A Cloud Computing-Based Model of E-Commerce Adoption for Developing Countries

Author(s):  
Ghada Refaat El Said

While e-commerce can contribute significantly to the economies of developing countries, challenges may include a lack of telecommunications infrastructure, low Internet and credit card penetration, lack of skilled professionals and insufficient delivery systems. Cloud computing offers a solution to most of these challenges, providing access to a low-cost, reliable and flexible internet-based infrastructure. However, there is little empirical validation of the adoption of cloud computing in e-commerce; to bridge that gap, the present study proposes a cloud-based model of e-commerce adoption. Based on a survey of leaders of 175 small, medium, and large ICT firms in Egypt, a developing country where e-commerce is expected to boom in the coming years, the proposed model empirically validates organizational, technical and contextual factors that would make e-commerce adoption more effective for business, governments and service providers.

2017 ◽  
Vol 15 (3) ◽  
pp. 64-82
Author(s):  
Ghada Refaat El Said

While e-commerce can contribute significantly to the economies of developing countries, challenges may include a lack of telecommunications infrastructure, low Internet and credit card penetration, lack of skilled professionals and insufficient delivery systems. Cloud computing offers a solution to most of these challenges, providing access to a low-cost, reliable and flexible internet-based infrastructure. However, there is little empirical validation of the adoption of cloud computing in e-commerce; to bridge that gap, the present study proposes a cloud-based model of e-commerce adoption. Based on a survey of leaders of 175 small, medium, and large ICT firms in Egypt, a developing country where e-commerce is expected to boom in the coming years, the proposed model empirically validates organizational, technical and contextual factors that would make e-commerce adoption more effective for business, governments and service providers.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


2021 ◽  
Vol 11 (3) ◽  
pp. 19-32
Author(s):  
Shahin Fatima ◽  
Shish Ahmad

Cloud computing has become a feasible solution for virtualization of cloud resources. Although it has many prospective to hold individuals by providing many benefits to organizations, still there are security loopholes to outsource data. To ensure the ‘security' of data in cloud computing, quantum key cryptography is introduced. Quantum cryptography makes use of quantum mechanics and qubits. The proposed method made use of quantum key distribution with Kerberos to secure the data on the cloud. The paper discussed the model for quantum key distribution which makes use of Kerberos ticket distribution center for authentication of cloud service providers. The proposed model is compared with quantum key distribution and provides faster computation by producing less error rate.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mahak Sharma ◽  
Ruchita Gupta ◽  
Padmanav Acharya ◽  
Karuna Jain

PurposeCloud computing (CC) services have given a tremendous boost to the creation of efficient and effective solutions. With developing countries at a slow pace of adoption, this research aims to identify factors and their interrelationships influencing the adoption of CC in a developing country context. The developing countries are enjoying numerous benefits from CC services; however, its low adoption is still a question in developing economies; hence, the authors have selected the context of information and communication technology (ICT) firms in India.Design/methodology/approachThe qualitative research method is used where experts from thirteen ICT firms in India are interviewed.FindingsSixteen factors, twenty-eight subfactors, and 25 interrelationships are revealed through content analysis. Further, causal loop diagrams are proposed to display the behavior of cause and effect of these factors from a system's perspective. This will help to understand the relationships among the factors in order to enhance the speed of CC adoption. Possible financial loss and resistance to change are found as the key barriers to adoption. The proposed interrelationships can guide both policymakers and service providers for designing effective CC policies.Originality/valueThis is the first scholarly work that identifies interrelationships among factors and subfactors, thereby providing a holistic picture to decision-makers while making a choice on whether to adopt cloud services or continue with on premise data centers and servers.


2016 ◽  
pp. 1968-2000 ◽  
Author(s):  
Camilius Aloyce Sanga ◽  
George Kibirige

The maturity of free and open source movement has brought a number of ICT tools. It has affected the way courses are delivered, the way contents are developed, the way data are interoperable, the way learning and teaching materials are shared, the way learners access classes and the way library resources are shared. In developing countries, several libraries are migrating into digital libraries using low cost technologies readily available due to open access, free and open source technology and e-publishing tools. Recent development of cloud computing technology provides state of art tools for libraries. It provides a common platform for easy information storage and sharing. Thus, there is lowering of the cost required to procure and manage library ICT infrastructure due to the capability of that cloud computing which allows the storage to be on a single, efficient system that saves cost and time. In developing countries where most libraries suffer from limited budgets for ICT services, it is anticipated that the future of digital libraries is on cloud libraries.


Author(s):  
M. Tsagkaropoulos ◽  
I. Politis ◽  
T. Dagiuklas

With the opening of the telecommunication market and the emergence of low-cost and heterogeneous wireless access technologies, it is envisaged that next-generation network and service providers will not only vary in the deployed access technology but also in their business models and structures. Such providers will differ from large providers such as the current telecom providers offering multiple services and covering large geographical areas, down to small providers offering certain services such as conferencing or messaging only or covering small geographical areas such as a coffee shop or a shopping mall. Further, while in the current networking environment, a home provider of a user is usually represented by a large telecom provider; in such a heterogeneous environment, any trustworthy entity such as an application provider, a banking entity, or a credit card provider that is capable of authenticating the user and marinating his usage profile can act as a home provider. Towards this vision this article discusses the issues that concern the establishment of multimedia applications across heterogeneous networks.


