Open Access
Subscription Access
Open Access
Subscription Access
Adoption of Cloud Computing in Nepal
Subscribe/Renew Journal
This research aims to investigate the status of cloud computing among business and government organizations, to explore the major concerns of organizations regarding the adoption of cloud computing, to find out the major challenges and opportunities on adoption of cloud computing in Nepal. The study shows that Government and Business organizations are in similar position in adoption of cloud computing in Nepal. The literature was reviewed and much was discovered about the complexity of cloud computing. The status of cloud acceptance and their major issues were clarified by the participants who agreed to follow up interviews in a survey conducted. Security, connectivity, availability, vendor location and legal issues were found to be the major reason for delay in cloud adoption. Availability and security are the key aspects which can be increased through the appropriate adoption of cloud as per the literature review. Result of the data analysis shows that most of the Government and Business organizations are not using cloud computing.
Keywords
Cloud Computing, Emerging Technologies, Major Concerns.
Subscription
Login to verify subscription
User
Font Size
Information
- S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing - The business perspective”, Decision Support Systems, vol. 51, no. 1, pp. 176-189, 2011.
- P. Hoberg, J. Wollersheim, and H. Krcmar, “The business perspective on cloud computing - A literature review of research on cloud computing,” Paper presented at the 18th Americas Conference AMCIS Proceedings, 2012.
- S. Subashini, and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications,” vol. 34, no. 1, pp. 1-11, 2011.
- R. Sandhu, R. Boppana, R. Krishnan, J. Reich, T. Wolff, and J. Zachry, “Towards a discipline of mission-aware cloud computing,” ACM CCSW’10 Cloud Computing Security, 2010.
- J. Krogstie, Model-based Development and Evolution of Information Systems A Quality Approach. London: New York: Springer, 2012.
- G. Anthes, “Security in the cloud,” Communications of the ACM, vol. 53, no. 11, pp. 16, November, 2010.
- Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: State-of-the-art and research challenges,” Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18, April, 2010.
- D. Thain, T. Tannenbaum, and M. Livny, “Distributed computing in practice: The Condor experience,” Concurrency and Computation: Practice and Experience, vol. 17, no. 2-4, pp. 323-356 February, 2005.
- M. Feilner, Open VPN Building and Operating Virtual Private Networks. Birmingham, U.K.: Packt, 2006.
- S. Murugesan, “Understanding Web 2.0,” IT Professional, vol. 9, no. 4, pp. 34-41, July, 2007.
- R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” High Performance Computing and Communications, 2008, HPCC’08, 10th IEEE International Conference on, pp. 5-13, 2008.
- J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li, “Comparison of several cloud computing platforms,” Information Science and Engineering (ISISE), 2009 Second International Symposium on, pp. 23-27, 2009.
- P. Mell, and T. Grance, “The NIST definition of cloud computing (draft),” NIST Special Publication, vol. 800, no.145, pp. 7, 2011.
- M. E. Whitman, Principles of information security, (4thed.) Boston, MA: Course Technology, 2012.
- E. M. Rogers, and F. Shoemaker, Communications in Innovation, New York: Free Press, 1971.
- T. H. Nguyen, “Information technology adoption in SMEs: An integrated framework,” International Journal of Entrepreneurial Behaviour & Research, vol. 15, no. 2, pp. 162-186, 2009.
- The Defense Science Board. “Cyber Security and Reliability in a Digital Cloud,” Washington, D.C.: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, 2013.
Abstract Views: 351
PDF Views: 2