To see the other types of publications on this topic, follow the link: Clod Adoption Models.

Journal articles on the topic 'Clod Adoption Models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Clod Adoption Models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Somanathan, Sureshkumar. "Building versus buying in cloud transformation: project management and security considerations." International Journal of Applied Engineering & Technology 5, S1 (2023): 81–90. https://doi.org/10.5281/zenodo.14942034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Athambawa, Aiman, Md Gapar Md Johar, and Ali Khathibi. "Secure cloud adoption model: novel hybrid reference model." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 936–43. https://doi.org/10.11591/ijeecs.v27.i2.pp936-943.

Full text
Abstract:
This article discusses research conducted to conceptualise a secure cloud adoption model. The study surveyed SMEs in the Sri Lankan information technology industry using a questionnaire to determine cloud computing adoption factors. The study used Rogers' diffusion of innovation (DOI), Tornatzky and Fleischer's technology-organization-environment (TOE) framework, Venkatesh and Bala's technology acceptance model 3 (TAM3), and Venkatesh, Thong, and Xu's Unified theory of acceptance and use of technology 2 (UTAUT2) as the theoretical foundation for evaluating the reference model. Two hundred and fifty-six key officials from information technology (IT) organisations in Sri Lanka participated in the survey. The study used quantitative data coding and analysis methods with the SPSS and AMOS softwares. The findings from previous research and existing technology adoption frameworks and models were summarised to support the secure cloud adoption model (SCAM).
APA, Harvard, Vancouver, ISO, and other styles
3

Agha, Ali Zaheer, Rajesh Kumar Shukla, Ratnesh Mishra, and Ravi Shankar Shukla. "Adoption of Cloud Enabling Cyber-Security Model in Organizations." Indian Journal Of Science And Technology 15, no. 48 (2022): 2727–39. http://dx.doi.org/10.17485/ijst/v15i48.1592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eid, Mustafa I. M., Ibrahim M. Al-Jabri, and M. Sadiq Sohail. "Selection of Cloud Delivery and Deployment Models." International Journal of Decision Support System Technology 10, no. 4 (2018): 17–32. http://dx.doi.org/10.4018/ijdsst.2018100102.

Full text
Abstract:
Research interests on cloud computing adoption and its effectiveness in terms of cost and time has been increasing. However, one of the challenging decisions facing management in adopting cloud services is taking on the right combinations of cloud service delivery and deployment models. A comprehensive review of literature revealed a lack of research addressing this selection decision problem. To fill this research gap, this article proposes an expert system approach for managers to decide on the right combination of service delivery and deployment model selection. The article first proposes a rule-based expert system prototype, which provides advice based on a set of factors that represent the organizational conditions and requirements pertaining to cloud computing adoption. Next, the authors evaluate the system prototype. Lastly, the article concludes with a discussion of the results, its practical implications, limitations, and further research directions.
APA, Harvard, Vancouver, ISO, and other styles
5

Aminu, Adamu Ahmed, and Adamu Saidu Alhaji. "Understanding determinants of cloud computing adoption: A review of technology adoption models." International Research Journal of Science, Technology, Education, and Management 2, no. 2 (2022): 226–41. https://doi.org/10.5281/zenodo.6955983.

Full text
Abstract:
The adoption and usage of cloud computing have become a competitive weapon for achieving organizational or business sustainability and maintaining a strategic position in a marketplace or in the eyes of its clients, even though it has been facing various impediments as a result of inadequate understanding of appropriate models to be applied and the users’ perception of CCA. Consequently, this study aims to investigate and analyze the current state of the literature on cloud computing adoption (CCA) with various technology adoption models in different areas. However, inappropriate models could not explain the factors determining the adoption determinants and little research attention has been paid to the adoption of cloud computing. For this reason, a systematic literature review (SLR) was employed; hence a total of 204 articles were shortlisted and scrutinized accordingly. Furthermore, a total of 40 articles were finally selected as the study samples. The four theoretical models were selected for this study, namely: Technology Organization and Environment (TOE), Technology Acceptance Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT), and Diffusion of Innovation (DOI). The findings of the study revealed that the TOE was the most adopted adoption model, followed by the DOI model. This study also identified 23 determinants of CCA that have been extracted from these four models as significant factors determining the adoption of cloud computing. Out of these determinants, security and privacy (SP) were found as the most dominant factors influencing CCA. SME is the major area where CCA has been used, especially from the year 2015 to 2020. There is a need to invest more in ICT in other sectors of the economy. 
APA, Harvard, Vancouver, ISO, and other styles
6

Pardeshi, Vaishali. "Architecture and Adoption Model for Cloud in Higher Education: Indian Perspective." Bonfring International Journal of Industrial Engineering and Management Science 4, no. 2 (2014): 43–47. http://dx.doi.org/10.9756/bijiems.4741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colin, Ting Si Xue1 Felicia Tiong Wee Xin2. "BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 1, December (2018): 01–15. https://doi.org/10.5281/zenodo.1436458.

Full text
Abstract:
The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Gharibi, Mansoor, Matthew Warren, and William Yeoh. "Risks of Critical Infrastructure Adoption of Cloud Computing by Government." International Journal of Cyber Warfare and Terrorism 10, no. 3 (2020): 47–58. http://dx.doi.org/10.4018/ijcwt.2020070104.

Full text
Abstract:
The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.
APA, Harvard, Vancouver, ISO, and other styles
9

Ifawoye, Olakunle Isaac, Binyamin Adeniyi Ajayi, Florence Nemariyi Chukwuemeka, and Omonayin Esther T. "Cloud Computing Adoption Models in Organizations: A Survey." International Journal of Research and Innovation in Applied Science IX, no. V (2024): 509–21. http://dx.doi.org/10.51584/ijrias.2024.905045.

Full text
Abstract:
An organization’s ability to implement innovations that provide it with a competitive edge and improve efficacy, reduce expenses, and raise the calibre of its business operations determines its competitiveness. With the advent of cloud computing (CC), the distribution of information technology (IT) resources and services has experienced a paradigm shift. The cloud computing adoption model is a logical set of stages built to ease the transition from today’s traditional application delivery model to tomorrow’s use of cloud computing it is an advanced approach for technologies of adoption of cloud which enables benefits to be realized incrementally. The Technology Acceptance Model (TAM) is an effective adoption hypothesis that has been applied in a lot of research studies in the IT industry. The model considers the reason for which a person uses a system or application, and it suggests that Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) serve as the primary drivers of IT adoption. TAM has demonstrated excellent adoption, use, and reproduction over time; nevertheless, the model did not provide crucial information on the user’s assumption to solely PU and PEOU. This constraint made it necessary to integrate or expand the model with other IT acceptance models. The Technology Organization Environment (TOE) framework puts forth a general list of adoption considerations for technology. Three contexts are examined under the TOE framework: technology, organization, and environment. While the meaning of the TOE system is also seen as clarifying technology adoption, TAM and its comprehensive forms have a high ability to clarify the reception of innovation. Combining these two models results in a newly designed and innovative redesign that advances and encourages more comprehensive, informative, and foresighted focal points of IT adoption by elevating the TAM and TOE models. Hence, the individual implementation or combination of the two models which harmonize the different components have been proposed by researchers. This paper presents a review of theories of cloud computing adoption and also discusses the challenges and possible solutions.
APA, Harvard, Vancouver, ISO, and other styles
10

Yoo, Seok-Keun, and Bo-Young Kim. "A Decision-Making Model for Adopting a Cloud Computing System." Sustainability 10, no. 8 (2018): 2952. http://dx.doi.org/10.3390/su10082952.

