The document discusses factors that influence cloud computing adoption among small and medium enterprises (SMEs) using the Technology Organization Environment (TOE) framework. It analyzes previous research applying the TOE framework to understand cloud adoption. The TOE framework identifies three contexts that influence technology adoption - technological, organizational, and environmental. The document develops a three-layer hierarchy of factors within each context based on a literature review. It designs questionnaires to assess the significance of each factor on cloud adoption among SMEs in Bangladesh. An analysis of the questionnaires finds that technological factors have the strongest influence on cloud adoption decisions among SMEs.
Information Systems in Global Business Todaytvto1381
Explain why information systems are so essential in business today.
Define an information system from both a technical and a business perspective.
Identify and describe the three dimensions of information systems
Information Systems in Global Business Todaytvto1381
Explain why information systems are so essential in business today.
Define an information system from both a technical and a business perspective.
Identify and describe the three dimensions of information systems
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Economist Intelligence Unit: Preparing for Next-Generation CloudHitachi Vantara
Preparing for next-generation cloud: Lessons learned and insights shared is an Economist Intelligence Unit (EIU) research programme, sponsored by Hitachi Data Systems. In this report, the EIU looks at companies’ experiences with cloud adoption and assesses whether the technology has lived up to expectations. Where the cloud has fallen short of expectations, we set out to understand why. In cases of seamless implementation, we gather best practices from firms using the cloud successfully.
Over the last decade, cloud computing has transformed the market for IT services. But the journey to cloud adoption has not been without its share of twists and turns. This report looks at lessons that can be derived from companies' experiences implementing cloud computing technology.
Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company’s resources such as capital and knowledge based assets. Hither to no much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to take up these challenges. Traditional contracts and licensing agreements may not provide adequate legal resources and remedies normally associated with the layers of protection for corporations. Intellectual Property, Foreign Direct Investments (FDI) and corporate governance issues have to be fully explored and practiced in domestic and international markets. So this paper discusses the need of establishment of Law and judicial framework of policies to the services embedding cloud computing technology, besides this it also addresses legal issues and existing policies adopted by different countries.
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
The determinants of cloud computing adoption in saudi arabiacsandit
There is a large volume of published studies investigating the factors that affect cloud adoption.
However, there are very few studies which investigate cloud computing adoption in
technologically developing countries and one focus of the research was to examine whether the
factors which influence cloud computing adoption in technologically developed countries also
apply in technologically developing countries. The research presented in this paper builds on
the diffusion of innovation theory (DOI) and the Technology-organisation-environment (TOE)
framework in order to investigate the factors which influence cloud adoption. Fourteen
hypothesis were developed from the literature on cloud adoption and were examined in the
research. Data was collected by using a web-based questionnaire and was analysed using a
range of statistical measures. This paper discusses the design and implementation of the study,
the data analysis and conclusions from the analysis and compares the findings of this study with
the findings of similar studies in technologically developed countries. The study shows that
there are some similarities as well as some differences in the factors that affect cloud adoption
between technologically developed countries and technologically developing countries.
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIAcscpconf
There is a large volume of published studies investigating the factors that affect cloud adoption. However, there are very few studies which investigate cloud computing adoption in technologically developing countries and one focus of the research was to examine whether the factors which influence cloud computing adoption in technologically developed countries also apply in technologically developing countries. The research presented in this paper builds on the diffusion of innovation theory (DOI) and the Technology-organisation-environment (TOE) framework in order to investigate the factors which influence cloud adoption. Fourteen hypothesis were developed from the literature on cloud adoption and were examined in the research. Data was collected by using a web-based questionnaire and was analysed using a range of statistical measures. This paper discusses the design and implementation of the study, the data analysis and conclusions from the analysis and compares the findings of this study with the findings of similar studies in technologically developed countries. The study shows that there are some similarities as well as some differences in the factors that affect cloud adoption between technologically developed countries and technologically developing countries.
Besides the benefits are there possible challenges government agencies are likely to encounter should they
decide to adopt cloud computing? What strategies should be deployed to overcome the inhibitors of cloud
computing? These are but few questions this paper aims to investigate. Studies have shown that, cloud
computing has become a strategic direction for many government agencies and is already being deployed
in many critical areas of the government's cyber infrastructure. The benefits and the challenges of cloud
adoption have heightened interest of academic research in recent times. We are however uncertain, per
literature factors that hinder successful cloud adoption especially in the Ghanaian context. We posit that,
understanding the challenges of cloud adoption and overcoming them must accompany the use of the
technology in order to prevent unwanted technical consequences, and even greater problems from
government information management. This study is based on unstructured interviews from selected
government agencies in Ghana. The study is grounded on the theory of technology, organization and
environment (TOE) framework. Major inhibiting factors identified include lack of basic infrastructure for
cloud take-off, data security, unreliable internet connectivity, and general lack of institutional readiness
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
Cloud computing promises good opportunities for economies around the world, as it can help reduce capital expenditure and administration costs, and improve resource utilization. However there are challenges regarding the adoption of cloud computing, key amongst those are security and privacy, reliability and liability, access and usage restriction. Some of these challenges lead to a need for cloud computing policy so that they can be addressed. The purpose of this paper is
twofold. First is to discuss challenges that prompt a need for cloud computing policy. Secondly, is to look at South African ICT policies and regulatory laws in relation to the emergence of cloud computing. Since this is literature review paper, the data was collected mainly through literature reviews. The findings reveals that indeed cloud computing raises policy challenges that needs to be addressed by policy makers. A lack of policy that addresses cloud computing challenges can
negatively have an impact on areas such as security and privacy, competition, intellectual property and liability, consumer protection, cross border and juridical challenges.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Economist Intelligence Unit: Preparing for Next-Generation CloudHitachi Vantara
Preparing for next-generation cloud: Lessons learned and insights shared is an Economist Intelligence Unit (EIU) research programme, sponsored by Hitachi Data Systems. In this report, the EIU looks at companies’ experiences with cloud adoption and assesses whether the technology has lived up to expectations. Where the cloud has fallen short of expectations, we set out to understand why. In cases of seamless implementation, we gather best practices from firms using the cloud successfully.
