extends the current understanding of Cloud computing adoption by Australian SMEs.

2019 ◽  
pp. 1663-1685
Author(s):  
Winfred Yaokumah ◽  
Rebecca Adwoa Amponsah

The growth in cloud computing adoption is phenomenal in organizations worldwide due mainly to its potential to increase productivity and enhance efficiency in business operations. However, cloud adoption is very low in many organizations in the developing countries. To gain insights into organizations' behavioral intention and usage behavior of cloud computing, based on the Extended Unified Technology Acceptance and Use Theory, the current study investigated the effects of technological, organizational, and environmental factors on cloud adoption in organizations. Using samples from five industry sectors and by employing the Structural Equation Model, the study found that facilitating conditions, habit, performance expectancy, and price value had positive and significant effect on behavioral intention to use cloud computing. But, effort expectancy, social influence, lack of motivation, and inadequate security were found to be barriers to cloud adoption. These findings could contribute toward better formulation of planning guidelines for successful adoption of cloud computing.


2020 ◽  
Vol 10 (22) ◽  
pp. 8098
Author(s):  
Abdullah Hussein Alghushami ◽  
Nur Haryani Zakaria ◽  
Zahurin Mat Aji

Cloud-based technology, which is now well established, helps in reducing costs and providing accessibility, reliability and flexibility. However, the Yemen higher educational institutions (HEIs) have not yet embraced the technology due to security and privacy concerns, lack of trust, negative cultural attitudes (i.e., tribalism), and most importantly, lack of digital devices experience in educational settings as well as lack of knowledge and technical know-how. Thus, this study proposes a conceptual model of cloud computing adoption in Yemen HEIs by investigating the influence of technology, organization and environment (TOE) factors. In addition, this study investigates the moderating effect of tribalism culture in the relationships between the identified factors and cloud computing adoption. The study employed the quantitative approach to determine the factors that influence cloud computing adoption in Yemen HEIs through a questionnaire survey. Data were collected from 328 respondents in 38 HEIs and analyzed using partial least square (PLS) structural equation modelling (SEM). The results indicate that relative advantage, reliability, compatibility, security, technology readiness, top management support, regulatory policy and competitive pressure have positive significant impacts on the cloud computing adoption, except tribalism culture with negative significant impact. The study also found that tribalism culture moderates the relationship between compatibility, reliability, security, relative advantage, regulatory policy and cloud computing adoption. This study contributes to the TOE adoption model by including the cultural factor as a moderator towards cloud computing adoption in Yemen HEIs. The study also provides a model and insights for HEIs, technology consultants, vendors and policy makers in better understanding of the factors that influence cloud computing adoption in least developed countries (LDCs), specifically, Yemen.


2016 ◽  
Vol 12 (1) ◽  
pp. 1-20 ◽  
Author(s):  
Karim Mezghani ◽  
Faouzi Ayadi

This research aims to study factors that explain the negative attitude toward cloud computing adoption. More precisely, through a literature review and then a survey study, this research tries to develop and test a research model that present factors which may explain the attitude toward cloud adoption. From these factors, the authors expect to present some 'best practices' required in cloud adoption. Indeed, as an emerging technology, cloud computing adoption and deployment need to be studied empirically to provide advises for practitioners. In this paper, the authors use a quantitative approach based on questionnaire addressed to IS Managers in Saudi enterprises that operate in the financial sector. Data collected from 74 firms are used to test the research hypotheses. They are analyzed by Structural Equation Modelling. Among the main results, the authors have found that risks factors are not determinants to study such attitudes. Rather, they found that the “positive” perceptions (perceived benefits, perceived usefulness and perceived ease of use) are the most determinants. Such perceptions are favored when IS managers are frequently exposed to cloud computing related information. In light of these results, the authors proposed some recommendations for decision makers in this area.


