Libraries at University of Nebraska-Lincoln

 

Date of this Version

Summer 6-11-2019

Citation

Abbadi, I.M. and Martin, A. (2011). Trust in the Cloud. Information Security Technical Report,

16, 108-114.

Abdulsalam, G. & Fatima, Z (2011) “Cloud Computing: Solution to ICT in Higher Education in

Nigeria”, Pelagia Research Library Communications of the ACM, Vol. 51 p. 9-11.

Agarwal, A. and Agarwal, A. (2011). The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257-259

Armbrust, M. Fox, A, Griffith, R. Joseph, D. A. Katz, R. Konwinski, (2009) A. Above the clouds: A Berkeley View of cloud computing.

Bisong, A. and Rahman, S.S.M. (2011). An Overview of the Security Concerns in Enterprise

Cloud Computing. International Journal of Network Security & Its Applications, 3(1),

30-45.doi:10.5121/ijnsa.2011.3103

Bryman, Awino (2011).Business research methods. Third edition Oxford: Oxford

University Press.

Cohen, L, Manion, L & Morrison, K 2007, Research methods in education (6th Ed.). London:

Routledge.

Creswell, J, & Clark, V 2007, Designing and conducting mixed methods research. Thousand

Oaks: Sage Publications.

Grossman, R.L. (2009). The Case for Cloud Computing. IT Professional [Electronic], 11(2), pp.23–27.

Hashizume et al. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), 1-13.

Khan, M & Malluhi, Q, 2010, Establishing trust in cloud computing, IT Professional Magazine,

12(5), 20-27,

Khorshed, T.M., Ali, A.B.M.S. and Wasimi, S.A. (2012). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future

Generation Computer Systems, 28, 833–851.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A. (2011).Cloud computing — The business perspective. Decision Support Systems, 51, 176–189.

Mircea, M. & Andreescu, A. J. (2011). “Using Cloud Computing in Higher Education: A strategy

to improve agility in the current financial crisis”, Academy of Economic Studies, Bucharest, Romania.

Mugenda, O. M. and Mugenda, A. G. (2003).Research methods: quantitative and qualitative approaches. Nairobi. Acts press.

Mugenda, O. M. and Mugenda, A. G. (2008).Research methods: quantitative and qualitative approaches. Nairobi. Acts press

Omwansa, T, Timothy, W & Brian, O 2013, Cloud Computing in Kenya, A 2013 Baseline Survey

Pearson, S & Benameur, A 2010, Privacy, Security and Trust issues arising from cloud computing,

2nd IEEE international conference on Cloud Computing Technology and Science.

Ryan, P. and Falvey, S. (2012). Trust in the clouds. Computer Law and Security Reviews, 28, 513-521.

Roberts, J & Al-Hamdani, W 2011, “Who Can You Trust in the Cloud? A Review of Security

Issues within Cloud Computing”, Information Security Curriculum Development

Conference 2011, ACM, 15-19.

Schyff, K & Krauss, K 2014, Higher education cloud computing in South Africa: Towards

understanding trust and adoption issues, SACJ, 55, 40-54.

Sekaran, U & Bougie, R, 2010, Research methods for business: A skill building approach. New

York: John Wiley & Sons.

Shelton, T 2013, Business models for the social mobile cloud, John Wiley & Sons.

Sun, D, Chang, G, Sun, L, & Wang, X, 2011, Surveying and Analyzing Security, Privacy and

Trust Issues in Cloud Computing Environments, Procedia Engineering, 15, 2852-2856,

Weinman, J 2012, Cloudonomics: The business value of cloud computing. New York: John Wiley

& Sons.

Zissis, D and Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28, 583–592.

Abstract

Cloud computing is fast gaining a significant ground as a solution to offer institutions with competitive advantage compared to the old traditional Technology. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, the adoption level of cloud services is still very low in higher institutions of learning due to security issues, especially trust issues which remain a major concern over cloud solutions. The study was carried out in some selected public and private universities in sub Saharan Africa to determine the reason for the low cloud adoption by key stakeholders in higher institutions of learning. An adoption strategy was recommended with reference to the resources available, confidentiality, integrity and availability. The study recommended that cloud service providers should be transparent with their privacy policies with institutions of higher learning as this can influence cloud purchasing decisions. Secondly, there is the need for training IT personnel and to create awareness of the benefits of cloud computing to enable institutions of higher learning to adopt them to enhance their productivity.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.