Adoption of Cloud Computing
VerifiedAdded on 2023/02/01
|12
|2951
|100
AI Summary
This article explores the adoption of cloud computing in business and organizational contexts. It discusses security frameworks, data protection, and migration strategies. The article also provides resources and research articles on cloud computing adoption.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ADOPTION OF CLOUD COMPUTING
ADOPTION OF CLOUD COMPUTING
Name of the Student
Name of the University
Author Note
ADOPTION OF CLOUD COMPUTING
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
ADOPTION OF CLOUD COMPUTING
Task 1: annotated bibliography
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption
framework: A security framework for business clouds. Future Generation
Computer Systems, 57, 24-41.
This article has provided a cloud computing adoption framework. This Framework according
to the author is suitable for business applications as well. The Framework presented by the
author has adopted a multi-layered approach for enhancing Cloud Security. This article have
analyzed in detail the need of security for cloud computing adoption. The core Technologies
that are needed for securing Cloud Computing has also been presented in detailed format. In
order to adopt the Framework the article has provided the need for development and
integration of major security Technologies. The security Technologies that has been
discussed in details are Firewall identity management and encryption of cloud data. This
technique if properly implemented has the potential to enhance Cloud Computing security,
which is an important need for adoption to any business context.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the
cloud computing adoption framework. IEEE Transactions on Services
Computing, 9(1), 138-151.
According to this article as data is stored in cloud storage in remote server it is important to
secure this data otherwise there is a chance of data hack and other Cybercrimes. Hence, in
order to ensure this security, this article has provided comprehensive Cloud Computing
adoption framework. Now the major problem of cloud computing as identified by the author
is the security of data. If this is not ensured it will not be able to derive the full potential of
cloud computing specially in business and organizational context. In this article, the author
has done a survey, which shows that security of data is one of the most critical issues of cloud
ADOPTION OF CLOUD COMPUTING
Task 1: annotated bibliography
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption
framework: A security framework for business clouds. Future Generation
Computer Systems, 57, 24-41.
This article has provided a cloud computing adoption framework. This Framework according
to the author is suitable for business applications as well. The Framework presented by the
author has adopted a multi-layered approach for enhancing Cloud Security. This article have
analyzed in detail the need of security for cloud computing adoption. The core Technologies
that are needed for securing Cloud Computing has also been presented in detailed format. In
order to adopt the Framework the article has provided the need for development and
integration of major security Technologies. The security Technologies that has been
discussed in details are Firewall identity management and encryption of cloud data. This
technique if properly implemented has the potential to enhance Cloud Computing security,
which is an important need for adoption to any business context.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the
cloud computing adoption framework. IEEE Transactions on Services
Computing, 9(1), 138-151.
According to this article as data is stored in cloud storage in remote server it is important to
secure this data otherwise there is a chance of data hack and other Cybercrimes. Hence, in
order to ensure this security, this article has provided comprehensive Cloud Computing
adoption framework. Now the major problem of cloud computing as identified by the author
is the security of data. If this is not ensured it will not be able to derive the full potential of
cloud computing specially in business and organizational context. In this article, the author
has done a survey, which shows that security of data is one of the most critical issues of cloud
2
ADOPTION OF CLOUD COMPUTING
computing adoption. Now the author has adopted a business process modelling notation or
bpmn to visualize how data is stored and accessed. This visualization according to the article
is helpful to determine how data is manipulated and stored in cloud computing and how this
security is affected. This visualization and simulation according to the article is helpful to
determine how the proposed security Framework is applicable to the data security so that a
detailed and effective Cloud Computing Framework is possible to offer so that Cloud
Computing adoption is consistent with security and performance along with Cloud
Computing reliability.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding the determinants of
cloud computing adoption using an integrated TAM-TOE model. Journal of
Enterprise Information Management, 28(1), 107-130.