Full text
Abstract:
The use of big data, artificial intelligence, and new information and communication technologies has led to sustainable developments and improved business competitiveness. Until recently cloud services were classified as having special system requirements for a business organization, and was represented by different cloud computing architecture layers like infrastructure, platform, or software as a service. However, as the environment of IT services undergoes successive changes, companies have been required to reconsider their business models and consider adopting a cloud computing system, which can bring on business achievements and development. Regarding a decision-making model for adopting a cloud computing system, this paper analyzes critical variables in a hierarchical structure of decision areas: technology, organization, and environment, as well as seven factors and 23 attributes based on underlying decision factors of cloud computing adoption by AHP (Analytic Hierarchy Process) and Delphi analysis. Furthermore, this research explores a comparative analysis between demanders and providers of cloud computing adoption. Resultantly, this study suggests several important factors for adopting a cloud computing system: top management support, competitive pressure, and compatibility. From the demander side, the high priority factor was compatibility and competitive pressure; in contrast, related advantage and top management support were regarded as priority factors for providers to service their cloud computing systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Ali, Zaheer Agha, Kumar Shukla Rajesh, Mishra Ratnesh, and Shankar Shukla Ravi. "Adoption of Cloud Enabling Cyber-Security Model in Organizations." Indian Journal of Science and Technology 15, no. 48 (2022): 2727–39. https://doi.org/10.17485/IJST/v15i48.1592.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To carry out a systematic review on Cloud Computing (CC) security problems in order to suggest a cyber-security model for a secure CC environment.&nbsp;<strong>Methods:</strong>&nbsp;ResearchGate, PLOS One, MDPI, Wiley, Springer, Scopus, IEEE Xplore, IOP Conf. Series, and TechScience Press are used as sources in this research. Cloud security, risks to CC, issues with the current models, and the proposed model are among the significant keywords included in this article. Analysis and evaluation of the cloud computing security models have been conducted on the basis of factors like the technology used, authorization, security level, malicious insiders, VPN, encryption, etc.&nbsp;<strong>Findings:</strong>&nbsp;After doing comprehensive study of the previous models, it was analyzed that the client service provider&rsquo;s (CSP) are focusing on their own security but not of client&rsquo;s security. One problem is that there is no real set of standards to measure cloud security. Encryption key should be known to client only. Also, clients are not aware of security policies of CSPs. Furthermore, to overcome some issues certification programs should be there for CSPs so that clients are able to judge the CSPs according to their needs. Lastly, periodical awareness programs should be conducted for both CSP and client employees.&nbsp;<strong>Novelty:</strong>&nbsp;In this research a security model is proposed in which it is tried to implement solutions to various threats like hacking, unauthorized access of data, data encryption and authentication. It has proposed to develop a Cyber Security Model (CSM) for improvement of security features of cloud when it is used by organizations. In this study features like Single Sign-On for users to get proper authorization; key supervision is used for encryption of data and VPN controller is implemented to guard data from hackers have been added. <strong>Keywords:</strong> Cloud Computing; CyberSecurity; Cloud Security Challenges; Data Protection; Security Model
APA, Harvard, Vancouver, ISO, and other styles
12

Ali, Khaled E., Sherif A. Mazen, and Ehab E. Hassanein. "Assessment of cloud computing adoption models in e-government environment." International Journal of Computational Intelligence Studies 7, no. 1 (2018): 67. http://dx.doi.org/10.1504/ijcistudies.2018.090168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ali, Khaled E., Sherif A. Mazen, and Ehab E. Hassanein. "Assessment of cloud computing adoption models in e-government environment." International Journal of Computational Intelligence Studies 7, no. 1 (2018): 67. http://dx.doi.org/10.1504/ijcistudies.2018.10011249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chang, Victor I. C. "A Proposed Framework for Cloud Computing adoption." International Journal of Organizational and Collective Intelligence 6, no. 3 (2016): 75–98. http://dx.doi.org/10.4018/ijoci.2016070105.

Full text
Abstract:
This paper presents a review related to Cloud Computing focusing on Cloud business requirements. From the review the author recommends a number of methods managing Cloud services and evaluating its service performance, including the use of a pair of the Hexagon Models. Three organizational challenges of Cloud adoption are identified: (i) Organizational Sustainability; (ii) Portability and (iii) Linkage. The Cloud Computing Adoption Framework (CCAF) is designed to deal with these challenges by helping organizations to achieve good Cloud designs, deployment and services. How these three challenges are addressed by the CCAF is demonstrated using case studies. Services implemented by CCAF are reviewed using the Hexagon Models for comparison. This paper provides recommendations to help organizations, researchers and practitioners to understand Cloud business context, to measure their risk and return analysis, to migrate their services to Cloud from all types and to connect and integrate different services as a single service.
APA, Harvard, Vancouver, ISO, and other styles
15

Mounika, Kothapalli. "Cloud Computing Architectures: Comparing Service Models (IaaS, PaaS, SaaS) and Deployment Models (Public, Private, Hybrid, Community)- Uses and Trade-offs." Journal of Scientific and Engineering Research 5, no. 10 (2018): 334–41. https://doi.org/10.5281/zenodo.12798259.

Full text
Abstract:
Cloud computing has significantly changed the way organizations approach the software architecture. This paper focuses on three main service layers in cloud IaaS, PaaS and SaaS along with various deployment models (public, private, hybrid and community). As there are several options it is important to understand the differences for any organization to make well informed decision while migrating to the cloud. This paper also discusses the factors that determine adoption of the appropriate service as per the needs of the organization. Additionally, discussed the upcoming trends in cloud computing along with the convergence of cloud computing with artificial intelligence and machine learning. The main purpose of this paper is to help enterprises develop a cloud strategy that aligns with business objectives.
APA, Harvard, Vancouver, ISO, and other styles
16

Subbiah, Muthu Thevar. "Adoption of Cloud Computing in Higher Learning Establishment." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 910–16. https://doi.org/10.5281/zenodo.7502768.