Over the last decade, cloud computing has transformed the market for IT services. But the journey to cloud adoption has not been without its share of twists and turns. This report looks at lessons that can be derived from companies' experiences implementing cloud computing technology.
Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company’s resources such as capital and knowledge based assets. Hither to no much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to take up these challenges. Traditional contracts and licensing agreements may not provide adequate legal resources and remedies normally associated with the layers of protection for corporations. Intellectual Property, Foreign Direct Investments (FDI) and corporate governance issues have to be fully explored and practiced in domestic and international markets. So this paper discusses the need of establishment of Law and judicial framework of policies to the services embedding cloud computing technology, besides this it also addresses legal issues and existing policies adopted by different countries.
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
The determinants of cloud computing adoption in saudi arabiacsandit
There is a large volume of published studies investigating the factors that affect cloud adoption.
However, there are very few studies which investigate cloud computing adoption in
technologically developing countries and one focus of the research was to examine whether the
factors which influence cloud computing adoption in technologically developed countries also
apply in technologically developing countries. The research presented in this paper builds on
the diffusion of innovation theory (DOI) and the Technology-organisation-environment (TOE)
framework in order to investigate the factors which influence cloud adoption. Fourteen
hypothesis were developed from the literature on cloud adoption and were examined in the
research. Data was collected by using a web-based questionnaire and was analysed using a
range of statistical measures. This paper discusses the design and implementation of the study,
the data analysis and conclusions from the analysis and compares the findings of this study with
the findings of similar studies in technologically developed countries. The study shows that
there are some similarities as well as some differences in the factors that affect cloud adoption
between technologically developed countries and technologically developing countries.
THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIAcscpconf
There is a large volume of published studies investigating the factors that affect cloud adoption. However, there are very few studies which investigate cloud computing adoption in technologically developing countries and one focus of the research was to examine whether the factors which influence cloud computing adoption in technologically developed countries also apply in technologically developing countries. The research presented in this paper builds on the diffusion of innovation theory (DOI) and the Technology-organisation-environment (TOE) framework in order to investigate the factors which influence cloud adoption. Fourteen hypothesis were developed from the literature on cloud adoption and were examined in the research. Data was collected by using a web-based questionnaire and was analysed using a range of statistical measures. This paper discusses the design and implementation of the study, the data analysis and conclusions from the analysis and compares the findings of this study with the findings of similar studies in technologically developed countries. The study shows that there are some similarities as well as some differences in the factors that affect cloud adoption between technologically developed countries and technologically developing countries.
Besides the benefits are there possible challenges government agencies are likely to encounter should they
decide to adopt cloud computing? What strategies should be deployed to overcome the inhibitors of cloud
computing? These are but few questions this paper aims to investigate. Studies have shown that, cloud
computing has become a strategic direction for many government agencies and is already being deployed
in many critical areas of the government's cyber infrastructure. The benefits and the challenges of cloud
adoption have heightened interest of academic research in recent times. We are however uncertain, per
literature factors that hinder successful cloud adoption especially in the Ghanaian context. We posit that,
understanding the challenges of cloud adoption and overcoming them must accompany the use of the
technology in order to prevent unwanted technical consequences, and even greater problems from
government information management. This study is based on unstructured interviews from selected
government agencies in Ghana. The study is grounded on the theory of technology, organization and
environment (TOE) framework. Major inhibiting factors identified include lack of basic infrastructure for
cloud take-off, data security, unreliable internet connectivity, and general lack of institutional readiness
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
Cloud computing promises good opportunities for economies around the world, as it can help reduce capital expenditure and administration costs, and improve resource utilization. However there are challenges regarding the adoption of cloud computing, key amongst those are security and privacy, reliability and liability, access and usage restriction. Some of these challenges lead to a need for cloud computing policy so that they can be addressed. The purpose of this paper is
twofold. First is to discuss challenges that prompt a need for cloud computing policy. Secondly, is to look at South African ICT policies and regulatory laws in relation to the emergence of cloud computing. Since this is literature review paper, the data was collected mainly through literature reviews. The findings reveals that indeed cloud computing raises policy challenges that needs to be addressed by policy makers. A lack of policy that addresses cloud computing challenges can
negatively have an impact on areas such as security and privacy, competition, intellectual property and liability, consumer protection, cross border and juridical challenges.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGijitcs
This paper discover the most administration security issues in Cloud Computing in term of trustworthy and gives the reader a big visualization of the concept of the Service Level Agreement in Cloud Computing and it’s some security issues. Finding a model that mostly guarantee that the data be saved secure within setting for factors which are data location, duration of keeping the data in cloud environment, trust between customer and provider, and procedure of formulating the SLA.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
It auditing to assure a secure cloud computingingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
Trends in cloud computing
TRENDS IN CLOUD COMPUTING
ABSTRACT
Cloud computing involves the use of remote servers that are hosted on the Internet. The technology has been a game-changer in the world of technology as it has dramatically influenced the aspect of storing, processing, and also managing data. Besides, technology has witnessed a couple of trends that have attracted the attention of crucial technology players. In line with this, the paper will investigate the various trends in cloud computing.