This article offers a hybrid framework to adopt Cloud Computing in business and
organizational institutions now the hybrid model is presented in the article is based on the
technology acceptance model and technology of the environment model. For 10 model the
authors have considered environmental variables and for the model, the authors have
considered external variables in order to identify the applicability of this hybrid cloud
adoption Framework the author has conducted a survey with 280 companies and to analyze
this data the authors have adopted a structural variable model. This article has adopted for
integrated this to model this hybrid model is effective as a protective for adopting Cloud
Computing as this model offers features and benefits of the two model at the same time
which enhances the benefit of the resulting model.
Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud
computing adoption framework. Procedia Computer Science, 94, 485-490.
ADOPTION OF CLOUD COMPUTING
computing adoption. Now the author has adopted a business process modelling notation or
bpmn to visualize how data is stored and accessed. This visualization according to the article
is helpful to determine how data is manipulated and stored in cloud computing and how this
security is affected. This visualization and simulation according to the article is helpful to
determine how the proposed security Framework is applicable to the data security so that a
detailed and effective Cloud Computing Framework is possible to offer so that Cloud
Computing adoption is consistent with security and performance along with Cloud
Computing reliability.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding the determinants of
cloud computing adoption using an integrated TAM-TOE model. Journal of
Enterprise Information Management, 28(1), 107-130.
This article offers a hybrid framework to adopt Cloud Computing in business and
organizational institutions now the hybrid model is presented in the article is based on the
technology acceptance model and technology of the environment model. For 10 model the
authors have considered environmental variables and for the model, the authors have
considered external variables in order to identify the applicability of this hybrid cloud
adoption Framework the author has conducted a survey with 280 companies and to analyze
this data the authors have adopted a structural variable model. This article has adopted for
integrated this to model this hybrid model is effective as a protective for adopting Cloud
Computing as this model offers features and benefits of the two model at the same time
which enhances the benefit of the resulting model.
Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud
computing adoption framework. Procedia Computer Science, 94, 485-490.
3
ADOPTION OF CLOUD COMPUTING
Cloud Computing has helped organization to leverage the benefits of advanced computing
without investing in core infrastructure and computing resources. Various Cloud Computing
models such as software as Service model, infrastructure as a service model, and platform as
a service model through which organizations are allowed to choose between Cloud Service,
cloud platform or cloud infrastructure according to their requirements. All the cloud models
allows organizations and business to outsource much of its computing resources. Still
significant issue of cloud adoption that is security of stored data, which is very important and
Critical for business analysis. in order to address this issue, the authors have conducted
interviews with various security aspect specializing in cloud computing security. Along with
that, several relevant literatures have also been discussed and analyzed to identify significant
Cloud Computing security issues. The article has presented 18 significant Cloud Computing
security issues that organizations need to analyze if they are willing to adopt Cloud
Computing for their business as identified security threats to business data is an essential step
in securing the referral business process through Technologies.
Chang, V. (2015). A proposed cloud computing business framework. Nova Science
Publisher.
In order to enhance Cloud Computing security, the authors have suggested theoretical Cloud
Computing adoption framework. To help Organisation in deciding the effective cloud define
deployment techniques and integrating cloud services with business process, an efficient
framework known as Cloud Computing business framework has been suggested in this
article. However, the article also specifies that in order to truly apply this Framework proper
validation is required. As this Framework is a theoretical framework, without proper
validation it is not possible to adopt this Framework in actual business environment and
ensure data security of business applications. The articles have also presented
recommendations to improve this Framework so that adoption of cloud computing is
ADOPTION OF CLOUD COMPUTING
Cloud Computing has helped organization to leverage the benefits of advanced computing
without investing in core infrastructure and computing resources. Various Cloud Computing
models such as software as Service model, infrastructure as a service model, and platform as
a service model through which organizations are allowed to choose between Cloud Service,
cloud platform or cloud infrastructure according to their requirements. All the cloud models
allows organizations and business to outsource much of its computing resources. Still
significant issue of cloud adoption that is security of stored data, which is very important and
Critical for business analysis. in order to address this issue, the authors have conducted
interviews with various security aspect specializing in cloud computing security. Along with
that, several relevant literatures have also been discussed and analyzed to identify significant
Cloud Computing security issues. The article has presented 18 significant Cloud Computing
security issues that organizations need to analyze if they are willing to adopt Cloud
Computing for their business as identified security threats to business data is an essential step
in securing the referral business process through Technologies.
