Cloud Computing Adoption And Usage In Education

Cloud Computing Adoption And Usage In Education

education

Cloud computing is an emerging new computing paradigm which can provide computational resources for teaching and learning both cost-effectively and with the flexibility that education requires. Cloud computing provides virtualized resources (such as networks, servers, applications, data storage, and services) as a service over the Internet. Students, teachers and administrative staff can have on-demand access to these resources. Cloud computing offers a cost-effective way to access advanced learning applications and provides richer curricula to all school systems. The flexibility of choosing diverse software applications is a critical component of an educational cloud. Moreover, schools can share software applications legally and cost effectively using the cloud by purchasing a limited number of seat license and managing the concurrent use of the software. The cloud also allows students, regardless of geographical location, to interact and collaborate with their peers.

Many universities such as Medical College of Wisconsin Biotechnology and Bioengineering Center in Milwaukee use cloud computing as tools to provide the computing infrastructure for leading-edge research projects. In fact, cloud computing makes the analysis less expensive and more accessible. Moreover, a number of educational institutions such as Washington State University’s School of Electrical Engineering and Computer Science (EECS) have adopted cloud computing for economic reasons. It would seem that cloud computing can be used as an useful tool not only to enhance quality of education but also to cope with the endless cycle of hardware and software upgrades at affordable costs in educational institutions.

Many educational institutions have recognized great potential of cloud computing in education. For example, Medical College of Wisconsin Biotechnology and Bioengineering Center in Milwaukee use cloud computing for research purposes. In fact, cloud computing makes the analysis less expensive and more accessible. Moreover, a number of educational institutions such as Washington State University’s School of Electrical Engineering and Computer Science (EECS) have adopted cloud computing for economic reasons. It would seem that cloud computing can be used as an useful tool not only to enhance quality of education but also to cope with the endless cycle of hardware and software upgrades at affordable costs in educational institutions.

Despite the benefits that cloud computing offers, there are several challenges that can affect the decision of cloud computing adoption. One of the biggest hurdles is a lack of knowledge about the benefits of cloud computing. Slow connectivity, low bandwidth and lack of infrastructure have hindered the uptake of cloud computing. Many scholars consider security as the number one obstacle to cloud adoption. When educational institutions store the data on cloud servers, cloud service providers have the power to access customer data without them knowing. To ensure that cloud providers don’t have unnecessary access to data, encryption technology should be used to store and transmit the data.

The introduction of e-learning cloud computing will bring a lot of new problems for educational institutions. Hence, a series of comprehensive management rules for e-learning mode based on cloud such as teaching content management, course management, examination management, performance management, student management, teacher workload management should be established.  According to Afshari et al. (2013), Organizational culture is a critical factor in the success of any organizational innovation. Educational leaders should use strategies to develop a culture that values cloud-based e-learning system, establish policies and implementation plans for the adoption of cloud services by teachers and staff including in-service training and easy mechanisms for teachers to adopt, and propose technologies for instructional use.

(Image Source: Shutterstock.com)

By Mojgan Afsharid

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

Sorry, comments are closed for this post.

Comics
5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…