Keywords: cloud computing, social networking, Security, IaaS, PaaS, SaaS.
INTRODUCTION
Cloud computing is one of the newest areas of interest in the world of computing. The technology entails the use of cloud services to store, manage, process, and even ensure that data is secure. Cloud computing involves the use of remote servers that are hosted on the Internet. As a result, the technology has seen an increased reduction of the use of physical servers and computers by companies in storing, managing, and also processing their data. In recent days, technology has witnessed several changes or, rather, trends that will be covered briefly in the paper. Cloud is a collective term for a massive number of possibilities and developments. It is more of a practical innovation than an invention that combines several other inventions to become something compelling and new. Cloud computing puts together and merges several technologies that already exist together, where they include virtualization, time-sharing, web interactivity, browser interface, and high bandwidth networks. Cloud computing helps companies and businesses to transform their initial existing server infrastructures to form a dynamic environment that leads to the expansion and reduction of the server’s capacity. A cloud computing platform, configures, depravations, and reconfigures the servers. Many issues arise firm adopting the cloud computing platform, and the articles below discuss some of the main issues associated with cloud computing.
LITERATURE REVIEW
Different studies, such as Varghese & Buyya (2018), recognize that cloud computing is one of the booming technologies. The technology has witnessed immense growth rates over the last couple of years. Notably, more companies and institutions continue to adopt cloud services. Besides, the use of Iaas, Paas as well as SaaS continues to increase.
Additionally, Varghese & Buyya (2018) express their optimism that the revenue earned from cloud technology will continue to grow. Also, cloud services will continue to advance. For instance, different companies have embarked on the process of adopting private and hybrid technologies, which are much significant in storing, processing, and also managing big company data. Cloud asserts that conceptually the "cloud" at the Internet conceals to be had computing resources and offers an elegant interface, through which customers might be capable of using the whole World Wide Web as a powerful personal ...
Cloud Computing Role in Information technologyKHakash
Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
Information technology (IT) is part of the value chain and corporate strategy of companies (PORTER, 1998). This area has been highlighted by its rapid development being responsible for several technological innovations, which affect the strategic positioning of companies. In the 1970s the computing model based on both proprietary technology and high cost large computers, known as mainframes, contributed to the formation of oligopolies in companies providing IT services which provided data processing to consumer companies.
Similar to Technology organization environment framework in cloud computing (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Technology organization environment framework in cloud computing
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 716∼725
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.13871 Ì 716
Technology organization environment framework
in cloud computing
Iqbal Ahmed
Department of Computer Science and Engineering, University of Chittagong, Bangladesh
Article Info
Article history:
Received Aug 12, 2019
Revised Jan 2, 2020
Accepted Feb 7, 2020
Keywords:
Cloud computing
SMEs
Technology adoption
TOE framework
ABSTRACT
Cloud Computing is a rapidly emerging technology over the last few years, that has
abolished the burden of purchasing heavy hardware and software. Cloud computing
has been advantageous to Small and Medium-sized Enterprises (SMEs), though many
SMEs have not adopted to delve into its appealing benefits. To increase the cloud
adoption rate in these Enterprises, the most important thing is to understand the
aspects which influence the cloud adoption. The article focuses on these factors, which
influence the use of cloud services by establishing the three layer hierarchical frame-
work based on the grounded on the Technology Oriented Environmental (TOE)
framework through systematic literature review. Because cloud-based solutions offer
numerous benefits for companies, they have precious cloud determinants. This paper
therefore took into account the Technology Organization Environment TOE model for
Cloud Computing adoption. In addition, the questionaries designed at the end also
indicate the significant connection in the decision of adoption between three context
of TOE. Moreover, the designed questionaries has been used for the analysis of cloud
computing adoption in Bangladeshi SMEs.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Iqbal Ahmed,
Department of Computer Science and Engineering,
University of Chittagong, Chittagong-4331, Bangladesh,
Email: iqbal.ahmed@cu.ac.bd
1. INTRODUCTION
Nowadays, cloud computing has been a major agenda in the computing field. Cloud computing is the
on-demand delivery of computer system resources as a service over the network [1]. The features of cloud
computing, including scalability, flexibility and pay-per-usage model [2] has the potential to influence the
various aspects of social and economic activities globally in various types of enterprises. Cloud computing
offers enormous benefits to all organizations and enterprises, including SMEs [3]. SMEs are the enterprises
in which amount of personnel are less than certain limits, and they are control the data of high sensitivity.
