Date of this Version
Abbadi, I.M. and Martin, A. (2011). Trust in the Cloud. Information Security Technical Report,
Abdulsalam, G. & Fatima, Z (2011) “Cloud Computing: Solution to ICT in Higher Education in
Nigeria”, Pelagia Research Library Communications of the ACM, Vol. 51 p. 9-11.
Agarwal, A. and Agarwal, A. (2011). The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257-259
Armbrust, M. Fox, A, Griffith, R. Joseph, D. A. Katz, R. Konwinski, (2009) A. Above the clouds: A Berkeley View of cloud computing.
Bisong, A. and Rahman, S.S.M. (2011). An Overview of the Security Concerns in Enterprise
Cloud Computing. International Journal of Network Security & Its Applications, 3(1),
Bryman, Awino (2011).Business research methods. Third edition Oxford: Oxford
Cohen, L, Manion, L & Morrison, K 2007, Research methods in education (6th Ed.). London:
Creswell, J, & Clark, V 2007, Designing and conducting mixed methods research. Thousand
Oaks: Sage Publications.
Grossman, R.L. (2009). The Case for Cloud Computing. IT Professional [Electronic], 11(2), pp.23–27.
Hashizume et al. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), 1-13.
Khan, M & Malluhi, Q, 2010, Establishing trust in cloud computing, IT Professional Magazine,
Khorshed, T.M., Ali, A.B.M.S. and Wasimi, S.A. (2012). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future
Generation Computer Systems, 28, 833–851.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A. (2011).Cloud computing — The business perspective. Decision Support Systems, 51, 176–189.
Mircea, M. & Andreescu, A. J. (2011). “Using Cloud Computing in Higher Education: A strategy
to improve agility in the current financial crisis”, Academy of Economic Studies, Bucharest, Romania.
Mugenda, O. M. and Mugenda, A. G. (2003).Research methods: quantitative and qualitative approaches. Nairobi. Acts press.
Mugenda, O. M. and Mugenda, A. G. (2008).Research methods: quantitative and qualitative approaches. Nairobi. Acts press
Omwansa, T, Timothy, W & Brian, O 2013, Cloud Computing in Kenya, A 2013 Baseline Survey
Pearson, S & Benameur, A 2010, Privacy, Security and Trust issues arising from cloud computing,
2nd IEEE international conference on Cloud Computing Technology and Science.
Ryan, P. and Falvey, S. (2012). Trust in the clouds. Computer Law and Security Reviews, 28, 513-521.
Roberts, J & Al-Hamdani, W 2011, “Who Can You Trust in the Cloud? A Review of Security
Issues within Cloud Computing”, Information Security Curriculum Development
Conference 2011, ACM, 15-19.
Schyff, K & Krauss, K 2014, Higher education cloud computing in South Africa: Towards
understanding trust and adoption issues, SACJ, 55, 40-54.
Sekaran, U & Bougie, R, 2010, Research methods for business: A skill building approach. New
York: John Wiley & Sons.
Shelton, T 2013, Business models for the social mobile cloud, John Wiley & Sons.
Sun, D, Chang, G, Sun, L, & Wang, X, 2011, Surveying and Analyzing Security, Privacy and
Trust Issues in Cloud Computing Environments, Procedia Engineering, 15, 2852-2856,
Weinman, J 2012, Cloudonomics: The business value of cloud computing. New York: John Wiley
Zissis, D and Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28, 583–592.
Cloud computing is fast gaining a significant ground as a solution to offer institutions with competitive advantage compared to the old traditional Technology. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, the adoption level of cloud services is still very low in higher institutions of learning due to security issues, especially trust issues which remain a major concern over cloud solutions. The study was carried out in some selected public and private universities in sub Saharan Africa to determine the reason for the low cloud adoption by key stakeholders in higher institutions of learning. An adoption strategy was recommended with reference to the resources available, confidentiality, integrity and availability. The study recommended that cloud service providers should be transparent with their privacy policies with institutions of higher learning as this can influence cloud purchasing decisions. Secondly, there is the need for training IT personnel and to create awareness of the benefits of cloud computing to enable institutions of higher learning to adopt them to enhance their productivity.