Full text
Abstract:
Cloud computing is that the delivery of computing services&mdash;including servers, storage, databases, networking, software, analytics, and intelligence&mdash;over the web (&ldquo;the cloud&rdquo;) to supply quicker innovation, versatile resources, and economies of scale. The National Institute of Standards and Technology&rsquo;s (NIST) definition of cloud computing identifies 5 essential characteristics, 3 service models, and 4 readying models. Cloud-based education may be a style of distance learning that uses cloud computing technologies to deliver or facilitate academic services. It includes on-line courses, large Open on-line Courses (MOOCs), and flipped schoolrooms. Cloud computing adoption is that the method by that a personal or organization acquires the employment of a cloud computing service. Cloud pedagogy may be a style of teaching and learning that&#39;s expedited by cloud computing technologies.
APA, Harvard, Vancouver, ISO, and other styles
17

Marinho, Marlene, Vijay Prakash, Lalit Garg, Claudio Savaglio, and Seema Bawa. "Effective Cloud Resource Utilisation in Cloud ERP Decision-Making Process for Industry 4.0 in the United States." Electronics 10, no. 8 (2021): 959. http://dx.doi.org/10.3390/electronics10080959.

Full text
Abstract:
Cloud enterprise resource planning (C-ERP) represents an evolution of traditional ERP, which also offers the advantages of cloud computing (CC) such as ease of use and resource elasticity. This article presents the opportunities and challenges of the C-ERP adoption for industry 4.0 in the United States as well as the factors that boost or hinder such a decision. The quantitative research method is used to gather the predictor factors and correlation amongst them. An online survey questionnaire received 109 responses, mainly decision-makers and professionals from the US consumer goods industry. Statistical analysis has been carried out to rank the different levels of influence in the C-ERP adoption decision. The predictor’s complexity and regulatory compliance positively influence C-ERP private service deployment, whereas technology readiness is a good predictor of community service deployment. This paper also proposes a decision support system (DSS), tailored to industry 4.0, and aimed at assisting decision-makers in adopting C-ERP as an effective resource for decision-making. The DSS is built upon the predictors using the analytic hierarchy process (AHP) and it supports decision-makers in the selection of services and deployment models for C-ERP as a resource.
APA, Harvard, Vancouver, ISO, and other styles
18

Alaraj, Abdal Hafeth. "Advancing Cloud Adoption in the Saudi Public Sector: Challenges, Global Insights, and Strategic Policy Recommendations." European Scientific Journal, ESJ 21, no. 16 (2025): 41. https://doi.org/10.19044/esj.2025.v21n16p41.

Full text
Abstract:
Cloud computing has become a cornerstone of digital transformation strategies in the public sector, offering government entities scalable infrastructure, cost efficiency, and enhanced service delivery. In Saudi Arabia, adopting cloud technologies is a national priority aligned with Vision 2030, aiming to modernize government operations and increase digital agility. However, the transition to cloud environments within government institutions faces several challenges. This paper explores the key barriers to cloud computing adoption in Saudi Arabia's governmental sector. These include data governance concerns, cybersecurity requirements, organizational readiness gaps, and rigid procurement models. Through a comprehensive analysis of national frameworks and sector-specific studies, the paper uncovers the root causes of slow adoption and identifies opportunities for improvement. The study also draws comparative insights from global practices, offering lessons that can inform local strategies. Based on the findings, it proposes practical recommendations to support more effective cloud adoption in the Kingdom's public sector. These focus on governance enhancement, capacity building, policy alignment, and fostering a cloud-positive culture within institutions.
APA, Harvard, Vancouver, ISO, and other styles
19

Kumar, Devesh, Harsh Vardhan Samalia, and Piyush Verma. "Exploring suitability of cloud computing for small and medium-sized enterprises in India." Journal of Small Business and Enterprise Development 24, no. 4 (2017): 814–32. http://dx.doi.org/10.1108/jsbed-01-2017-0002.

Full text
Abstract:
Purpose The purpose of this paper is to evaluate the suitability of cloud computing for small and medium-sized enterprises (SMEs) in India. Design/methodology/approach Literature review is used to identify benefits, challenges, and factors concerning usage and adoption of cloud computing by SMEs. A conceptual framework was developed based on the existing theoretical models and factors identified from the literature. A survey based on questionnaire method was followed to collect data from 121 manufacturing SMEs in India. The conceptual framework was refined by using factor analysis, and multiple regression analysis was used to test the hypotheses. Findings Major benefits of cloud computing for SMEs include cost advantage, easy deployment process, easier access to latest information and communication technologies, automatic updates and upgrades, scalability, flexibility, and improved disaster recovery and back-up capabilities. The concern area includes perceived loss of control, vendor lock-in, security issues, reliability and availability issues, and internet connectivity and speed. The factors that are found significant include perceived benefits, top management support, competitive pressure, and perceived concerns. The model explained 73 percent of cloud computing adoption. Research limitations/implications The study is expected to make significant contribution toward body of knowledge pertaining to information technology adoption in SMEs. Practical implications The study is expected to provide SMEs an insight into real benefits and challenges associated with adopting cloud computing. The model can help SMEs in evaluating their readiness for adopting cloud computing and can ensure successful outcome of cloud computing adoption in SMEs. Providers are also going to be benefited through their enhanced understanding of SMEs’ requirements. Originality/value The proposed framework incorporates all the relevant factors including perceived benefits, perceived concerns, and other organizational and environmental factors to improve model’s predictive power.
APA, Harvard, Vancouver, ISO, and other styles
20

Shih, Tsui-Yii, and Cha-Wei Lin. "Cloud service adoption by firms in Taiwan." Information Development 33, no. 5 (2016): 495–511. http://dx.doi.org/10.1177/0266666916671985.

Full text
Abstract:
Cloud services have become a particular concern for modern industries and enterprises as they have been shown to change human behavior, and thereby necessitate the renewal of business models. This study proposes a conceptual model, and creates an integrated vision from the perspective of Taiwanese firms, investigating their intentions when adopting cloud services. Structural equation modeling (SEM) and fuzzy set qualitative comparative analysis (fsQCA) are both adopted in this study in order to analyze response data (n=214). The SEM analysis results present the service characteristics: the foundation and management characteristics offered by cloud services have significant positive effects on firm trust. Perceived innovation characteristics regarding cloud services have proven to have different effects on firms’ perceived usefulness. The study connects these research findings and contributes to the theoretical development and empirical application of trust theory and cloud service marketing strategies in both academia and practice.
APA, Harvard, Vancouver, ISO, and other styles
21

Khan, Muhammad Janas, Fasee Ullah, Muhammad Imran, et al. "Identifying Challenges for Clients in Adopting Sustainable Public Cloud Computing." Sustainability 14, no. 16 (2022): 9809. http://dx.doi.org/10.3390/su14169809.