Some cases of sensitive data which is controlled by SMEs are: data of intelligence agencies and government
federal, financial data of companies, purchase contracts, company databases, de-identified research data, bank
associated data like bank accounts, pin, passwords, balances and dealings, trade secrets, email accounts, drug
formulas, accounting records and source codes [4]. The adoption of cloud computing is growing rapidly as it
allows enterprises to concentrate on their essential business events, and, thus, efficiency is improved [5]. An
adequately adopted cloud provides a plenty of benefits to the enterprises such as unlimited computing power,
easy access of data and applications, lower IT expenditure, and build up competitive advantage. Recently,
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
2. TELKOMNIKA Telecommun Comput El Control Ì 717
SMEs has shown a great concern in including cloud computing to their overall Information technology (IT)
strategies. A recent report by Mckinsey [6] on the adoption rate of cloud service by SMEs informed that, 70%
of SMEs have formerly bought at least two cloud service, and 40% have bought six or more cloud services.
Nevertheless the touted benefits of cloud computing, its adoption and implementation in SMEs is faced with
many challenges including national and international regulations, shortage of industry-specific conformism
to principles, security and privacy threats [7-9]. Due to these challenges, some enterprises are quiet anxious
around the threats of shifting business-critical applications to the cloud. There is therefore the need to under-
stand the factors that can influence their rate of adoption in companies in order to grow in cloud computing.
This study will examine the perception of IT professionals as regards cloud services in the context
of the Technology Organization Environment (TOE) and IT professionals are concerned about their adoption
[10]. Recently, adoption of technology has become the most advanced area for research in Information Systems.
Most researchers focused on the new factors that affect technology adoption at both the individual, the organiza-
tional levels. Various theories and models established to explain technological adoption, assuming new factors
in all practicable areas. These include Reasoned Action Theory (ART), Planned Conduct Theory, Technology
Model for Acceptance (TAM), comprehensive TAM, unified technology (UTAUT) and the motivational model,
the Theory of Innovation Dissemination, social cognitive theory and Technological Environment Organization
(TOE). Much research conducted at the individual level of technology adoption and a few organizational tasks.
This study focuses mainly on the organizational framework, such as the Environment Technology Organization
(TOE). The context of an organization has a big effect on accepting and carrying out the revolution. TOE is the
framework covering three different roots in the perspective of an organization in the decision-making process.
Technological, organizational and environmental contexts are these fundamental principles. In this field of
technical adoption, it takes an hour to look at future research opportunities. The TOE Framework contributes
too many areas by explaining different technological developments, such as e-commerce, business resource
planning, green IT Start-Up, cloud computing, Small and medium-sized companies (SMEs), etc.
2. BACKGROUND STUDY
2.1. Technology Adoption
Technology adoption for information systems is a mature field of research. In [11]defined technology
adoption as the stage in which an individual or an organization will be able to choose a technology for use.
The problems relating to technology adoption have gained more prominence in recent days with rapid progress
in technology innovations of every imaginable field. Great investment for the introduction of new technologies,
made by organizations and governments that can bring a change in the life of users. However, such investments
cannot produce results unless the intended users adopt innovations. The evolution of this field of research in
information systems must understood and future research opportunities examined [12].
Figure 1. Common Cloud Computing Adoption Models
Technology organization environment... (Iqbal Ahmed)
3. 718 Ì ISSN: 1693-6930
2.2. Cloud Computing
According to National Standards and Technology Institute (NIST) ”cloud-based computing as a model
that provides fast, convenient on-demand network access to an interaction with a shared bundle of computer
resources configurable (e.g., networks, Servers, Storage, Applications, Services). It fosters availabilities that are
composed of five basic features (self service on-demand, broad network access, pooling of resource sources,
rapid elasticity and measured service) three models: (Software as a Service (SaaS), Platform as a Service
(PaaS), Infrastructure as a Service (IaaS). A variety of cloud services have been available over the past several
years. The cloud deployment models in particular need to be taken into account for a cloud infrastructure
installation organization. Here, one of the four models can be selected. A private cloud provides organizational
computing services to members of a single organization. Your cloud system is located in your own data center
or via an internet data center, which is rented out and operated on-site or managed on an individual basis by
a third party [13]. The community cloud provides computer services to enable collaboration for a mission,
security or compliance for a specific purpose. Public clouds may be operated by any public cloud company,
such as Amazon, Microsoft and Sales Force [14]. The cloud is not limited to one person or a company.
There is a hybrid cloud model running on two or more models [15]. As computer services are required, the
market continues to increase for companies that cover latency-free and worldwide safe services [16]. Unbiased,
companies have started considering how to use hybrid IT in a complex IT environment by combining IT systems
and services? Therefore, companies need a systemic approach to set key cloud computing models and IT
network values should help to effectively manage cloud computing systems [17].
2.3. Adoption Methods and Theories
There are a number of technological innovation and technological adoption theories and studies.