Chang, V. (2015). A proposed cloud computing business framework. Nova Science
Publisher.
In order to enhance Cloud Computing security, the authors have suggested theoretical Cloud
Computing adoption framework. To help Organisation in deciding the effective cloud define
deployment techniques and integrating cloud services with business process, an efficient
framework known as Cloud Computing business framework has been suggested in this
article. However, the article also specifies that in order to truly apply this Framework proper
validation is required. As this Framework is a theoretical framework, without proper
validation it is not possible to adopt this Framework in actual business environment and
ensure data security of business applications. The articles have also presented
recommendations to improve this Framework so that adoption of cloud computing is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
ADOPTION OF CLOUD COMPUTING
consistent with business purpose while ensuring enhanced security for business-related
applications and business information.
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing
environments. In Cloud Security: Concepts, Methodologies, Tools, and
Applications (pp. 249-263). IGI Global.
Cloud Computing is a relative new model for computing that allows to have advanced
computing at low cost. It has revolutionized the way computing services are delivered to
individuals and organizations. Here the computing resources are delivered at services of the
internet hence cloud computing and it’s Adoption in organizational context has been
immensely popular. Now the major issue of adopting Cloud Computing is the security threats
that it pose to the stored data. Hence, a robust and comprehensive Framework is required
which is capable of addressing this issue and improve the adoption of cloud computing as
well. Now to improve this issue security assessment is required hence the author has
presented a framework to implement quantitative risk assessment known as multi-
dimensional mean failure cost. This Framework as mentioned in the article is not only
capable of assessing security threats but also efficient to provide measures to address the
security issues and enhance data security.
Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of
research themes, frameworks, methods and future research directions.
International Journal of Information Management, 38(1), 128-139.
This article has opted for meta-analysis of literature in different to Cloud Computing
adoption and cloud computing frameworks. Previous research according to the authors are
mostly concerted with simulations and experiment to offer insight into this concept. Now
here in this article the authors have taken a different approach then those previous research
ADOPTION OF CLOUD COMPUTING
consistent with business purpose while ensuring enhanced security for business-related
applications and business information.
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing
environments. In Cloud Security: Concepts, Methodologies, Tools, and
Applications (pp. 249-263). IGI Global.
Cloud Computing is a relative new model for computing that allows to have advanced
computing at low cost. It has revolutionized the way computing services are delivered to
individuals and organizations. Here the computing resources are delivered at services of the
internet hence cloud computing and it’s Adoption in organizational context has been
immensely popular. Now the major issue of adopting Cloud Computing is the security threats
that it pose to the stored data. Hence, a robust and comprehensive Framework is required
which is capable of addressing this issue and improve the adoption of cloud computing as
well. Now to improve this issue security assessment is required hence the author has
presented a framework to implement quantitative risk assessment known as multi-
dimensional mean failure cost. This Framework as mentioned in the article is not only
capable of assessing security threats but also efficient to provide measures to address the
security issues and enhance data security.
Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of
research themes, frameworks, methods and future research directions.
International Journal of Information Management, 38(1), 128-139.
This article has opted for meta-analysis of literature in different to Cloud Computing
adoption and cloud computing frameworks. Previous research according to the authors are
mostly concerted with simulations and experiment to offer insight into this concept. Now
here in this article the authors have taken a different approach then those previous research
5
ADOPTION OF CLOUD COMPUTING
and integrated, qualitative, and quantitative assessment of existing literature to identify
trends, framework distribution and geographical aspect on adoption of cloud computing in
various organizations. In order to conduct this research, the method has collected 65 articles
from 285 Peer-reviewed journals and analyzed them properly to you derive the insights from
those research finding. In addition to that, the authors have also presented and context to
conduct future research to improve this process with the required insights into this topic.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud
computing and the internet of things: a survey. Future generation computer
systems, 56, 684-700.
