2020
DOI: 10.4018/978-1-7998-1082-7.ch008
|View full text |Cite
|
Sign up to set email alerts
|

A Framework Strategy to Overcome Trust Issues on Cloud Computing Adoption in Higher Education

Abstract: Cloud computing has the potential of adding strategic value to the higher education domain owing to exemplary growth in ubiquitous data and communication services ranging from student access to educational materials to developing teaching and research practices. Despite the wide adoption of CC in HEIs, there is a paucity of research that specifically addresses the issue of trust in cloud adoption in the UK HEI context, as well as identifying smarter and more efficient strategies to overcome the existing CC tru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(2 citation statements)
references
References 33 publications
0
1
0
Order By: Relevance
“…User Consent and Transparency: It is also highly significant for firms to gain consent from individuals and establish transparency measures while dealing with private data. In this case, they should always gain consent from clients before using their data for any purpose [21]. The clients should be informed of the purpose of using their data so that they can make an informed decision.…”
Section: A Personal Data Protectionmentioning
confidence: 99%
“…User Consent and Transparency: It is also highly significant for firms to gain consent from individuals and establish transparency measures while dealing with private data. In this case, they should always gain consent from clients before using their data for any purpose [21]. The clients should be informed of the purpose of using their data so that they can make an informed decision.…”
Section: A Personal Data Protectionmentioning
confidence: 99%
“…Attackers use sophisticated hacking tools to penetrate networks, such as masking and key logging techniques that are able to break though secure networks and exploit anything stored on that network. Unstructured threats are often performed by amateur or inexperienced hackers who will attempts to exploit the network [26]. Unstructured attackers will therefore resort to hacking tools such as shell scripts and password crackers.…”
Section: Security Threats and Attacksmentioning
confidence: 99%