Full text
Abstract:
Sustainable Cloud Computing is the modern era’s most popular technology. It is improving daily, offering billions of people sustainable services. Currently, three deployment models are available: (1) public, (2) private, and (3) hybrid cloud. Recently, each deployment model has undergone extensive research. However, relatively little work has been carried out regarding clients’ adoption of sustainable public cloud computing (PCC). We are particularly interested in this area because PCC is widely used worldwide. As evident from the literature, there is no up-to-date systematic literature review (SLR) on the challenges clients confront in PCC. There is a gap that needs urgent attention in this area. We produced an SLR by examining the existing cloud computing models in this research. We concentrated on the challenges encountered by clients during user adoption of a sustainable PCC. We uncovered a total of 29 obstacles that clients confront when adopting sustainable PCC. In 2020, 18 of the 29 challenges were reported. This demonstrates the tremendous threat that PCC still faces. Nineteen of these are considered critical challenges to us. We consider a challenge a critical challenge if its occurrence in the final selected sample of the paper is greater than 20%. These challenges will negatively affect client adoption in PCC. Furthermore, we performed three different analyses on the critical challenges. Our analysis may indicate that these challenges are significant for all the continents. These challenges vary with the passage of time and with the venue of publication. Our results will assist the client’s organization in understanding the issue. Furthermore, it will also help the vendor’s organization determine the potential solutions to the highlighted challenges.
APA, Harvard, Vancouver, ISO, and other styles
22

Kajiyama, Takahiko, Murray Jennex, and Theophilus Addo. "To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions." Information & Computer Security 25, no. 5 (2017): 634–59. http://dx.doi.org/10.1108/ics-07-2016-0051.

Full text
Abstract:
Purpose This paper aims to discover factors that are truly affecting cloud adoption decisions in organizations. Many reasons have been given for the adoption, or lack thereof, of the cloud. Design/methodology/approach The paper uses an empirical approach by means of an exploratory survey, using descriptive statistics and t-tests to determine significant differences among various response groups. Findings The findings reveal that current and prospective cloud users feel that public cloud computing is less secure than on premise systems. These users feel that the public cloud may still be currently too immature for mission-critical system deployments; however, they do expect it to be more secure in the future as the service models become more mature and better technologies become available. None of the cloud adoption risk factors were universally considered to be showstoppers with respect to adoption. Research limitations/implications The sample size is relatively small compared to the number of cloud participants. Additionally, respondents were concentrated in the high technology industries in Southern California. Originality/value The paper provides some valuable insight into cloud adoption and concludes that despite hyped security fears, the risks and threats of the cloud are well understood and that with proper planning and implementation, organizations can adopt cloud technologies with no additional risk.
APA, Harvard, Vancouver, ISO, and other styles
23

Srikanth, Kandragula, and Tanzeem Ali Arsha. "Cloud Service Models: IaaS, PaaS and SaaS." Journal of Scientific and Engineering Research 5, no. 4 (2018): 463–65. https://doi.org/10.5281/zenodo.14049975.

Full text
Abstract:
The rise of cloud computing has fundamentally transformed the landscape of IT infrastructure for businesses. Cloud computing offers a paradigm shift from traditional on- premises solutions, providing a range of flexible and scalable service models for accessing computing resources. However, navigating the different cloud service models can be a challenge. This paper delves into the three main cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). By exploring the distinct characteristics of each model, along with its advantages and considerations, businesses can make informed decisions about cloud adoption and select the model that best aligns with their specific requirements.
APA, Harvard, Vancouver, ISO, and other styles
24

Spruit, Marco. "Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1662–78. https://doi.org/10.3217/jucs-018-12-1662.

Full text
Abstract:
When IS/IT needs to be replaced, cloud systems might provide a feasible solution. However, the adoption process thus far has gone undocumented and enterprise architects are troubled with proper hands-on tools missing, until very recently. This single case study describes a large Dutch utility provider in their effort to understand the facets of the cloud and identifying the risks associated with it. In an action research setting, the SeCA model was used to analyse the cloud solutions and identify the risks with specific data classifications in mind. The results show how decision makers can use the SeCA model in various ways to identify the security risks associated with each cloud solution analysed. The analysis assumes that data classifications are in place. This research concludes that by using the SeCA model, a full understanding of the security risks can be gained on an objective and structural level; this is a further validation of prior empirical research that the SeCA model is a proper hands-on tool for cloud security analysis.
APA, Harvard, Vancouver, ISO, and other styles
25

Raihan, Sobhan. "The Concept of Cloud Accounting and its Adoption in Bangladesh." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1261–67. https://doi.org/10.5281/zenodo.3590951.

Full text
Abstract:
This paper discusses the theoretical concepts behind cloud accounting and its adoption in a developing country like Bangladesh. The field of accounting has improved significantly with the introduction of cloud computing. In cloud accounting, a client outsources the accounting services of the entity using the service of a third party vendor. There are three models of cloud accounting namely IaaS Infrastructure as a Service , PaaS Platform as a Service and SaaS Software as a Service . Cloud accounting is more cost effective, secure and flexible and, provides larger storage compared to traditional accounting. Although the number of clients using cloud accounting is increasing rapidly in the world, the developed countries are far ahead from developing countries in terms of using cloud services. Bangladesh, one of the N 11 countries, need to adopt the cloud accounting system for encouraging startups, generating employment and protecting the environment. This study provides a framework that can be used for the adoption of cloud accounting in the business sector of Bangladesh. In order to build a digital Bangladesh, the government should take possible steps to popularize cloud accounting system in Bangladesh. Raihan Sobhan &quot;The Concept of Cloud Accounting and its Adoption in Bangladesh&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24031.pdf
APA, Harvard, Vancouver, ISO, and other styles
26

OUAADI, Ismail, and Mohammed EL HADDAD. "Determinants Of Cloud Accounting Adoption Intention: The T.O.E, D.O.I and T.A.M. Models." Journal of Accounting Research, Organization and Economics 4, no. 3 (2021): 216–33. http://dx.doi.org/10.24815/jaroe.v4i3.21767.

Full text
Abstract:
Objective – Nowadays, Cloud Computing is a necessity and more than a trend for all or-ganizations, given the sensitive nature of financial information. This paper aims to determine the factors that impact the adoption intention of Cloud Accounting.Design/methodology – The approach adopted in this research is a quantitative method. It is based on a research model developed on the basis of three theoretical frameworks (TOE, DOI, and TAM) used to investigate the factors impacting the adoption intention of Cloud Ac-counting solutions by accounting professionals (with a total number of respondents of 96 and composed by chartered accountant, certified public accountant, and accountant).Results – The results of this study show that some variables have an impact on the inten-tion to adopt Cloud Accounting, such as the purpose of usage, motivation, remote reporting, and size of the firm, while other variables have no influence such as professional category and flexibility.Limitation/Suggestion – The major contributions of this work are: (1) The combina-tion of several theoretical frameworks; (2) The application in the field of organizational fi-nance which is very important in terms of business and sensitivity, and finally the highlight-ing of the factors leading to the adoption of Cloud Accounting.
APA, Harvard, Vancouver, ISO, and other styles
27

Harpreet Paramjeet Singh. "Beyond Perimeters: Zero Trust security models in distributed cloud architectures." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3545–53. https://doi.org/10.30574/wjarr.2025.26.2.1909.