Various theories and models for clarifying the occurrences of technological adopt hypothesize new factors
in all practicable fields [18]. Utmost common theorization is Technology Acceptance Model (TAM), Theory of
Planned Behavior (TPB), Unified Theory of Acceptance and Use of Technology (UTAUT) and TOE framework
(Technology- Organization-Environment). The Figure 1 shows few common cloud computing adoption models
and Table 1 presents their brief descriptions.
Table 1. Adoption methods and theories
Adoption Models Developed By Published Year Used As
Diffusion of Innovation (DOI) Everett Roger In 1960 Individually/Organizationally
Theory of Reasoned Action (TRA) Fishbein and Ajzen In 1975 Individually
Social Cognitive Theory Albert Bandura In 1986 Individually/Organizationally
Technology Acceptance Model (TAM) Davis, Bagozzi and Warshaw In 1989 Individually/ Organizationally
Technology Organization Environment (TOE) Fleischer and Tornatzky In 1990 Individually/Organizationally
Theory of Planned Behavior (TPB) Ajzen In 1991 Individually
Motivation Model Davis et al. In 1992 Individually
Extended TAM Venkatesh and Davis In 1996 Individually/Organizationally
Unified Theory of Acceptance and Use of
Technology (UTAUT)
Venkatesh and Morris In 2003 Individually/Organizationally
2.4. Technology Organization Environment (TOE)
Technological Organizinng Environmental (TOE) framework is proposed to study the use of tecnolog-
ical innovations [19]. They maintain that the decision to adopt technological innovation based on environmental
and organizational factors and technological characteristics. This framework therefore envisages a three-fold
framework for technological innovation assumption and execution: the technical, the structural and the envi-
ronmental context.
(a) Technological Context The technological background refers to the relevant technologies in the enterprise.
This includes existing, company- related tools and emerging technologies.
(b) Organizational Context The organizational perspective describes the organizational characteristics. Joint
organizational characteristics include corporate size, centralizing degree, formality, management
structure complexity, Quality of its human resources and domestic slack resources [20]. Organizational
characteristics may also reduce or make it possible for technological innovations to be adopted
and implemented.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
4. TELKOMNIKA Telecommun Comput El Control Ì 719
(c) Environmental Context The environment is the space where an organization carries out its activities. This
includes occupational associates, participants and the administration [21]. It is outside of an organization,
which has restrictions and prospects on high-tech revolution. This makes the TOE structure widely
applicable in various disciplines, because researchers can choose each dimension based on innovation
and organizational characteristics such as the work of [22]. In contrast to certain theories or models in
the study of Information Systems, the TOE Framework is a generic theory which only mentions several
aspects of adoption, without stating the factors of each dimension.
3. THE PROBLEM STATEMENT
There is plenty of study at the individual level of technology adoption and a few organizational activ-
ities. The purpose of this paper is to conduct a collected , systematic review analysis to classify critical aspects
of information technology adoption in cloud computing organizations under the roof TOE framework.
4. RESEARCH AND REVIEW ANALYSIS METHOD
Followed by the methodology of systematic literature review, research documents with proper key-
words and buzzwords are downloaded from various authentic sources. The following electronic databases were
retrieved for the literature search, chosen due to their content being related to the discipline: Google Scholar,
academic databases including IEEEXplore, Springer Link, ScienceDirect, ACM Digital Library, Elsevier etc.
The next Figure 2 gives the idea of systematic review process.
Figure 2. The Systematic Literature Review Process
This paper examined what most of the researchers in this field were focusing on. In the initial search,
the paper focused on keywords like model of technology adoption, theories and model of adoption in SMEs
etc. Hottest documents have again searched online to contain any missing documents, which have been left out
due to new keywords. Since we wanted to look over the years and not apply these theories and models, we have
collected papers that provide a general overview of some of the main theories evolved over the years. Seminar
and Conference papers on these theories have been downloaded and thoroughly studied to understand the TOE
in the domain of Cloud Computing.
5. SYSTEMATIC LITERATURE REVIEW
Although some identified factors may vary from study to research in three contexts, TOE has a strong
theory and consistent support [23]. For example, In [24], they regarded the TOE as the main historical evidence
of e-business diffusion, while in [25] proposed the TOE model to understand the use of RFID by manufacturing
companies that want to increase the visibility and efficiency of the supply chain. SMEs use the green practices
to analyze the drivers that influenced by TOE Framework. In the [26], results have demonstrated that SMEs’
use of Enterprise Adoption (EA) affects technology, organization and environment, concentrated on aspects
that affect SMEs adoption of Customer Relationship Management (CRM) and e-procurement systems. This
Technology organization environment... (Iqbal Ahmed)
5. 720 Ì ISSN: 1693-6930
implies that the TOE model is a powerful tool for foreseeing how SMEs will accept EA. The factors of use of
CRMs in hospitals have been discussed in [27]. The TOE framework was used as a test model by [28], who
carried out a query to investigate electronic commerce factors among mid-to small- scale (small and medium)
926 companies in Vietnam. Mobile corporations have been investigating through TOE conjunction [29].