This article has presented a new Framework known as CloudIT paradigm, which combines
cloud, computing and IoT, two different aspects of modern computing Technologies.
Previous researches done in this field have analysed cloud computing and not as two separate
Technologies, with little or no insights for integration of these Technologies. This article has
considered this aspect and provide its combined Framework for integrity in cloud computing
and not to offer more powerful at France and Secure computing services. This article has also
analyzed issues with This remark how to who address the issues improve the adoption of this
Framework along with guidance for future research to further enhance this cloud its
framework.
Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing cloud
computing adoption: a systematic study on cloud migration. SpringerPlus, 4(1),
197.
Legacy applications might be a technology from the previous generation but trust of
Organization on these applications for their business purpose have not decreased at all. There
are various issues regarding Legacy applications some of these issues are lack of proper
ADOPTION OF CLOUD COMPUTING
and integrated, qualitative, and quantitative assessment of existing literature to identify
trends, framework distribution and geographical aspect on adoption of cloud computing in
various organizations. In order to conduct this research, the method has collected 65 articles
from 285 Peer-reviewed journals and analyzed them properly to you derive the insights from
those research finding. In addition to that, the authors have also presented and context to
conduct future research to improve this process with the required insights into this topic.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud
computing and the internet of things: a survey. Future generation computer
systems, 56, 684-700.
This article has presented a new Framework known as CloudIT paradigm, which combines
cloud, computing and IoT, two different aspects of modern computing Technologies.
Previous researches done in this field have analysed cloud computing and not as two separate
Technologies, with little or no insights for integration of these Technologies. This article has
considered this aspect and provide its combined Framework for integrity in cloud computing
and not to offer more powerful at France and Secure computing services. This article has also
analyzed issues with This remark how to who address the issues improve the adoption of this
Framework along with guidance for future research to further enhance this cloud its
framework.
Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing cloud
computing adoption: a systematic study on cloud migration. SpringerPlus, 4(1),
197.
Legacy applications might be a technology from the previous generation but trust of
Organization on these applications for their business purpose have not decreased at all. There
are various issues regarding Legacy applications some of these issues are lack of proper
6
ADOPTION OF CLOUD COMPUTING
maintenance, coordination integration and availability. Now in order to improve and manage
these issues and efficiently, the authors have suggested adoption of cloud computing. the
benefits of cloud computing is that it doesn't require investment in computing resources to
access powerful computing solutions that are major need for business today where impact of
technology is significant for business success. However, Migration of legacy application to
the cloud is not an easy process as various issues as cost and security have to be managed
properly. Hence, an efficient cloud migration Framework is required. However, according to
the article whichever Framework is chosen for Cloud migration, it has to be secured enough
so that it enhances the trust of business for migrating in the cloud the authors. In this regard
has proposed for Framework that automate this process of migrating existing applications to
the cloud for improved efficiency and reliability for this process.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage
architecture for big data security in cloud computing. Procedia Computer
Science, 87, 128-133.
Today business are data-driven. Without efficiently analyzing the data, business today cannot
ensure competitive advantage. Now the problem with this data is that they are not often
structured in nature. Hence traditional data storage facilities for storing and processing of this
data are not efficient. Due to this, adoption of cloud computing to stored and process huge
amount of data also known as big data is being considered by business organization. Now the
problem is that data stored in the cloud is not open very secure if proper security measures
are not taken. To secure this data stored in the cloud storage encryption mechanisms are not
that efficient. hence the authors have proposed for an effective Framework known as meta
cloud data storage architecture with enhanced safe data security and also offer increased
insights from the big data with appropriate data analysis.
