2017
DOI: 10.1108/ics-07-2016-0051
|View full text |Cite
|
Sign up to set email alerts
|

To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions

Abstract: Purpose This paper aims to discover factors that are truly affecting cloud adoption decisions in organizations. Many reasons have been given for the adoption, or lack thereof, of the cloud. Design/methodology/approach The paper uses an empirical approach by means of an exploratory survey, using descriptive statistics and t-tests to determine significant differences among various response groups. Findings The findings reveal that current and prospective cloud users feel that public cloud computing is less s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(22 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…Organizations can benefit from redundant pool of IT services. [28] A survey conducted by [29] to identify the expected benefits of cloud adoption and result as shown in Figure 3.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…Organizations can benefit from redundant pool of IT services. [28] A survey conducted by [29] to identify the expected benefits of cloud adoption and result as shown in Figure 3.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…VM instances can also act as bots, by either getting infected from other customer's malware VMs, or due to deliberate installation of bot software by some malicious users [4]. The attacker would use these BotNets or BotCloud, typically, to send spam messages, spamdexing, spread viruses, worms, trojans, rootkit, spyware, backdoor, downloader, adware, ransomeware, http://journals.uob.edu.bh attack servers, mining bitcoins, DDoS attacks, access login details, cyber-attacks or other fraudulent activities [11].…”
Section: Major Challenges From Abuse Of Cloud Service Threat and Avaimentioning
confidence: 99%
“…Hypervisors allows multiple VMs to run on a single machine. If hypervisors is compromised, then VMs are likely to get infected and can bring whole cloud down [11,23,42]. b) Solution: A study [23] showed an attack as Hyperjacking, in where, an attacker creates and runs a thin hypervisors to take control over underlying operating system that would lead to have access and manipulate cloud users' data, allows eavesdropping or disrupt cloud services.…”
Section: ) Virtual Machine Monitor or Hypervisorsmentioning
confidence: 99%
See 2 more Smart Citations