The TOE framework used to analyze and develop hierarchical dynamics that stimulus the use of cloud
computing in companies [30]. Following an analysis of factors, the most important effects on companies,
the organization, and the environment, have been found in technology. These findings have shown that TOE
is an appropriate framework for research on Information Technology (IT) system adoption. The results of
the study may also allow companies to dedicate resources to develop the successful rates of cloud computing
according to the mass of each factor, with lower costs and higher efficiency. Furthermore, results for cloud
providers can provide information on the needs of customers and offer appropriate operations and marketing
strategies. This defines the three-factor hierarchy that influences cloud computing adoption in companies which
represents in Table 2.
Table 2. Three layer hierarchy factors affecting EA of cloud computing
Technology organization environment (toe)
Technology
Related Improvement
- Cost Advantage
- Efficiency
- Flexibility
- Capacity Management
- Robustness
- Security Concern
Compatibility
- Easy to use
- Usefulness
Organization
Top Management Support
- Vision for Long term
- Commitment of Resources
- Establishing Goal
Organization Readiness
- Financial Readiness
- Technological Infrastructure
Environment
Competitive Pressure
- Industrial Structure Variations
- Relatively Economic Position Increase
- New Business Peer Group
Administration Regulation
- Management Inducement
- Regulation, Strategy
Technology Support Infrastructure
- Access to the Vendor
- Suitable User and Technical Assistance
- Provider Relationship
6. TOE IN CLOUD COMPUTING ADOPTION REVIEW ANALYSIS
Most cloud adoption studies expending the TOE framework define a technological context in terms of
innovative technology features. A brief review of articles using the TOE Framework to understand cloud
adoption described in Table 3. This paper shows how different perspectives can consolidated through an
integrated approach to the understanding of cloud organizations. With four key themes, cloud offerings and
their compatibility with business needs can reviewed by organizations. Consequently, this article affects both
research and practice. Additionally, the quick checklist use to see how the cloud organization’s different
aspects work. Further, this paper can help to understand how different factors affect cloud adoption probabilities
in different SMEs. The following are sample questions designed from the three perspectives, which must
comply with the Technology Organization Environment (TOE) selection when adopting cloud computing.
The designed questionnaires represents in Table 4
The adoption of TOE in cloud computing for 20 SMEs in Bangladesh are analyzed under the three
context (Technical, Organizational and Environmental). All these SMEs are ready to adopt cloud computing
the designed questionnaire of Table 4 has been used to them. The analysis of TOE adoption in cloud computing
for 20 SMEs of Bangladesh are shown in next Figure 3.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
6. TELKOMNIKA Telecommun Comput El Control Ì 721
Table 3. TOE in Cloud Computing and Review Analysis with four main theme
Papers Domain Method Technology
Context
Organization
Context
Environment
Context
Low, Chen
et al. [31]
Business A framework based sur-
vey collected data from
111 high-tech companies
in Taiwan.
Relative Benefit, Com-
plexity and Compatibility
Support for top
management, firm
size, readiness for
technology
Competitive Pres-
sures and pressure
from trading part-
ners
Nasir and
Niazi [32]
Business Effectiveness of the
CAAM in assessing
readiness of the organiza-
tion to implement cloud
computing is assessed
through 3 case studies
Not Significant Learning Capacity,
IT Capacity of the
organization
Competitive
pressure, Net-
work dominance
expectations
Borgman,
Bahli et al.
[33]
Business In semi-structured inter-
views, this qualitative re-
search project compiled
data in 15 different SMEs
by adopting the theoretical
TOE framework.
Compatibility, Complex-
ity, trail ability, relation
advantage
Innovation and
knowledge prior to
that.
Size, top manage-
ment support, in-
novation, IT expe-
rience prior to im-
plementation
Borgman,
Bahli et al.
[33]
Business Developed an enlarged
TOE framework in a
number of hypotheses
carried out by 24 global
firms in several industries
Compatibility and Rela-
tive Advantage
Top management
assistance, firm size
and business user
IT expertise
Environmental
Competition and
regulation
Lorraine
Morgan
[34]
Business 3 case studies by service
providers and their cus-
tomers in literature will
build on this research,
which does not address the
complex and diverse na-
ture of adoption in existing
cloud technologies
Compatibility and Com-
plexity, relative advantage
and ability to test
IT executives
fear of losing
control of their
IT environment
is necessary for
collaboration and
openness, increased
traceability and
auditability
Risk assessment
and safety and
legal issues
Mathews
Z. Nkhoma
[35]
Business The quantitative approach
for this study is the devel-
opment and validation of a
conceptual theory model
Compatibility, Security,
Reliability and Availabil-
ity, Extension of existing
applications
Lack of compliance
with IT standards
Complexities
in the hidden,
Shared best
practices, Cost
Flexibility, market
adaptability
Amin
Saedi [36]
Business
Technical
The researcher analyzed
the data after gathering the
data from the interview
Relative benefits, Compat-
ibility, Accessibility, Data
Security, Privacy Manage-
ment
Compatibility, ac-
cessibility, privacy
and data security
deficiencies
Savings in costs,
relative benefits,
compatibility,
accessibility, se-
curity and privacy
impairments
Hsu, Ray et
al. [37]
Business They have empirically
tested their research
model with 200 Taiwanese
companies
Benefits received, business
issues
Capacity for IT Not Significant
Technology organization environment... (Iqbal Ahmed)
7. 722 Ì ISSN: 1693-6930
Table 3. TOE in Cloud Computing and Review Analysis with four main theme
Papers Domain Method Technology
Context
Organization
Context
Environment
Context
Ezer Osei
Yeboah-
Boateng
[38]
Business In order to overcome the
sample selection error,
random sampling and
purposeful sampling were
used.