2020 ◽  
Vol 63 (6) ◽  
pp. 927-941 ◽  
Author(s):  
A A Periola ◽  
A A Alonge ◽  
K A Ogudo

Abstract The Ocean provides benefits of free cooling for cloud computing platforms. However, the use of the ocean for hosting cloud platforms needs to consider three challenges. The first challenge is identifying suitable underwater locations for siting underwater data centres. The second is designing a low-cost method for acquiring underwater data centres. The third is designing a mechanism ensuring that the use of the ocean for hosting data centres is scalable. This paper proposes the intelligent marine compute locator (IMCL) to identify suitable locations for siting underwater data centres. The proposed IMCL determines the specific heat capacity of different ocean locations at multiple epochs. In addition, the conversion of end-of-life vessels into artificial reefs that host open-source disaggregated hardware computing payload is proposed to reduce acquisition costs. The use of disaggregated architecture enables multiple cloud service providers to use limited ocean locations. The formulated metrics are the power usage effectiveness (PUE) and ocean space utilization (OSU). Simulations show that the use of disaggregated design architecture instead of non-disaggregated architecture (existing mechanism) enhances the PUE and OSU by 4.4 and 16.4% on average, respectively.


Author(s):  
Manasa Jonnagadla

Abstract: Cloud computing provides streamlined tools for exceptional business efficiency. Cloud service providers typically offer two types of plans: reserved and on-demand. Restricted policies provide low-cost long-term contracting, while order contracts are expensive and ready for short periods. Cloud resources must be delivered wisely to meet current customer demands. Many current works rely on low-cost resource-reserved strategies, which may be under- or over-provisioning. Resource allocation has become a difficult issue due to unfairness causing high availability costs and cloud demand variability. That article suggests a hybrid approach to allocating cloud services to complex customer orders. The strategy was built in two stages: accommodation stages and a flexible structure. By treating each step as an optimization problem, we can reduce the overall implementation cost while maintaining service quality. Due to the uncertain nature of cloud requests, we set up a stochastic Optimization-based approach. Our technique is used to assign individual cloud resources and the results show its effectiveness. Keywords: Cloud computing, Resource allocation, Demand


Author(s):  
Mauricio Paletta

From birth to death, every human being leaves a long medical history consisting of laboratory exams, records of medical consultations, records, and hospitalizations, as well as any other important information that affects the patient's health. These are known today as Electronic Health Records (EHR) or Electronic Medical Records (EMR). However, because a person's lifestyle and health are continuously changing, most of this medical information is distributed among different institutions, cities, and even countries where the specific processes were undertaken, in possession of health insurance providers or even hidden inside a drawer of the patient's home. Therefore, aiming to enhance the availability of improved medical services at reduced costs, modern information technology is being increasingly used in the healthcare sector. Researchers, developers, and companies have made efforts to develop mobile, Web, desktop, and enterprise e-health applications raising the importance of interoperability and data exchange between e-health applications and Health Information Systems (HIS). In this regard, Cloud Computing (CC) promises low cost, high scalability, availability, and disaster recoverability, which can be a natural solution for some of the problems faced in storing and analyzing EMRs. However, CC, which is mainly defined to address the use of scalable and often virtualized resources, is still evolving. New, specific collaboration models among service providers are needed for enabling effective service collaboration, allowing the process of serving consumers to be more efficient. In this chapter, the current state and trends of CC in healthcare are presented as well as a detailed collaboration model based on intelligent agents focusing on the EHR sharing subject. This model for enabling effective service in cloud systems is based on a recent research proposal related to defining a collaboration mechanism by means of Scout Movement. The chapter also includes details on the way in which services and service providers are clearly defined in this particular system.


To understand the importance of secure anonymous system technologies, this chapter introduces communication, electronic payment, cloud computing, and electronic governance systems as their applications, and discusses roles of secure anonymous system technologies in these systems. To preserve privacies of individuals and to protect secrets of organizations, communication systems must enable users to send or receive messages without disclosing their identities even to managers of communication networks and receivers or senders of their messages, and credit card systems must enable cardholders to make their purchases without disclosing their identities while ensuring card companies to collect their exact expenditure amounts. Also, service providers in cloud computing must be able to calculate various functions of data owned by their clients without knowing values of individual data. Moreover, to protect voters from coercers who are forcing the voters to choose their supporting candidates, computerized voting systems must conceal correspondences between voters and their votes even from voters themselves. Secure anonymous system technologies enable developments of systems that satisfy these requirements.


Sign in / Sign up

Export Citation Format

Share Document