2014
DOI: 10.5121/ijmit.2014.6301
|View full text |Cite
|
Sign up to set email alerts
|

Barriers to Government Cloud Adoption

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
33
0
7

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(42 citation statements)
references
References 16 publications
2
33
0
7
Order By: Relevance
“…Alsanea [13] noted that Saudi Arabia is particularly hindered by security and privacy matters with respect to g-cloud computing. The country also suffers a lack of trust in cloud vendors [25,26] and even cloud technology [13], both of which hinder g-cloud implementation. Certain cultural traditions might also pose barriers to g-cloud implementation [27].…”
Section: B Major Barriers To G-cloud Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…Alsanea [13] noted that Saudi Arabia is particularly hindered by security and privacy matters with respect to g-cloud computing. The country also suffers a lack of trust in cloud vendors [25,26] and even cloud technology [13], both of which hinder g-cloud implementation. Certain cultural traditions might also pose barriers to g-cloud implementation [27].…”
Section: B Major Barriers To G-cloud Implementationmentioning
confidence: 99%
“…In the Saudi Arabian government context, the absence of legislation and standards act as a hindering factor [23]. Furthermore, in cloud technologies, data sovereignty is a key barrier to the storage of sensitive data for global governments [26]. Irion [32] argued that data sovereignty is a barrier on the cloud vendor side, since cloud vendors may take control of physical storage data centres or may hire third parties to store their data.…”
Section: B Major Barriers To G-cloud Implementationmentioning
confidence: 99%
“…Several governments have outlined such processes and there are some best practices emerging that other governments can follow. [16] One important lesson that is emerging is that the verification process should draw from the pool of existing international certifications and accreditations, as opposed to starting entirely anew. This concept of "reuse" of existing certifications enables public sector authorities to build off existing global certification assets, including detailed audit reports, and avoid creating cumbersome internal processes that will slow cloud adoption and likely add very little beyond what existing certifications and audit reports would show.…”
Section: B Security Verification Process Requirements: Servicementioning
confidence: 99%
“…Support for providing those new skills and awarding those who acquire them has proven to advance the use of cloud computing. [21] Accordingly, public sector authorities should ensure cloud regulations and policies address these skills, staffing and personnel issues.…”
Section: Transitional Issues Caused By a "Cloud First" Strategymentioning
confidence: 99%
“…Cloud computing can facilitate the share of information between public and private organizations and provide citizens access to government services. An IDC study (Tweneboah-Koduah et al, 2014) states that "the worldwide spending on public cloud services reached $47.4 billion in 2013 and is expected to be more than $107 billion in 2017".…”
Section: Digital Agenda For Europementioning
confidence: 99%