Abstract-Cloud computing is developing as an efficient and viable model of delivering IT services. The challenges posed to-date by security are not to be underestimated with regard to cloud computing adoption. The study assesses the security challenges associated with cloud computing adoption and proposes a framework to assist early adopters of the technology model to address them. Various sections of the literature have indicated that security challenges are a great source of concern in the adoption and usage of cloud computing, and a comprehensive framework is vital to assess previous studies conducted in this area. This study would like to propose viable mechanisms to address these challenges. The study surveyed 380 participants in Gauteng, South Africa to assess the level of agreement and disagreement about the security challenges in cloud computing. The study used a quantitative method to analyse the findings.Keywords: Security in cloud computing, privacy in cloud computing, authentication and validation, risks in cloud computing, availability in cloud computing, trust and transparency, data recovery and backup in cloud computing. I. INTRODUCTIONSecurity in cloud computing is one of the most talked about topics in the literature and this study pays attention to security challenges associated with cloud computing adoption. With the current trends and advances in cloud computing, there seems to be a consensus in the literature that security in cloud computing is real and it needs to be addressed. The aim of this paper is to propose viable mechanisms in order to minimise the impact of security challenges in cloud computing. While cloud computing is praised for its tremendous benefits that the technology model offers, decision-makers are faced with unpleasant challenges to minimise the impact of security aspects in cloud computing. Studies conducted in this regard indicate that users and organisations are considering adopting cloud computing technology in order to achieve their business goals. On one hand there is a need and excitement among users and organisations to adopt cloud computing, and on the other hand the potential for security challenges is real and mechanisms to address these challenges are critical for an effective adoption of the technology model. The aim of this study is to propose guidelines and viable mechanisms on how to minimise the impact of security challenges associated with cloud computing adoption.
Mobile technologies are increasingly making important contributions to the lives of many users. Various factors are said to influence the decision of users to remain connected and be in constant interaction with other users from the same or different social networks. This paper used the Social Shaping of Technology (SST) theory to assess the influence of users’ social networks on their decision to use, choose and purchase a smartphone device. The study used a quantitative research method to analyse data. Data were collected from a sample of young adults aged between 15 and 35 years residing in Durban, South Africa. The study revealed that social networking sites influence users’ decision to use, choose, and purchase a smartphone device. The findings also revealed factors that are perceived as influential in the perceptions of users about their social networks and their interactions with users from the same social networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.