Full text
Abstract:
This article presents the implementation of Zero Trust security models in distributed cloud environments, where traditional perimeter-based security proves inadequate against sophisticated cyber threats. The core architectural components necessary for effective Zero Trust deployment include continuous authentication mechanisms, least privilege access controls, and network micro-segmentation strategies. Critical implementation challenges relate to complexity, scalability, and user experience, with mitigation frameworks based on case studies across various industries. Emerging trends in Zero Trust evolution include the integration of artificial intelligence for behavioral analytics and adaptation for edge computing environments. The findings suggest that while Zero Trust adoption introduces significant organizational and technical hurdles, its systematic implementation provides substantial security benefits for distributed cloud infrastructures. The comprehensive framework offers security practitioners and cloud architects a structured approach to Zero Trust adoption, highlighting both immediate security advantages and long-term strategic considerations.
APA, Harvard, Vancouver, ISO, and other styles
28

Mala, Deep Upadhaya, Dahal Nilima, Byanju Sachin, Dahal Pranit, and Pokharel Manish. "Understanding the Factors Affecting the Intention to Adopt Cloud Technology among University Student of Nepal using Technology Acceptance Model." Recent Trends in Cloud Computing and Web Engineering 3, no. 1 (2021): 1–13. https://doi.org/10.5281/zenodo.4742058.

Full text
Abstract:
<em>One of the most crucial areas in developing technology-driven human resources is academia. Today, the use of cloud technology is burgeoning worldwide which will soon lead to the fortification of its application in academia as well. To understand the student&rsquo;s perception regarding the adoption of the cloud and the services available through it, a survey-based methodology along with Technology Acceptance Model was taken into account as a research model. n=90 responses were taken into consideration based on 5 points Likert scale and select the best answer among the total number of respondents. Based on statistical hypothesis and feature selection and it was found that among university students who study cloud as an academic course, students were more likely to adopt cloud technology with a P-value of 0.00019. It also shows that cloud-based learning can contribute to the acceptance of cloud technology if cloud education is provided early in the undergraduate program (P-value of 0.0017). On top of that, security and privacy (P-value of 0.00019) are also the factors for choosing the cloud. However, factors such as peer pressure and regulatory policies were excluded from consideration which might also influence cloud technology acceptance.</em>
APA, Harvard, Vancouver, ISO, and other styles
29

Athambawa, Aiman, Md Gapar Md Johar, and Ali Khathibi. "Secure cloud adoption model: novel hybrid reference model." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 936. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp936-943.

Full text
Abstract:
&lt;p&gt;This article &lt;span&gt;discusses research conducted to conceptualise a secure cloud adoption model. The study surveyed SMEs in the Sri Lankan information technology industry using a questionnaire to determine cloud computing adoption factors. The study used Rogers' diffusion of innovation (DOI), Tornatzky and Fleischer's technology-organization-environment (TOE) framework, Venkatesh and Bala's technology acceptance model 3 (TAM3), and Venkatesh, Thong, and Xu's Unified theory of acceptance and use of technology 2 (UTAUT2) as the theoretical foundation for evaluating the reference model. Two hundred and fifty-six key officials from information technology (IT) organisations in Sri Lanka participated in the survey. The study used quantitative data coding and analysis methods with the SPSS and AMOS softwares. The findings from previous research and existing technology adoption frameworks and models were summarised to support the secure cloud adoption model (SCAM).&lt;/span&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
30

Arshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.

Full text
Abstract:
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
31

Chirchir P. K, Muhambe T. M, and Obare E. O. "Towards Open-Source Cloud Adoption : Exploring the Determinants." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 484–90. http://dx.doi.org/10.32628/cseit24103120.

Full text
Abstract:
The trends in cloud computing development have become fundamental building blocks to many business information system models and innovations, the architects are designing cloud systems to be as effective and beneficial as possible. In this paradigm, open-source cloud platforms are part of the design philosophy that drives innovation in cloud services. The adoption of open-source cloud has become pervasive in the modern enterprise; this has been accelerated by perceived benefits of openness. The power in the community of developers and openness fosters development of hardened, secure and reliable solutions. These features enable a collaborative source code, modification and customization geared towards innovation with positive impact on the design, aligning perfectly with the dynamic nature of open-source cloud solutions. However, the slow adoption rate in the modern enterprises has been attributed to a lack of understanding of open-source cloud adoption. This study explores the determinants of open-source cloud adoption in the context of higher learning institutions. A deductive thematic analysis technique was utilized in the study.
APA, Harvard, Vancouver, ISO, and other styles
32

Maqueira-Marín, Juan Manuel, Sebastián Bruque-Cámara, and Beatriz Minguela-Rata. "Environment determinants in business adoption of Cloud Computing." Industrial Management & Data Systems 117, no. 1 (2017): 228–46. http://dx.doi.org/10.1108/imds-11-2015-0468.

Full text
Abstract:
Purpose The purpose of this paper is to analyze the influence of Technology Providers, Public Administrations and R&amp;D Institutions on Cloud Computing adoption. This research also considers Killer Applications and Success Cases as other environmental factors. Design/methodology/approach Factorial analyses and structural equation models were used on a sample of high-technology firms located in technological parks in Southern Europe, with more than ten employees and sustained investments in R&amp;D. Findings Results show that Technology Providers and Success Cases are determinant in Cloud Computing adoption. Moreover, Killer Applications are a forerunner for Success Cases. Practical implications An appropriate fit between the tools and resources provided by suppliers and the internal resources of the company is needed to create competitive advantages. Firms should evaluate Technology Providers, identify Success Cases to Cloud Computing adoption and implement technological benchmarking. Originality/value This study contributes to Cloud Computing adoption literature because it includes Technology Providers, Public Administrations and R&amp;D Institutions simultaneously as well as other variables as Killer Applications and Success Cases. The importance of the external agents on information technology (IT) adoption, especially when the technologies to be adopted are new and in an emergent stage, together with the lack of prior investigations focusing on specific environmental factors affecting the adoption of these new, emerging IT, justify the value of this research.
APA, Harvard, Vancouver, ISO, and other styles
33

Researcher. "CLOUD COMPUTING: A COMPREHENSIVE GUIDE TO MODERN INFRASTRUCTURE." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 701–13. https://doi.org/10.5281/zenodo.14222616.

