Technology Adoption and the NIST

Cloud Computing Adoption

Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All the computing of more than one computer via a network or the service gained from the host computer via a network is considered cloud computing. Through different types of devices such as PCs, smart phones users can access to services and computing resources in clouds. According to the National Institute of Standards and Technology (NIST), ‘‘Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction’’. Cloud computing represents a convergence of two major trends (IT efficiency and business agility) in information technology. The term IT efficiency refers to using computing resources more efficiently through highly scalable hardware and software resources. Furthermore, the business agility is the ability of a business to use computational tools rapidly, to adapt quickly and cost efficiency in response to changes in the business environment. Cloud computing can remove traditional boundaries between businesses, make the whole organization more business agile and responsive, help enterprises to scale their services, enhance industrial competitiveness,  reduce the operational costs and the total cost of computing, and decreases energy consumption. It would seem that cloud computing can provide new opportunities for innovation by allowing companies to focus on business rather than be stifled by changes in technology.

Cloud Computing Adoption

Although this new technology can help organizations to achieve business efficiencies, evidence indicates that not all companies intend to adopt cloud-based solutions. Borgman and his colleagues conducted a study on the factors influencing cloud computing adoption and found that the security and privacy, identity management standards, and the need for sharing and collaboration in today’s highly competitive world have a positive effect on using and adopting the cloud computing. In fact, a data breach is a security incident in which a company or a government agency loses sensitive, protected or confidential data. Cloud computing involves storing data and computing in a shared multi-user environment, which increases security concerns. Privacy-enhancing techniques, monitoring mechanisms, authentication, encryption, and the security of data in the cloud environment are good ways to enhance cloud security and minimize risk.

Many scholars suggested several strategies to help decision makers improve cloud security which are as follows:

1. Ensure effective governance, risk and compliance processes exist

2. Audit operational and business processes

3. Manage people, roles and identities

4. Ensure proper protection of data and information

5. Enforce privacy policies

6. Assess the security provisions for cloud applications

7. Ensure cloud networks and connections are secure

In sum, cloud computing has become ubiquitous in recent years. Studies indicated that factors such as the relative advantage of cloud computing (such as improving the quality of business operations, performing tasks more quickly, increasing productivity, cost savings, and providing new business opportunities), ease of use and convenience in using the cloud infrastructure, privacy and security, and the reliability of cloud providers can affect the adoption of cloud computing. Hence, decision makers should systematically evaluate these factors before adoption of cloud computing environment.

By Mojgan Afshari

Mark Barrenechea

Introducing the Information Advantage

Technology. Information. Disruption. The world is moving faster than ever before at unprecedented scale. Businesses today are operating in the next industrial revolution, and the rules have changed. This is Industry 4.0. It is imposing ...
Torsten

Five Ways to Secure Access to Web Workloads

Secure Access to Cloud Workloads Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. That’s a major reason why worldwide spending on public cloud services and infrastructure ...
Mark Kirstein

IT Pros Can Now Deliver a More Streamlined, Cost-Efficient Migration of Microsoft Teams

IT Pros Deliver a More Streamlined Migration of Microsoft Teams In the modern workplace, the ability for employees to collaborate and engage with each other on projects in real time is becoming essential. The increased ...
Mark Casey Apcela

How to Optimize Your Office 365 Performance with Network Peering

Optimize Performance with Network Peering Microsoft Office 365 usage has grown significantly in recent years. More than 56 percent of organizations all around the world now use Office 365 cloud-based services. In terms of user ...
Patrick Joggerst

Session Border Control as a Service: Faster, More Secure and Dramatically Less Complex Enterprise Communications

Session Border Control as a Service As businesses are increasingly moving to cloud-based unified communications (UC) for improved collaboration and productivity, they must also ensure that their networks and systems are as secure as possible ...
Ajay

Deep learning to avoid real time computation

Avoid real time computation “The underlying physical laws necessary for the mathematical theory of a large part of physics and the whole of chemistry are thus completely known, and the difficulty is only that the ...