ADOPTION OF CLOUD COMPUTING
maintenance, coordination integration and availability. Now in order to improve and manage
these issues and efficiently, the authors have suggested adoption of cloud computing. the
benefits of cloud computing is that it doesn't require investment in computing resources to
access powerful computing solutions that are major need for business today where impact of
technology is significant for business success. However, Migration of legacy application to
the cloud is not an easy process as various issues as cost and security have to be managed
properly. Hence, an efficient cloud migration Framework is required. However, according to
the article whichever Framework is chosen for Cloud migration, it has to be secured enough
so that it enhances the trust of business for migrating in the cloud the authors. In this regard
has proposed for Framework that automate this process of migrating existing applications to
the cloud for improved efficiency and reliability for this process.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage
architecture for big data security in cloud computing. Procedia Computer
Science, 87, 128-133.
Today business are data-driven. Without efficiently analyzing the data, business today cannot
ensure competitive advantage. Now the problem with this data is that they are not often
structured in nature. Hence traditional data storage facilities for storing and processing of this
data are not efficient. Due to this, adoption of cloud computing to stored and process huge
amount of data also known as big data is being considered by business organization. Now the
problem is that data stored in the cloud is not open very secure if proper security measures
are not taken. To secure this data stored in the cloud storage encryption mechanisms are not
that efficient. hence the authors have proposed for an effective Framework known as meta
cloud data storage architecture with enhanced safe data security and also offer increased
insights from the big data with appropriate data analysis.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
ADOPTION OF CLOUD COMPUTING
Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical
evaluation of a cloud computing information security governance framework.
Information and Software Technology, 58, 44-57.
Cloud-computing providers in new paradigm of computing which offers on-demand services
and computing resources. However, security issues according to the authors is still a major
concern for widespread adoption of cloud computing. Hence, in this article daughters have
presented information security governance model for enhancing security in cloud computing
applications. Most of the previous researchers have analyzed about this topic and those
researches are mostly done in theoretical aspects without any empirical validation. However,
in this paper authors have applied the proposed ISG model in context of a public
Organization in Spain. It has been done to identify the applicability and issues of this
framework so that it is possible to improve this Framework for adopting in other
organizations and ensure proper data security while adopting Cloud Computing services.
Saedi, A. (2016, August). Cloud computing adoption framework: Innovation translation
approach. In 2016 3rd International Conference on Computer and Information
Sciences (ICCOINS) (pp. 153-157). IEEE.
This article has offered insight into the Framework for cloud computing Adoption n small
and medium enterprises previous researches done in this topic has not considered the
innovation translation approach even though it offers various benefits. Instead of that, those
researches have mostly considered essentialist approach, which often simplified adoption of
cloud computing for small and medium-sized Enterprises. This research presents Technology
organization environment framework for or adoption of cloud computing in business and
organizations along with that this research has suggest an actor network theory for the context
ADOPTION OF CLOUD COMPUTING
Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical
evaluation of a cloud computing information security governance framework.
Information and Software Technology, 58, 44-57.
Cloud-computing providers in new paradigm of computing which offers on-demand services
and computing resources. However, security issues according to the authors is still a major
concern for widespread adoption of cloud computing. Hence, in this article daughters have
presented information security governance model for enhancing security in cloud computing
applications. Most of the previous researchers have analyzed about this topic and those
researches are mostly done in theoretical aspects without any empirical validation. However,
in this paper authors have applied the proposed ISG model in context of a public
Organization in Spain. It has been done to identify the applicability and issues of this
framework so that it is possible to improve this Framework for adopting in other
organizations and ensure proper data security while adopting Cloud Computing services.
Saedi, A. (2016, August). Cloud computing adoption framework: Innovation translation
approach. In 2016 3rd International Conference on Computer and Information
Sciences (ICCOINS) (pp. 153-157). IEEE.