Full text
Abstract:
This comprehensive article explores the evolving landscape of cloud computing, examining its fundamental characteristics, service models, deployment strategies, and future trends. The article investigates how cloud computing has transformed organizational IT infrastructure, enabling unprecedented scalability, cost efficiency, and operational agility. Through a detailed examination of various implementation models, including Infrastructure as a Service, Platform as a Service, and Software as a Service, the analysis reveals the significant impact across industries, from financial services to healthcare and manufacturing. The article encompasses emerging trends such as edge computing, artificial intelligence integration, and sustainable practices while addressing critical security, compliance, and integration challenges. Special attention is given to the adoption patterns of different deployment models - public, private, hybrid, and multi-cloud approaches - highlighting their benefits and implementation considerations.
APA, Harvard, Vancouver, ISO, and other styles
34

Perdana, Panji Arief, and Suharjito Suharjito. "Cloud Computing Impelementation Using Model Roadmap for Cloud Computing Adoption (ROCCA) on IT Consultant Industry." ComTech: Computer, Mathematics and Engineering Applications 8, no. 3 (2017): 145. http://dx.doi.org/10.21512/comtech.v8i3.3887.

Full text
Abstract:
The purpose of this research was to build cloud computing referring to Roadmap for Cloud Computing Adoption (ROCCA) model so that the best strategy could be implemented in PT Matrica Consulting Service. The implementation of cloud computing had five stages modifications ROCCA adoption model. Those stages were analysis, design, adoption, migration, and management. Data were taken from distributing questionnaires and conducted interviews with R&amp;D Manager and analyzed using SWOT analysis. The result is the implementation of cloud computing models, and implementation of private cloud and Software as a Service (SaaS) needs to be modified so it can be implemented properly. The implementation canincrease the performance PT Matrica Consulting Service based on the characteristics of the cloud which is flexible and secure to be accessed as long as it is connected to the Internet and maintained properly.
APA, Harvard, Vancouver, ISO, and other styles
35

Adwan, Ehab Juma, and Bader Ali Alsaeed. "Cloud Computing Adoption in the Financial Banking Sector- A Systematic Literature Review (2011-2021)." International Journal of Advanced Science Computing and Engineering 4, no. 1 (2022): 48–55. http://dx.doi.org/10.30630/ijasce.4.1.73.

Full text
Abstract:
Scholarly research works on the adoption of Cloud Computing (CC) have recently emerged with the technology’s importance for organizations at a fast pace. Despite the numerous advantages of CC adoption for financial institutions (FI) in terms of storage cost mitigation, computation higher increase, and information access higher access rates from any place, Banking’s CC adoption executives and practitioners are badly seeking to obtain trustworthy recipes of how to utilize CC adoption frameworks to transform banks operations to cloud. In this vein and based on a systematic literature review (SLR) method, we conducted a review of 370 empirical studies from 2011 to 2021, downsized the studies to 27 directly relevant papers to reveal 14 frameworks, methods, models, or strategies of CC adoption in Banking sectors in 14 countries, and compared the findings across studies in terms of the utilized frameworks, methods, models, or strategies.
APA, Harvard, Vancouver, ISO, and other styles
36

Ramzan, Muhammad, Muhammad Shaoib Farooq, Ammara Zamir, Waseem Akhtar, Mahwish Ilyas, and Hikmat Ullah Khan. "An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries." Engineering, Technology & Applied Science Research 8, no. 4 (2018): 3157–61. https://doi.org/10.5281/zenodo.1450643.

Full text
Abstract:
In the modern era companies seek the use of modern technologies in order to upgrade their infrastructure and enhance their business growth. The use of business intelligence, data science and cloud computing (CC) has become an integral part of business. Different factors play important role in the adoption of cloud services. An organization willing to adopt cloud services should consider them. This paper explores the factors and addresses the issues in implementing and deploying CC in telecom companies. In addition, this study also shares the benefits of utilizing CC which is a novel technical pattern which can change the use of different associations of information technology as a service. CC concentrates on the idea of definition, security problems, service models and infrastructures of its development. The important point is to analyze how this paradigm should be adopted in telecom industries and its results. This research study presents a comparative analysis of adaptation of CC by various telecom industries. The results identify certain limitations which also play their role for adaptation of CC in telecom companies.
APA, Harvard, Vancouver, ISO, and other styles
37

Abied, Osama, Othman Ibrahim, Siti Nuur-Ila Mat Kamal, et al. "Probing Determinants Affecting Intention to Adopt Cloud Technology in E-Government Systems." Sustainability 14, no. 23 (2022): 15590. http://dx.doi.org/10.3390/su142315590.

Full text
Abstract:
Adopting e-government services presents numerous challenges for governmental sectors in developing countries. These problems can fail some projects involving e-government. Therefore, a solution is required to address these problems. This paper presents a conceptual model and measurement to identify crucial factors that impact cloud computing technology in e-government to address the issues with e-government. According to the recent studies on technology adoption models, a theoretical model is proposed in this study. Extracting items from the literature and adapting them, creates the measurement scales for the proposed model’s structures. Through the use of face validity, pre-testing, and a pilot study, the authors confirm the scales’ content validity and reliability. The data used for this study were collected by the authors from 40 information technology IT professionals for the pilot study in the top 10 government departments in Libya who are responsible for many IT decisions in e-government. In this study, the authors first examine the reliability of the scale using Cronbach’s alpha and perform exploratory factor analysis to assess the scales’ validity. The data were analyzed using partial least squares structural equation modelling (PLS-SEM). The findings demonstrate that the scale measurements satisfy the standard requirements for the validity and reliability According to previous studies on cloud computing adoption from the IS perspectives, this paper theoretically provides a combination model for investigating the cloud-based implementation services to provide a more comprehensive model and the objective is to develop an empirical instrument for analyzing countries’ e-government adoption of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
38

Dr.A.Shaji, George. "The Cloud Comedown: Understanding the Emerging Trend of Cloud Exit Strategies." Partners Universal International Innovation Journal (PUIIJ) 02, no. 05 (2024): 1–32. https://doi.org/10.5281/zenodo.13993933.

Full text
Abstract:
The fast rise of cloud computing during the last decade promised flexibility, scalability, and cost-effectiveness. However, for an increasing number of businesses, the long-term realities of cloud computing are requiring significant rethinking. According to recent studies, 42% of US businesses have already moved at least half of their cloud workloads back on-premises or are planning to do so. The rising trend of "Cloud Exit" requires a thorough analysis of the cloud's disadvantages in comparison to its widely promoted benefits. Multiple critical variables are driving the shift away from total cloud reliance. Although transitioning to the cloud initially reduces building costs, subsequent operational expenses may ultimately surpass those of private data centers. A 2022 poll revealed that 43% of IT leaders perceive the expenses associated with transitioning to the cloud as exceeding their initial expectations. Companies often contend with overprovisioning and surplus resources, resulting in unnecessary expenses. Simultaneously, notable cloud breaches at Capital One, Twilio, and others heighten apprehensions regarding the storage of sensitive data externally. &nbsp;Outages at AWS, Azure, and Oracle underscore dependence hazards. The Cloud Exit trend points to the need of a more balanced viewpoint. Although early adoption rates of clouds are strong, current polls reveal just 32% of corporate cloud migrations are judged totally effective. The gap between the promised outcomes and real-world results suggests cloud computing has been overhyped. Its purported security, reliability, and cost advantages do not universally apply. Moreover, concentration among the "Big Three" cloud providers allows AWS, Azure, and Google inordinate influence over pricing, service terms, and the direction of innovation. Their supremacy and exclusive ecosystems progressively confine users, while unjustly disadvantaging third-party services. &nbsp;Consequently, an increasing number of firms are formulating Cloud Exit strategies to diminish external dependence, reclaim control, and manage dangers. The cloud necessitates ongoing assessment to maintain its competitive and financial viability over time, rather than being a universal solution. &nbsp;Preparedness to shift workloads off-cloud gives firms strategic flexibility. Rather than a one-way path, the cloud requires continuous reassessment. Exit is not failure, but strategic agility retaining on-premises control. With unchecked dependence, dominance and deviation from early claims, businesses are wise to temper cloud enthusiasm with realism. Maintaining hybrid flexibility and an exit strategy avoids innovation stagnation or lock-in. The cloud comedown does not negate its potential, only refocuses usage based on actual outcomes. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
39

