Risks of Critical Infrastructure Adoption of Cloud Computing by Government

2020 ◽  
Vol 10 (3) ◽  
pp. 47-58
Author(s):  
Mansoor Al-Gharibi ◽  
Matthew Warren ◽  
William Yeoh

The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.

2018 ◽  
Vol 6 (4) ◽  
pp. 39-47 ◽  
Author(s):  
Reuben Ng

Cloud computing adoption enables big data applications in governance and policy. Singapore’s adoption of cloud computing is propelled by five key drivers: (1) public demand for and satisfaction with e-government services; (2) focus on whole-of-government policies and practices; (3) restructuring of technology agencies to integrate strategy and implementation; (4) building the Smart Nation Platform; (5) purpose-driven cloud applications especially in healthcare. This commentary also provides recommendations to propel big data applications in public policy and management: (a) technologically, embrace cloud analytics, and explore “fog computing”—an emerging technology that enables on-site data sense-making before transmission to the cloud; (b) promote regulatory sandboxes to experiment with policies that proactively manage novel technologies and business models that may radically change society; (c) on the collaboration front, establish unconventional partnerships to co-innovate on challenges like the skills-gap—an example is the unprecedented partnership led by the Lee Kuan Yew School of Public Policy with the government, private sector and unions.


2021 ◽  
Vol 21 ◽  
pp. 1-8
Author(s):  
Than Bahadur Chhetri

The Rule of law, a set of principles of governance, apply to all individuals, organizations and the government itself. Democracy is a political system governed by the rule of law. No rule of law means no democratic future. This paper aims to assess the state of the rule of law under the new political setup, taking the rule of law as dependent variable and fundamental rights, corruption, open parliament and independent judiciary as independent variables. To measure the rule of law, necessary information was collected from printed and online sources. A federal democratic republic can grow healthy only when there exists the rule of law and efficient state institutions. The fundamental problems in strengthening the rule of law obstructed by the tendency of personalization and frequent intervention in state institutions, high level of corruption at policy level, poor legislative bill formulation, the controversial appointing process of the judges and the political dominations. The acceptance of international norms to address the justice and to promote human rights, adhering to the principle of inclusion and equality, maintaining transparency rule in the appointment in various constitutional bodies and keeping out of executive influence to maintain impartial and independent institutions can help in strengthening the rule of law. 


2018 ◽  
Vol 14 (4) ◽  
pp. 64-77 ◽  
Author(s):  
Mohammed Banu Ali ◽  
Trevor Wood-Harper ◽  
Mostafa Mohamad

The aim of this article was to provide evidence pertaining to cloud computing (CC) adoption in education, namely higher education institutions (HEIs) or Universities. A systematic literature review (SLR) of empirical studies exploring the current CC adoption levels in HEIs and the benefits and challenges for using CC in HEIs was performed. A total of 20 papers were included in the SLR. It was discovered that a number of universities have a keen interest in using CC in their institution, and the evidence indicates a high level of successful CC adoption in the HEIs reviewed in the SLR. In conclusion, the SLR identified a clear literature gap in this research area: there exists limited empirical studies focusing on CC utilisation in HEIs.


Author(s):  
Yin Myo Kay Khine Thaw ◽  
Myo Ma Ma ◽  
Khin Myat New Win

Cloud Computing is the most advanced technical platform for next generation. Cloud Computing provide us a large range of data storage space in web source. Cloud Computing work automatically as per the need of user we don’t need to do extra work on it. High level applications and game is run by Cloud Computing. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. Cloud Computing cover the wide range of areas. It provides its service through online net connection. The data can be anything such as music, files, images, documents, and more. The user can access the data from anywhere just with the help of an internet connection. To use cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as the capacity of the server, internet speed, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and we also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems.


2019 ◽  
Vol 3 (02) ◽  
pp. 42-47
Author(s):  
Noor Hazwani Mohamad Puad ◽  
Asma Md Ali ◽  
Mohd Adam Suhaimi ◽  
Husnayati Hussin

The objective of this study is to discover the perspectives of cloud providers towards cloud computing adoption in Malaysia in terms of the challenges faced by cloud providers and reasons for the adoption. Data were collected through semi structured interviews with three cloud providers. The findings indicated security concern, difficulties in learning cloud computing infrastructure, changes in IT roles, high cost of bandwidth and life span of IT equipment as challenges faced by cloud providers in providing cloud service in Malaysia. This study also discovered cloud scalability, end-to-end management, high level security, and customizable as the reasons on cloud computing adoption. The findings of this study help people to understand more about the current situation of cloud computing adoption in Malaysia. Keywords—cloud adoption, cloud computing, cloud providers, Malaysia.


Author(s):  
Mohammed Banu Ali ◽  
Trevor Wood-Harper ◽  
Mostafa Mohamad

The aim of this article was to provide evidence pertaining to cloud computing (CC) adoption in education, namely higher education institutions (HEIs) or Universities. A systematic literature review (SLR) of empirical studies exploring the current CC adoption levels in HEIs and the benefits and challenges for using CC in HEIs was performed. A total of 20 papers were included in the SLR. It was discovered that a number of universities have a keen interest in using CC in their institution, and the evidence indicates a high level of successful CC adoption in the HEIs reviewed in the SLR. In conclusion, the SLR identified a clear literature gap in this research area: there exists limited empirical studies focusing on CC utilisation in HEIs.


Author(s):  
Didik Sudyana ◽  
Nora Lizarti ◽  
Erlin Erlin

Cloud Computing is one of the technologies that continue to develop and progress in rapid adoption rates due to the various benefits and conveniences offered. Cloud Computing has four types of adoption models, one of which is a Private model and is widely adopted by users because it is safer and customizable. The high level of cloud computing adoption is an opportunity for criminals to use cloud computing in committing their crimes and requires handling digital forensics. However, each cloud model has different characteristics, so the investigative method used is also different. Then there is no specific guidance for investigating cloud computing. So it is necessary to analyse the investigation of private cloud computing that used OwnCloud from the server-side and develop the novel investigation framework based on SNI 27037: 2014. An analysis of investigations is performed to develop the novel investigation framework and to find out what evidence can be found based on the novel framework. The results of the research conducted can be a reference for investigators to conduct forensic investigations in cloud computing on the server-side and the novel investigation framework will become a reference to be used as a guide to the investigation on private cloud computing in the server-side.


Author(s):  
G.I. AVTSINOVA ◽  
М.А. BURDA

The article analyzes the features of the current youth policy of the Russian Federation aimed at raising the political culture. Despite the current activities of the government institutions in the field under study, absenteeism, as well as the protest potential of the young people, remains at a fairly high level. In this regard, the government acknowledged the importance of forming a positive image of the state power in the eyes of young people and strengthen its influence in the sphere of forming loyal associations, which is not always positively perceived among the youth. The work focuses on the fact that raising the loyalty of youth organizations is one of the factors of political stability, both in case of internal turbulence and external influence. The authors also focus on the beneficiaries of youth protests. The authors paid special attention to the issue of forming political leadership among the youth and the absence of leaders expressing the opinions of young people in modern Russian politics. At the same time, youth protest as a social phenomenon lack class and in some cases ideological differences. The authors come to the conclusion that despite the steps taken by the government and political parties to involve Russian youth in the political agenda, the young people reject leaders of youth opinion imposed by the authorities, either cultivating nonparticipation in the electoral campagines or demonstrating latent protest voting.


Sign in / Sign up

Export Citation Format

Share Document