An increasingly important advancement in information and communication technologies is cloud computing, and a remarkably increasing trend is its adoption by various organizations. The trend is attributed to the potential of this growing computing paradigm to improve the scalability, efficiency, and reliability of IT systems. Diffusion of cloud computing innovation is changing the way business information systems are developed, paid for, and maintained Alshamaila et al. 2013, Low et al. 2011, thus contributing to efficiency and better value for enterprises. This not only applies to large organizations, but also progressively more to small and medium-sized enterprises (SMEs). However, little is known about the factors most likely to be associated to the adoption behavior of cloud computing services among small and medium enterprises operating in Lebanon. This study deploys the technology-organization-environment (TOE) framework and the Contextual Theory to empirically examine the determinants of cloud computing service adoption in a developing country, namely Lebanon. A model is proposed, and data collected from 139 respondents working in SMEs in Lebanon and analyzed using confirmatory factor analysis and logistic regression in SPSS provide strong support for the model. Results indicate that technological (i.e., complexity and security) and organizational (i.e., top management support and prior IT experience) factors are positively related to the decision to adopt cloud computing services. Moreover, one of the areas of potential interest is the effect of country-specific, or contextual factors, among those who intend to adopt cloud computing. The analysis shows that context-specific factors (i.e. poor infrastructure and lack of government initiatives) are negatively related to the adoption decision. Implications and limitations are discussed, and recommendations for future research are proposed.
In a distributed mobile e-health care system, e-health service providers exchange data on the fly in response to user queries without any centralized control. Local databases in e-health service providers might be intercepted during the exchange of data and read by intruders; and malicious transactions may damage data that is highly confidential. In this case any centralized control for securing data cannot be assumed to protect confidential data. Therefore, securing health information from malicious attacks has become a major concern. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning the entire log from the point of attack to the end which is a slow procedure. In this paper, we present an efficient damage assessment and recovery algorithm to recover the database from malicious transactions. The algorithm is based on data dependency and uses a single matrix. The results of this work prove that our algorithm performs better than the other algorithms in both the damage assessment and the recovery stages.
Cloud computing is an emerging technology in the field of computing that provides access to a wide range of shared resources. The rapid growth of cloud computing has led to establishing numerous data centers around the world. As data centers consume huge amounts of power, enhancing their power efficiency has become a major challenge in cloud computing. This paper surveys previous studies and researches that aimed to improve power efficiency of virtualized data centers. This survey is a valuable guide for researchers in the field of power efficiency in virtualized data centers following the cloud computing model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.