Cloud Computing Applications in Saudi Arabia with its Main Challenges
Keywords:Cloud computing, DDoS, Technology Acceptance Model (TAM), Structural Equation Modeling
Cloud computing is a general term used to denote a new type of computer services that are essentially networked and the Internet is a place to create a user-friendly environment that includes applications that are stored on the cloud and required by the client as needed to run through the browser. On-demand network, which can provide a number of integrated computer services without local resources to facilitate the user. These resources include a space to take data backup, including processing programs and scheduling tasks, e-mail and medicine remote user can control when it is connected to the network in these resources through a simple software interface.
Applications and services of cloud computing help to benefit from modern and future science and processing large data and the use of specialized networks and databases, and develop mechanisms and ways of trading and sharing this information. The main objective of this article is to shed the light on the factors that influence the decisions to use and implement applications and services based on the cloud. Using the Technology Acceptance Model (TAM), so to achieve this target, a questionnaire was designed and distributed to a group of practitioners involved in the implementation of cloud based solutions in their organizations. Data analysis was performed using structural equation modeling software. The major outcomes of this article indicate the role of image and personal innovativeness on behavioral intention towards the adoption of cloud-based applications and services.
 Aljabre, A. (2012). Cloud Computing for Increased Business Value. International Journal of Business and Social Science. Vol. 3 (1), pp.234-239
 Ataur Rahman, M and Masudur Rahman, M (2014). Improvements of Cloud Computing: Scenario of MDCs and LDCs. International Journal of Scientific and Engineering Research. Vol. 5 (2),pp.262-267
 Davis, F.D. (1989). Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly 13 (3), 319â€“339.
 Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science. (1989). 35 (8), 982â€“1003.
 Dutta, A., Peng, G., and Choudhary, A. (2013). Risks in enterprise cloud computing: the perspective of it experts. The Journal of Computer Information Systems.Vol. 53 (4), pp. 39-48
 Goyal, S.(2014). Cloud Computing: A Critical Review. I.J. Computer Network and Information Security. Vol. 3, pp. 20-29 Li, W. and Ping,L. (2009). Trust model to enhance security and interoperability of cloud environment. Cloud Computing. pp. 69-79.
 Moore, G. C., and Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192â€“221.
 Scale, M.-S. E. (2009). Cloud computing and collaboration. Library Hi Tech News, Vol. 26 (9), pp. 10 â€“ 13
 Sharma, S and Rai,A. (2013). Adopting IS process innovations in organizations: the role of IS leadersâ€™ individual factors and technology perceptions in decision making. European Journal of Information Systems. Advance online publication 20 August 2013;doi: 10.1057/ejis.2013.24
 Vaquero, LM, Rodero-Merino, L, Caceres, J. and Lindner, M (2009). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review39(1), pp. 50-55.
 Patel, Ahmed and Ali Seyfi, Yiqi Tew, Ayman Jaradat, (2011) "Comparative study and review of grid, cloud, utility computing and software as a service for use by libraries", Library Hi Tech News, Vol. 28 Issue: 3, pp.25-32, doi: 10.1108/07419051111145145.
 Makori, Elisha Ondieki (2016) "Exploration of cloud computing practices in university libraries in Kenya", Library Hi Tech News, Vol. 33No. 9, pp.16-22, doi: 10.1108/LHTN-11-2015-0077.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).