Adwan, Ehab Juma, and Bader Ali Alsaeed. "Cloud Computing Adoption in the Financial Banking Sector- A Systematic Literature Review (2011-2021)." International Journal of Advanced Science Computing and Engineering 4, no. 1 (2022): 48–55. http://dx.doi.org/10.62527/ijasce.4.1.73.

Full text
Abstract:
Scholarly research works on the adoption of Cloud Computing (CC) have recently emerged with the technology’s importance for organizations at a fast pace. Despite the numerous advantages of CC adoption for financial institutions (FI) in terms of storage cost mitigation, computation higher increase, and information access higher access rates from any place, Banking’s CC adoption executives and practitioners are badly seeking to obtain trustworthy recipes of how to utilize CC adoption frameworks to transform banks operations to cloud. In this vein and based on a systematic literature review (SLR) method, we conducted a review of 370 empirical studies from 2011 to 2021, downsized the studies to 27 directly relevant papers to reveal 14 frameworks, methods, models, or strategies of CC adoption in Banking sectors in 14 countries, and compared the findings across studies in terms of the utilized frameworks, methods, models, or strategies.
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Dehua. "A Quantitative Method for Selection of Enterprise Cloud Computing Models." Journal of Systems Science and Information 4, no. 4 (2016): 365–78. http://dx.doi.org/10.21078/jssi-2016-365-14.

Full text
Abstract:
AbstractTargeting at methodological limitations in the decision-making of enterprise cloud computing adoption, this paper analyzes the main influence factors affecting enterprise cloud computing, builds up their hierarchical structures, and works out 8 key influence factors affecting cloud computing models, based on the structural model theory in system engineering. A quantitative method is provided for the selection of optimal or recommended enterprise cloud computing models, in terms of the relationship valuations among key influence factors, cloud computing models, and the factor weights for a specific enterprise.
APA, Harvard, Vancouver, ISO, and other styles
41

Habineza, Edson. "The Impact of Cloud Technology on Entrepreneurship in the Hospitality Industry." Journal of Hospitality and Tourism 4, no. 3 (2024): 21–32. http://dx.doi.org/10.47672/jht.2431.

Full text
Abstract:
Purpose: Cloud technology has significantly transformed modern business operations, particularly within the hospitality industry, by offering scalable, cost-effective, and flexible computing solutions. This paradigm shift has democratized access to advanced tools and services, thereby enhancing operational efficiency and competitive capability for entrepreneurs. This integrative paper examines the impact of cloud computing on entrepreneurship within the hospitality sector, focusing on operational efficiency, cost structures, scalability, and innovation. Materials and Methods: By employing the Resource-Based View (RBV) and Innovation Diffusion Theory (IDT), this integrative study provides a framework for understanding how cloud technology enhances competitive advantage and adoption patterns. Findings: Through a comprehensive review of literature and case studies, this study identifies and addresses critical research gaps, including the limited empirical evidence on the long-term effects of cloud technology on business growth, sustainability, and competitive advantage. It also highlights the need for further exploration of regional differences in cloud technology adoption, particularly in emerging markets, and underscores the insufficient exploration of security and privacy concerns, advocating for more detailed research on cloud security models. Moreover, the study seeks to bridge gaps in understanding how cloud technology drives innovation in service delivery and customer experience. Implications to Theory, Practice and Policy: Policy contributions from this study include recommending targeted guidelines for secure cloud adoption, strategies for addressing regional disparities in cloud technology implementation, and policy frameworks that support innovation while safeguarding data privacy. Recommendations for entrepreneurs include strategically adopting cloud solutions, investing in staff training, and continuously monitoring cloud-related expenses. This study ultimately contributes to a nuanced understanding of cloud technology’s role in shaping entrepreneurial practices and policies within the hospitality sector.
APA, Harvard, Vancouver, ISO, and other styles
42

Vikas, Kulkarni. "Zero Trust Security in Cloud Banking a Framework for Financial Institutions." International Journal of Leading Research Publication 5, no. 3 (2024): 1–12. https://doi.org/10.5281/zenodo.15051169.

Full text
Abstract:
Zero Trust Security is an essential paradigm shift for financial institutions moving towards cloud-based infrastructures. This paper presents a structured framework tailored for the banking sector, ensuring compliance with financial regulations and protecting critical assets against evolving cyber threats. Key Zero Trust principles, architectural considerations, implementation details, and real-world applications in banking environments are explored. Challenges in adoption and future research directions are also discussed. Unlike traditional security models that rely on perimeter defenses, Zero Trust enforces strict identity verification, micro segmentation, and least privilege access. Financial institutions must implement continuous authentication, adaptive risk assessment, and robust encryption mechanisms to mitigate insider threats and sophisticated cyberattacks. By integrating Zero Trust with cloud-native security controls, banks can enhance data confidentiality, integrity, and availability. This paper provides a comprehensive roadmap for adopting Zero Trust strategies while addressing compliance requirements such as PCI-DSS, FFIEC, and ISO 27001 [1, 3].
APA, Harvard, Vancouver, ISO, and other styles
43

Kannan, Aadharsh, Jacob LaRiviere, and R. Preston McAfee. "Characterizing the Usage Intensity of Public Cloud." ACM Transactions on Economics and Computation 9, no. 3 (2021): 1–18. http://dx.doi.org/10.1145/3456760.

Full text
Abstract:
This article uses precise and novel data on country-level Cloud IaaS and PaaS revenue to measure the intensive margin of technology diffusion across countries and within countries over time. We horse race diffusion models and find that cloud diffusion exhibits both Log-Log and Logistic Growth patterns. We use cross validation on nearly 100 features to determine what correlates with cross-country differences. We find that increases in features impacting Gross Domestic Product, Internet Connectivity, and Human Capital are associated with increases in intensity of cloud adoption. We finally compare the relative impacts of these variables using a random coefficients model. Although correlative, our algorithmic research design motivates data-driven hypothesis generation and further causal work regarding how policymakers can encourage more cloud computing adoption and technology adoption more broadly.
APA, Harvard, Vancouver, ISO, and other styles
44

Christoforou, Andreas, and Andreas S. Andreou. "Investigating Cloud Adoption Using Influence Diagrams as a Decision Support Model." International Journal on Artificial Intelligence Tools 24, no. 06 (2015): 1560005. http://dx.doi.org/10.1142/s0218213015600052.