Cloud service testing
capacity, provision of
essential IT infrastructure
and resources, existing
system compatibility,
strength of in-built
safety systems, employee
learning capacity, limited
technological expertise
in similar technologies,
non-performance of cloud
services in support of
operational operations
Top management
support and partici-
pation, resistance to
new technologies,
work, culture and
style conformity,
organizational
structure and size
impacts and an
Initial Industry
Adopters
Providers appro-
priate user and
technical support,
the selection of
qualified and
expert cloud
vendors, market
influence, nature
of industry,
relations be-
tween suppliers,
government and
competitors
Gangwar,
Date et al.
[15]
Business Data was gathered from
280 IT, manufacturing and
finance companies in India
through a questionnaire
Compatibility, Complex-
ity, relative benefit
Preparation, Top
management,
Training and
Education
Support for Com-
petitive pressure
and trade partners
Nedev [39] Business A case study is carried
out from information col-
lected by a large multi-
national company through
interviews with four IT
managers. The results
for the studied popula-
tion can only be gener-
alized by the qualitative
method and comfort sam-
pling technique
A relative benefit, compat-
ibility, redundancy, safety
and performance
Pressure on com-
petitive and busi-
ness partners
Size and techno-
logical prepared-
ness of a company
Table 4. TOE questioner of cloud computing
TOE of cloud adoption
Technology
- Does the cloud support the systems that are complex?
- How does this cloud supplier have safety mechanisms and expertise?
- Could the cloud replicate the security measures?
- Is the cloud capable of interfacing seamlessly with other legacy cloud applications?
Organization
- How well the top managers are aware of the advantages and risks of moving to the cloud?
- How large would the project be depending on the company’s size?
- How well qualified are our IT resources for cloud-based application issues?
- How dramatically the system’s working environment will change for cloud employees?
- Is the cloud-based work environment a new way to do things?
Environment
- How far the cloud-based application has entered the industry?
- Do the cloud already been adopted by important competitors?
- Will pass all regulatory and audit controls in the cloud based system?
- How many cloud-based suppliers have industry expertise and organizational application?
- Do these suppliers have references in the industry or in the specific application?
- A large number of suppliers can be chosen?
- Can cloud vendors replicate or guarantee current terms and conditions?
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
8. TELKOMNIKA Telecommun Comput El Control Ì 723
Figure 3. Analysis of TOE framework in Bangladesh’s SMEs
7. CONCLUSION
The ultimate objective of this study was to conceptualized the link between the TOE framework and
the decision of organizations (SMEs) to adopt cloud computing and all three factors that are positively linked
to the decision to adopt cloud computing. In addition, the analysis of the review was significant to understand
the factors to adopt cloud computing in TOE framework for many recent days organizations. This paper is not
free of limiting factors, it only looked for academic papers, white papers, magazine articles, other academic
literature databases and papers from forward and backwards searches, whose inclusion would help capture more
cloud adoption problems for different types of organizations. In this study, from application to environment,
various micro as well as macro level aspects considered in the integrated perspective. Finally, the quick
checklist can serve as the roadmap to support organizations/SMEs, using the relevant questions, in exploring
four distinction aspects of cloud acceptance.
REFERENCES
[1] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic “Cloud Computing and emerging IT
platforms: Vision, hype, and reality for delivering computing as the 5th
utility” , Future Generation
Computer Systems 25, no. 6, pp.599-616, 2009.
[2] A. A. Dahiru, Julian M. Bass, and Ian K. Allison, “Cloud Computing: A comparison of adoption issues
between UK and Sub-Saharan Africa SMEs” , In Eur. Mediterr. Middle East. Conf. Information System,
vol. 2014, no. 2010, pp. 1-12, 2014.
[3] D. Benton, “How cloud computing will influence banking strategies in the future” , 2010: 2014. Retrieved
13 March 2019, from https://www.accenture.com/us-en/industries/banking-index.
[4] Misra, Subhas Chandra, and Arka Mondal, ”Identification of a company’s suitability for the adoption of
cloud computing and modelling its corresponding Return on Investment” , Mathematical and Computer
Modelling 53, no. 3-4,pp. 504-521, 2011.
[5] Gary Garrison, Kim Sanghyum, and Robin L. Wakefield, “Success factors for deploying cloud
computing” , Communications of the ACM 55, no. 9, pp. 62-68, 2012.
[6] J. Avrane-Chopard, Th. Bourgault, A. Dubey, and L. Moodley, “Big business in small business: Cloud
Services for SMBs” , RECALL No 25, 2014.
[7] M. Armburst, Armando Fox, Rean Griffith, Anthony D Joseph, R. H. Katz, Andy Konwinski, and Gunho
Lee, “ A view of cloud computing” , Communications of the ACM, vol. 53, 2010.
[8] Thomas Kern, Jeroen Krijger, and Leslie Willcocks, “Exploring ASP as sourcing strategy: theoretical
perspectives, propositions for practice” , The Journal of Strategic Information Systems 11, no. 2, pp.153-
177, 2002.
