An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments

被引:29
作者
Ali, Omar [1 ]
Soar, Jeffrey [1 ]
Yong, Jianming [1 ]
机构
[1] Univ So Queensland, Sch Management & Enterprise, Toowoomba, Qld 4350, Australia
关键词
Challenges; Issues; Adoption; Cloud computing; Regional councils; SECURITY; COST; TOOL;
D O I
10.1016/j.jisa.2015.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
New developments in information technology (IT) provide opportunities for a better quality of life through benefits such as increased comfort and convenience. Compared to dedicated infrastructures such as cluster and grid computing, cloud computing can better cater to users' needs by increasing effectiveness, efficiency and functionality at a potentially lower cost. This research aims to provide insights into the challenges and issues faced by implementers and users of cloud computing by comparing the extant literature about this issue with current insights provided by IT managers. A systematic literature review and in-depth interviews with IT managers in local government councils were conducted for this research. The research indicated that the factors in the extant literature were supported; additional challenges and issues emerged which are related to effective network, data storage location, availability of different service providers, policy makers, a limited understanding of the cloud and business transformation. The findings of this research are expected to assist managers to evaluate possible adoption and increase their awareness about challenges and issues that influence the cloud adoption when planning to adopt it. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 142 条
[81]   Data Security in the World of Cloud Computing [J].
Kaufman, Lori M. .
IEEE SECURITY & PRIVACY, 2009, 7 (04) :61-64
[82]   Data Processing Issues in Cloud Computing [J].
Khalid, Ammar ;
Mujtaba, Husnain .
2009 SECOND INTERNATIONAL CONFERENCE ON MACHINE VISION, PROCEEDINGS, ( ICMV 2009), 2009, :301-304
[83]   Trust Issues That Create Threats for Cyber Attacks in Cloud Computing [J].
Khorshed, Md Tanzim ;
Ali, A. B. M. Shawkat ;
Wasimi, Saleh A. .
2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, :900-905
[84]   Cloud Computing: Today and Tomorrow [J].
Kim, Won .
JOURNAL OF OBJECT TECHNOLOGY, 2009, 8 (01) :65-72
[85]   Deploying common systems globally: The dynamics of control [J].
Kirsch, LJ .
INFORMATION SYSTEMS RESEARCH, 2004, 15 (04) :374-395
[86]   A survey of computational location privacy [J].
Krumm, John .
PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) :391-399
[87]  
Kusaka T., 2011, Proceedings of the 2011 23rd International Teletraffic Congress (ITC 2011), P310
[88]  
Lagesse B., 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2011). PerCom-Workshops 2011: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2011), P106, DOI 10.1109/PERCOMW.2011.5766850
[89]   Is Cloud Computing Really Ready for Prime Time? [J].
Leavitt, Neal .
COMPUTER, 2009, 42 (01) :15-20
[90]   Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution [J].
Lee, Gyu Myoung ;
Crespi, Noel .
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT I, 2010, 6415 :399-410