This article has offered insight into the Framework for cloud computing Adoption n small
and medium enterprises previous researches done in this topic has not considered the
innovation translation approach even though it offers various benefits. Instead of that, those
researches have mostly considered essentialist approach, which often simplified adoption of
cloud computing for small and medium-sized Enterprises. This research presents Technology
organization environment framework for or adoption of cloud computing in business and
organizations along with that this research has suggest an actor network theory for the context
8
ADOPTION OF CLOUD COMPUTING
of innovation translation approach required for adoption of cloud computing in those
organizations.
ADOPTION OF CLOUD COMPUTING
of innovation translation approach required for adoption of cloud computing in those
organizations.
9
ADOPTION OF CLOUD COMPUTING
Task 2: turntin report evaluation:
From the curtain report, it is clear that the content presented in this report is original and
authentic. While doing the annotated bibliography it was made sure that ideas are properly
analysed and then present it in such a format that reprensta logical has structural argument
with original interpretation. This claim about the report is evident from curtain report which
has such a impressive score and this is not possible without specific attention to quality and
authenticity.
ADOPTION OF CLOUD COMPUTING
Task 2: turntin report evaluation:
From the curtain report, it is clear that the content presented in this report is original and
authentic. While doing the annotated bibliography it was made sure that ideas are properly
analysed and then present it in such a format that reprensta logical has structural argument
with original interpretation. This claim about the report is evident from curtain report which
has such a impressive score and this is not possible without specific attention to quality and
authenticity.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
ADOPTION OF CLOUD COMPUTING
References:
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and the internet of things: a survey. Future generation computer systems, 56, 684-700.
Chang, V. (2015). A proposed cloud computing business framework. Nova Science
Publisher.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud
computing adoption framework. IEEE Transactions on Services Computing, 9(1),
138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57,
24-41.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding the determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing
environments. In Cloud Security: Concepts, Methodologies, Tools, and Applications
(pp. 249-263). IGI Global.
Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud
computing adoption framework. Procedia Computer Science, 94, 485-490.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage architecture for
big data security in cloud computing. Procedia Computer Science, 87, 128-133.
Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing cloud computing
adoption: a systematic study on cloud migration. SpringerPlus, 4(1), 197.
ADOPTION OF CLOUD COMPUTING
References:
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and the internet of things: a survey. Future generation computer systems, 56, 684-700.
Chang, V. (2015). A proposed cloud computing business framework. Nova Science
Publisher.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud
computing adoption framework. IEEE Transactions on Services Computing, 9(1),
138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57,
24-41.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding the determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing
environments. In Cloud Security: Concepts, Methodologies, Tools, and Applications
(pp. 249-263). IGI Global.
Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud
computing adoption framework. Procedia Computer Science, 94, 485-490.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage architecture for
big data security in cloud computing. Procedia Computer Science, 87, 128-133.
Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing cloud computing
adoption: a systematic study on cloud migration. SpringerPlus, 4(1), 197.
11
ADOPTION OF CLOUD COMPUTING
Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical
evaluation of a cloud computing information security governance framework.
Information and Software Technology, 58, 44-57.
Saedi, A. (2016, August). Cloud computing adoption framework: Innovation translation
approach. In 2016 3rd International Conference on Computer and Information
Sciences (ICCOINS) (pp. 153-157). IEEE.
Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of
research themes, frameworks, methods and future research directions. International
Journal of Information Management, 38(1), 128-139.
ADOPTION OF CLOUD COMPUTING
Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical
evaluation of a cloud computing information security governance framework.
Information and Software Technology, 58, 44-57.
Saedi, A. (2016, August). Cloud computing adoption framework: Innovation translation
approach. In 2016 3rd International Conference on Computer and Information
Sciences (ICCOINS) (pp. 153-157). IEEE.
Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of
research themes, frameworks, methods and future research directions. International
Journal of Information Management, 38(1), 128-139.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.