The Decision Criteria Used by Large Enterprises in South Africa for the
Adoption of Cloud Computing
- URL: http://arxiv.org/abs/2108.09757v1
- Date: Sun, 22 Aug 2021 15:33:55 GMT
- Title: The Decision Criteria Used by Large Enterprises in South Africa for the
Adoption of Cloud Computing
- Authors: Tseriwa Bakasa and Ayanda Pekane
- Abstract summary: This study investigates the decision criteria used by large enterprises in South Africa (SA) for the adoption of cloud technology.
Findings revealed that large enterprises do not make use of a formalized or standardized decision criteria.
Security, cloud service provider adoption frameworks and data sovereignty were the key criteria used to select a CC service provider.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Cloud computing is a technology that has become increasingly popular over the
past decade within several enterprises. This popularity can be attributed to
its benefits, including lower operating costs, improved computational
capabilities, increased flexibility and on-demand storage space. As a result,
many enterprises are already in various Cloud Computing (CC) adoption and
implementation stages. This study investigates the decision criteria used by
large enterprises in South Africa (SA) for the adoption of cloud technology.
The majority of large enterprises have comprehensive resources, resulting in
established Information Technology (IT) systems and infrastructure set up
within their organizations. Though this is the case, the adoption of CC by
large enterprises has been on the rise. This may not be a surprise as CC
literature points out to benefits and influencers of CC adoption. However, the
decision criteria used by large enterprises in SA in adopting CC are lacking in
the literature reviewed. The study followed an inductive approach making use of
qualitative methods. Findings revealed that large enterprises do not make use
of a formalized or standardized decision criteria. However, operational cost,
enterprise strategic intent and product efficiency formed key criteria for
adopting CC. In addition, security, cloud service provider adoption frameworks
and data sovereignty were the key criteria used to select a CC service
provider. The research will contribute towards CC technology adoption
literature, particularly for developing countries.
Related papers
- Emergent (In)Security of Multi-Cloud Environments [3.3819025097691537]
A majority of IT organizations have workloads spread across different cloud service providers, growing their multi-cloud environments.
The increase in the number of attack vectors creates a challenge of how to prioritize mitigations and countermeasures.
We conducted an analysis of multi-cloud threat vectors enabling calculation and prioritization for the identified mitigations and countermeasures.
arXiv Detail & Related papers (2023-11-02T14:02:33Z) - Exploring Security Practices in Infrastructure as Code: An Empirical
Study [54.669404064111795]
Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools.
scripting process does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks.
Ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices.
arXiv Detail & Related papers (2023-08-07T23:43:32Z) - Conceptualizing A Multi-Sided Platform For Cloud Computing Resource
Trading [0.0]
A typical data center produces approximately 30% overcapacity annually.
This overcapacity has severe environmental and economic consequences.
We propose a multi-sided platform for CCR trading.
arXiv Detail & Related papers (2023-05-12T11:52:58Z) - Mining for Cost Awareness in the Infrastructure as Code Artifacts of Cloud-based Applications: an Exploratory Study [1.5612101323427952]
This study aims to provide empirical evidence of cost awareness by mining open source repositories of cloud-based applications.
A systematic search through 152,735 repositories resulted in the selection of 2,010 relevant ones.
The findings indicate that developers are not only concerned with the cost of their application deployments but also take actions to reduce these costs.
arXiv Detail & Related papers (2023-04-15T10:49:35Z) - Measuring the Carbon Intensity of AI in Cloud Instances [91.28501520271972]
We provide a framework for measuring software carbon intensity, and propose to measure operational carbon emissions.
We evaluate a suite of approaches for reducing emissions on the Microsoft Azure cloud compute platform.
arXiv Detail & Related papers (2022-06-10T17:04:04Z) - Distributed Reinforcement Learning for Privacy-Preserving Dynamic Edge
Caching [91.50631418179331]
A privacy-preserving distributed deep policy gradient (P2D3PG) is proposed to maximize the cache hit rates of devices in the MEC networks.
We convert the distributed optimizations into model-free Markov decision process problems and then introduce a privacy-preserving federated learning method for popularity prediction.
arXiv Detail & Related papers (2021-10-20T02:48:27Z) - Auto-Split: A General Framework of Collaborative Edge-Cloud AI [49.750972428032355]
This paper describes the techniques and engineering practice behind Auto-Split, an edge-cloud collaborative prototype of Huawei Cloud.
To the best of our knowledge, there is no existing industry product that provides the capability of Deep Neural Network (DNN) splitting.
arXiv Detail & Related papers (2021-08-30T08:03:29Z) - Cloud Computing Adoption: Opportunities and Challenges for Small, Medium
and Micro Enterprises in South Africa [0.0]
The study shows that relative advantage is an important factor in the consideration of cloud computing adoption by SMMEs.
The study has revealed that cloud computing presents opportunities to SMMEs and improves their competitiveness.
arXiv Detail & Related papers (2021-08-23T11:21:40Z) - A Review on Computational Intelligence Techniques in Cloud and Edge
Computing [14.610305602165415]
Cloud computing (CC) is a centralized computing paradigm that accumulates resources provides these resources to users through Internet.
Centrally distributed computing (EC) provides resources in a decentralized manner, which can respond to users' needs faster.
As both CC and EC are resource-sensitive, several big issues arise, such as how to conduct job scheduling, resource allocation, and task offloading.
arXiv Detail & Related papers (2020-07-27T09:29:21Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - Knowledge Integration of Collaborative Product Design Using Cloud
Computing Infrastructure [65.2157099438235]
The main focus of this paper is the concept of ongoing research in providing the knowledge integration service for collaborative product design and development using cloud computing infrastructure.
Proposed knowledge integration services support users by giving real-time access to knowledge resources.
arXiv Detail & Related papers (2020-01-16T18:44:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.