2017 ◽  
Vol 13 (1) ◽  
pp. 17-37 ◽  
Author(s):  
Winfred Yaokumah ◽  
Rebecca Adwoa Amponsah

The growth in cloud computing adoption is phenomenal in organizations worldwide due mainly to its potential to increase productivity and enhance efficiency in business operations. However, cloud adoption is very low in many organizations in the developing countries. To gain insights into organizations' behavioral intention and usage behavior of cloud computing, based on the Extended Unified Technology Acceptance and Use Theory, the current study investigated the effects of technological, organizational, and environmental factors on cloud adoption in organizations. Using samples from five industry sectors and by employing the Structural Equation Model, the study found that facilitating conditions, habit, performance expectancy, and price value had positive and significant effect on behavioral intention to use cloud computing. But, effort expectancy, social influence, lack of motivation, and inadequate security were found to be barriers to cloud adoption. These findings could contribute toward better formulation of planning guidelines for successful adoption of cloud computing.


Author(s):  
Yin Myo Kay Khine Thaw ◽  
Myo Ma Ma ◽  
Khin Myat New Win

Cloud Computing is the most advanced technical platform for next generation. Cloud Computing provide us a large range of data storage space in web source. Cloud Computing work automatically as per the need of user we don’t need to do extra work on it. High level applications and game is run by Cloud Computing. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. Cloud Computing cover the wide range of areas. It provides its service through online net connection. The data can be anything such as music, files, images, documents, and more. The user can access the data from anywhere just with the help of an internet connection. To use cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as the capacity of the server, internet speed, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and we also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2020 ◽  
pp. 978-1003
Author(s):  
Victor I. C. Chang

This paper presents a review related to Cloud Computing focusing on Cloud business requirements. From the review the author recommends a number of methods managing Cloud services and evaluating its service performance, including the use of a pair of the Hexagon Models. Three organizational challenges of Cloud adoption are identified: (i) Organizational Sustainability; (ii) Portability and (iii) Linkage. The Cloud Computing Adoption Framework (CCAF) is designed to deal with these challenges by helping organizations to achieve good Cloud designs, deployment and services. How these three challenges are addressed by the CCAF is demonstrated using case studies. Services implemented by CCAF are reviewed using the Hexagon Models for comparison. This paper provides recommendations to help organizations, researchers and practitioners to understand Cloud business context, to measure their risk and return analysis, to migrate their services to Cloud from all types and to connect and integrate different services as a single service.


2021 ◽  
Author(s):  
◽  
L. P. Bopape

With the advent of IoT, Device-to-Device (D2D) communications has afforded a new paradigm that reliably facilitates data exchange among devices in proximity without necessarily involving the base (core) network. It is geared towards the need to improve network performance where short-range communications is concerned, as well as supporting proximitybased services. However, the relentless growth in the number of network end-users as well as interconnected communication-capable devices, in the next-generation IoT-based 5G cellular networks has resulted in novel services and applications, most of which are security-sensitive. It is thus of paramount importance that security issues be addressed. A posing challenge is that the devices are mostly resource-constrained in both power and computing. As such, it is not practical to implement present day as well as traditional security frameworks and protocols under such a scenario, unless strides are taken towards the improvements of data throughput rates, higher bandwidth provisioning, lower round trip latencies, enhanced spectral efficiencies, and energy efficiency (leading to even lower power consumption, by the already constrained devices) in IoT 5G/LTE networks. Therefore, this work focused on exploring and designing schemes that enhance security and privacy among communicating parties. Otherwise, without reliable as well as robust privacy and security preservation measures in the network, most services and applications will be exposed to various forms of malicious attacks. With such a widened cyber-attack space, both privacy and security for end users can easily be compromised. The work herein addresses privacy for subscribers to the various available services and applications as well as security of the associated data. Ultimately, we propose a Fog-Cloud computing paradigm-assisted security framework that comprises two schemes. The aim is to implement a lightweight-based cartographic algorithm that ensures that communication overheads, round trip latencies, computational loads as well as energy consumption by the otherwise resource-constrained surveillance cameras deployed remotely, are kept minimal. Overall, by way of both analysis and simulation, we ascertain that a Fog-Cloud computing-based lightweight security-based scheme has the potential to greatly improve security and privacy preservation, as well as overall performance despite the resource-constrained nature of the devices.


Sign in / Sign up

Export Citation Format

Share Document