Cloud Computing Applications in Saudi Arabia with its Main Challenges

  • Authors

    • Dr. Khaled Alfawaz
    • . .
    • . .
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.16.21789
  • Cloud computing, DDoS, Technology Acceptance Model (TAM), Structural Equation Modeling
  • Cloud computing is a general term used to denote a new type of computer services that are essentially networked and the Internet is a place to create a user-friendly environment that includes applications that are stored on the cloud and required by the client as needed to run through the browser. On-demand network, which can provide a number of integrated computer services without local resources to facilitate the user. These resources include a space to take data backup, including processing programs and scheduling tasks, e-mail and medicine remote user can control when it is connected to the network in these resources through a simple software interface.

    Applications and services of cloud computing help to benefit from modern and future science and processing large data and the use of specialized networks and databases, and develop mechanisms and ways of trading and sharing this information. The main objective of this article is to shed the light on the factors that influence the decisions to use and implement applications and services based on the cloud. Using the Technology Acceptance Model (TAM), so to achieve this target, a questionnaire was designed and distributed to a group of practitioners involved in the implementation of cloud based solutions in their organizations. Data analysis was performed using structural equation modeling software. The major outcomes of this article indicate the role of image and  personal innovativeness on behavioral intention towards the adoption of cloud-based applications and services.

     

  • References

    1. [1] Aljabre, A. (2012). Cloud Computing for Increased Business Value. International Journal of Business and Social Science. Vol. 3 (1), pp.234-239

      [2] Ataur Rahman, M and Masudur Rahman, M (2014). Improvements of Cloud Computing: Scenario of MDCs and LDCs. International Journal of Scientific and Engineering Research. Vol. 5 (2),pp.262-267

      [3] Davis, F.D. (1989). Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly 13 (3), 319–339.

      [4] Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science. (1989). 35 (8), 982–1003.

      [5] Dutta, A., Peng, G., and Choudhary, A. (2013). Risks in enterprise cloud computing: the perspective of it experts. The Journal of Computer Information Systems.Vol. 53 (4), pp. 39-48

      [6] Goyal, S.(2014). Cloud Computing: A Critical Review. I.J. Computer Network and Information Security. Vol. 3, pp. 20-29

      [7] Li, W. and Ping,L. (2009). Trust model to enhance security and interoperability of cloud environment. Cloud Computing. pp. 69-79.

      [8] Moore, G. C., and Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–221.

      [9] Scale, M.-S. E. (2009). Cloud computing and collaboration. Library Hi Tech News, Vol. 26 (9), pp. 10 – 13

      [10] Sharma, S and Rai,A. (2013). Adopting IS process innovations in organizations: the role of IS leaders’ individual factors and technology perceptions in decision making. European Journal of Information Systems. Advance online publication 20 August 2013;doi: 10.1057/ejis.2013.24

      [11] Vaquero, LM, Rodero-Merino, L, Caceres, J. and Lindner, M (2009). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review39(1), pp. 50-55.

      [12] Patel, Ahmed and Ali Seyfi, Yiqi Tew, Ayman Jaradat, (2011) "Comparative study and review of grid, cloud, utility computing and software as a service for use by libraries", Library Hi Tech News, Vol. 28 Issue: 3, pp.25-32, doi: 10.1108/07419051111145145.

      [13] Wasike, Jotham Milimo and Lawrence Njoroge, (2015) "Opening libraries to cloud computing: a Kenyan perspective", Library Hi Tech News, Vol. 32 Issue: 3, pp.21-24, doi: 10.1108/LHTN-09-2014-0072.

      [14] Makori, Elisha Ondieki (2016) "Exploration of cloud computing practices in university libraries in Kenya", Library Hi Tech News, Vol. 33No. 9, pp.16-22, doi: 10.1108/LHTN-11-2015-0077.

  • Downloads

  • How to Cite

    Khaled Alfawaz, D., ., ., & ., . (2018). Cloud Computing Applications in Saudi Arabia with its Main Challenges. International Journal of Engineering & Technology, 7(4.16), 106-110. https://doi.org/10.14419/ijet.v7i4.16.21789