scholarly journals Factors affecting Cloud Computing adoption in Higher Learning Institutions in South Africa: A case of Matjhabeng TVET Colleges

Author(s):  
Dina Moloja ◽  
Ephias Ruhode

Cloud Computing is one of the most important trends and newest area in the field of information technology in which resources (e.g. CPU and storage) can be leased and released by customers through the Internet in an on-demand basis. The adoption of Cloud Computing in Higher Learning Institution is a real opportunity. Although Cloud computing has gained popularity in the world especially in education and industry, but its impact in colleges is still unexplored. This exploratory qualitative research seeks to identify the factors affecting the adoption of Cloud Computing in South Africa, focusing on Matjhabeng TVET colleges. 35 IT stakeholders from two TVET colleges was interviewed. Thematic analysis was utilised to analase data. After data was analysed, the findings revealed that data security, lack of internet access and lack of infrastructure resources are key factors that affects Cloud computing adoption in Matjhabeng TVET colleges. This paper contributes to the literature on Cloud Computing adoption in Higher Learning Institutions in South Africa.

2019 ◽  
Vol 38 ◽  
pp. 225-246 ◽  
Author(s):  
Kenndy Njenga ◽  
Lalit Garg ◽  
Amit Kumar Bhardwaj ◽  
Vijay Prakash ◽  
Seema Bawa

2016 ◽  
pp. 307-334 ◽  
Author(s):  
Ishan Senarathna ◽  
Matthew Warren ◽  
William Yeoh ◽  
Scott Salzman

Cloud Computing is an increasingly important worldwide development in business service provision. The business benefits of Cloud Computing usage include reduced IT overhead costs, greater flexibility of services, reduced TCO (Total Cost of Ownership), on-demand services, and improved productivity. As a result, Small and Medium-Sized Enterprises (SMEs) are increasingly adopting Cloud Computing technology because of these perceived benefits. The most economical deployment model in Cloud Computing is called the Public Cloud, which is especially suitable for SMEs because it provides almost immediate access to hardware resources and reduces their need to purchase an array of advanced hardware and software applications. The changes experienced in Cloud Computing adoption over the past decade are unprecedented and have raised important issues with regard to privacy, security, trust, and reliability. This chapter presents a conceptual model for Cloud Computing adoption by SMEs in Australia.


2016 ◽  
Vol 14 (3) ◽  
pp. 650-656
Author(s):  
Elsie Skeni Monkwe ◽  
Solly Matshonisa Seeletse

The use of temporary workers by organizations is growing, and has extensively extended to higher learning institutions (HLIs). This paper discusses the challenges of fixed term contract administrative and professional employees (FTC A/Ps) in Gauteng Provinces’ HLIs in South Africa. The research methodology used was exploratory. Surveys were used to collect data. The study sample consisted of 107 FTC A/Ps. Primary data were collected using a questionnaire. Text data were analyzed using the thematic content analysis of qualitative design. The study revealed that the HLIs did not provide training to the FTC A/Ps, but required them to perform as if they were trained. The FTC A/Ps were not getting employee benefits, were abused, underpaid, lacked privileges, lacked morale, could be dismissed any time, were driven to lose trust on managers and to be disloyal to their HLIs. They sometimes caused unscheduled turnover. Their commitment to work diminished. Still, they were bound to increase their productivity under punitive working conditions. The study recommends involving of FTC A/Ps when necessary, and not to abuse them. This also includes possibilities of integrating them in the HLI workforce, but to put proper precautionary measures when empowering them. Keywords: abuse, fixed term contract, higher learning institutions, roll over. JEL Classification: J71, J81, J82


2019 ◽  
pp. 249-263 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2019 ◽  
pp. 211-225
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


2020 ◽  
Vol 2020 ◽  
pp. 1-7
Author(s):  
Shaoming Jin ◽  
Xiao Ning ◽  
Jin Cao ◽  
Yaonan Wang

Food safety remains a matter of great concern in most countries and the composition in food is crucial to food safety. It is very important to make sense of the quality and change of food ingredients. In this research, the change of γ-butyrolactone (GBL), one kind of food additive in beverage, had been evaluated by nuclear magnetic resonance (NMR) technique. The 1H-NMR results of seven beverages covering various kinds with spiked GBL indicated that GBL was transformed into dangerous γ-hydroxybutyric acid (GHB) in six popular beverages under certain conditions which could happen during transportation and storage. Further results of quantitative 13C-NMR showed that pH and temperature were two key factors affecting the transforming degree of GBL to GHB. Lower pH and higher temperature will increase the degree of transformation. GHB was a neurotransmitter on the chemical control list, which was absolutely forbidden to be added to food. This nondestructive NMR detecting technology which did not need the complex pretreatment method to directly determine food ingredients can be useful for identifying the risk of food safety from the changes of food composition during transport and storage.


Sign in / Sign up

Export Citation Format

Share Document