Full text
Abstract:
The fact that Cloud Computing is steadily becoming one of the most significant fields of Information and Communication Technology (ICT) has led many organizations to consider the benefits of migrating their business operations to the Cloud. Decision makers are facing strong challenges when assessing the feasibility of the adoption of Cloud Computing for their organizations. Cloud adoption is a multi-level decision which is influenced by a number of intertwined factors and concerns thus characterizing it as a complex and difficult to model real-world problem. In this paper we propose two decision support modeling approaches based on Influence Diagrams (ID) aiming to model the answer to the question “Adopt Cloud Services or Not?” Two models are developed and tested, the first is a generic ID with nodes interacting in a probabilistic manner, while the second is a more flexible version that utilizes Fuzzy Logic. Both models combine several factors that influence the decision to be taken, which were identified through literature review and input received from field experts. The proposed approaches are validated using five experimental scenarios, two synthetic and three real-world cases, and their performance suggests that they are highly capable of supporting the right decision.
APA, Harvard, Vancouver, ISO, and other styles
45

Truong, Dothang. "Efficiency and Risk Management Models for Cloud-Based Solutions in Supply Chain Management." International Journal of Business Analytics 2, no. 2 (2015): 14–30. http://dx.doi.org/10.4018/ijban.2015040102.

Full text
Abstract:
Cloud computing has been proven to have numerous benefits for organizations, especially in supply chain management. More and more organizations have adopted cloud-based solutions to be their primary sourcing applications. Nevertheless, this technology is not without challenges, and in order to deploy and implement cloud-based solutions successfully with minimal risks organizations need to have practical guidance on this emerging technology. Despite the rapid growth of cloud computing in supply chain areas, the existing literature is still conceptual, inadequate, and mainly focused on the pre-adoption stage of this technology. This research examines the post-adoption stage of cloud-based supply chain solutions from the decision science perspective and intends to provide organizations with practical guidance on how to ensure the efficiency of a cloud-based supply chain system and control risks associated with cloud-based solutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Farenjuk, N. "THE PERSPECTIVE ON THE CURRENT STATE OF CLOUD SOLUTIONS FOR DIGITAL BANKS." Bulletin of Taras Shevchenko National University of Kyiv. International relations, no. 2 (56) (2022): 56–60. http://dx.doi.org/10.17721/1728-2292.2022/2-56/56-60.

Full text
Abstract:
This article examines the current state of cloud solution adoption across banking industry. While the advantages of using cloud are clear, this process introduces new challenges and risks. Considering security as the most important obstacle to cloud adoption for bank institutions, it's highlighted the specific of operation cloud models more suitable to meet the needs of digital banks. The reasons for migration of core workloads to the cloud are also outlined. It reflects the increasing impact of cloud technology on the modern business models across banking industry in the new digital economy.
APA, Harvard, Vancouver, ISO, and other styles
47

Satheesh, Reddy Gopireddy. "Privacy-Aware Federated Data Sharing Models for Healthcare Cloud Systems." Journal of Scientific and Engineering Research 6, no. 12 (2019): 324–27. https://doi.org/10.5281/zenodo.14096825.

Full text
Abstract:
With the rapid adoption of cloud technologies in healthcare, data sharing has become essential for advancing research, diagnostics, and patient outcomes. However, sharing sensitive health information across organizations introduces significant privacy risks, requiring strict adherence to regulations such as HIPAA and GDPR. Federated learning offers a solution by enabling data sharing without centralized data aggregation, thus preserving privacy. This paper investigates privacy-aware federated data sharing models tailored for healthcare cloud systems, highlighting their benefits, challenges, and practical applications. By leveraging techniques such as differential privacy, secure multi-party computation, and homomorphic encryption, federated models enhance collaboration among healthcare entities while ensuring data security and regulatory compliance.
APA, Harvard, Vancouver, ISO, and other styles
48

T., Vaikunth Pai, and P. S. Aithal Dr. "A REVIEW ON SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING MODEL OF RESOURCE MANAGEMENT." International Journal of Engineering Research and Modern Education 2, no. 1 (2017): 65–70. https://doi.org/10.5281/zenodo.546323.

Full text
Abstract:
Cloud computing services refer to set of IT-enabled services delivered to a customer as services over the Internet on a leased basis and have the capability to extend up or down their service requirements or needs. Usually, cloud computing services are delivered by third party vendors who own the infrastructure. It has several advantages include scalability, elasticity, flexibility, efficiency and outsourcing non-core activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. Being a model for enabling convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services, cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Despite many benefits of cloud computing, the organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security is one of the major issues which hinder the growth of cloud computing service model. The idea of handing over confidential data to third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. This paper reviews the security issues and the challenges in the adoption and management of cloud computing services in an organization.
APA, Harvard, Vancouver, ISO, and other styles
49

Brandao, Pedro Ramos. "Computer Forensics in Cloud Computing Systems." Budapest International Research in Exact Sciences (BirEx) Journal 1, no. 1 (2019): 71–86. http://dx.doi.org/10.33258/birex.v1i1.141.

Full text
Abstract:
The challenges on traditional Computer Forensic mythology in facing with the growing adoption of Cloud Computing services and models by corporations and organizations. We analyse the results of recent research in analysis of computers’ physical memory, new methodologies and tools, and how these technologies can be applied to computer forensics in this specific context.
APA, Harvard, Vancouver, ISO, and other styles
50

Godwin Nzeako and Rahman Akorede Shittu. "Implementing zero trust security models in cloud computing environments." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 1647–60. https://doi.org/10.30574/wjarr.2024.24.3.3500.

Full text
Abstract:
In today’s rapidly evolving digital landscape, the adoption of cloud computing has fundamentally reshaped how organizations manage, store, and secure data. While cloud infrastructures offer scalability, flexibility, and resource efficiency, they also introduce complex security challenges. Traditional perimeter-based security models fall short in the face of these new threats, necessitating a paradigm shift towards the Zero Trust Security (ZTS) model. This model enforces strict access controls, continuous monitoring, and assumes no inherent trust within or outside the network. This paper offers an extensive exploration of Zero Trust in cloud computing environments, delving into its principles, architecture, implementation strategies, challenges, and anticipated future developments. Through a mix of theoretical discussion, technical frameworks, and real-world case studies, the study aims to provide a robust roadmap for organizations aspiring to adopt Zero Trust models in cloud infrastructures, achieving a balance between security and operational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!