[9] Sean Marston, Zhi Li, S. Bandyopadhay, Juheng Zhang, and Anand Ghalsasi, “Cloud Computing- The
business prespective” , Decision Support Systems 51, no. 1, pp. 176-189, 2011.
[10] A Lin and N. C. Chen, ”Cloud computing as an innovation: Percepetion, attitude, and adoption”, Inter-
national Journal of Information Management, vol. 6, no. 32, pp. 533-540, 2012.
Technology organization environment... (Iqbal Ahmed)
9. 724 Ì ISSN: 1693-6930
[11] V. H. Jr Carr, “Technology adoption and diffusion” , Technology Center for Interactive Technology, 1999.
[12] R. M. Rajesh Sharma ”A Review of Evolution of Theories and Models of Technology Adoption.” Indore
Management Journal, vol.6, no. 2, 2014.
[13] K. M. Yashpalsinh Jadeja, ”Cloud Computing - Concepts, Architecture and Challenges.” International
Conference on Computing, Electronics and Electrical Technologies, no. 12, 2012.
[14] B. P. Rimal, E. Choi, and Ian Lumb, “A Taxonomy and Survey of Cloud Computing Systems” In the
proceedings of fifth International Joint Conference on INC, IMS and IDC, pp. 44-51, 2009.
[15] H. Gangwar, and et. al, ”Understanding determinants of cloud computing adoption using an integrated
TAM-TOE model”, Journal of Enterprise Information Management, vol. 28, no. 1, pp. 107-130, 2015.
[16] W. Venters and E. A. Whitley, ”A Critical Review of Cloud Computing: Researching Desires and Reali-
ties”, Journal of Information Technology, vol 27,no. 3, pp.179-197, 2012.
[17] L. Morgan, Lero Conboy, and Kieran, ”Factors Affecting The Adoption of Cloud Computing: An Ex-
ploratory Study”, Proceedings of the 21st European Conference on Information Systems, 2013.
[18] E. Hoti, ”The technological, organizational and environmental framework of IS innovation adaption in
small and medium enterprises Evidence from research over the last 10 years”, International Journal of
Business and Management, vol 3, no. 4, pp. 1-14, 2015.
[19] J. Eveland “Technological Innovation as a Process” , 2016.
[20] K. Y. Tam, and P. Y. K. Chau, “Factors Affecting the Adoption of Open Systems: An Exploratory
Study”,Management Information Systems Research Center,vol 21, no.1,pp. 1-24, 2014.
[21] O. Portia, “Barter trading: An empirical investigation of management practices” , African Journal of
Business Management, vol. 5, no. 31, 2011.
[22] A. N. H. Dinna Amelina, Nur Fitriah Ayuning Budi, Puspa Sandhyaduhita, Rifki Shihab, “Investigating
Critical Factors ofSocial CRM Adoption Using Technology, Organization, and Environment (TOE)
Framework and Analytical Hierarchy Process (AHP)” , ICACSIS, 2016.
[23] T. Oliveira, and M. F. Martins, “Literature Review of Information Technology Adoption Models at Firm
Level” , The Electronic Journal Information Systems Evaluation, vol. 14, no. 1, pp. 110-121, 2011.
[24] K. Zhu, and K. L. Kraemer, “Post-Adoption Variations in Usage and Value of E-Business by Organiza-
tions: Cross-Country Evidence from the Retail Industry” , Information Systems Research, vol.16, issue.
1, pp.61-84, 2005.
[25] Y. M. Wang and et al., “Understanding the determinants of RFID adoption in the manufacturing industry”
, Technological Forecasting and Social Change, vol. 77, no. 5, pp. 803-815, 2010.
[26] B. Ramdani, and et al., “SMEs adoption of enterprise applications” , Journal of Small Business and
Enterprise Development, vol. 20, no. 4, pp. 735-753, 2013.
[27] P. Racherla, and C. Hu, “eCRM System Adoption by Hospitality Organizations: A Technology-
Organization-Environment (TOE) Framework”, Journal of Hospitality & Leisure Marketing, vo. 17, no.1-
2, pp. 30-58, 2008.
[28] V.H. Le, F. R Duane Truex, M. Q. Huynh, “An empirical Study of Determinants of E-commerce Adoption
in SMEs in Vietnam an economy in transition” ,Journal of Global Information Management, vol. 20, no.
3, 2012.
[29] San Mart´ın, and et al., “Factors determining firms’ perceived performance of mobile commerce” , Indus-
trial Management & Data Systems, vol. 112, no. 6, pp. 946-963, 2012.
[30] Hsin-Pin Fu, Tsung-Sheng Chang and Li-Chun Liu1, “Factor Analysis on Enterprises Adopting Cloud
Computing” , International Conference on Communications, Information Management and Network Se-
curity, 2016.
[31] C Low, and et al., “Understanding the determinants of cloud computing adoption” , Industrial Manage-
ment & Data Systems, vol.111, no. 7, pp.1006-1023, 2011.
[32] Nasir U, and M. Niazi, “Cloud computing adoption assessment model (CAAM)” , Proceedings of the
12th International Conference on Product Focused Software Development and Process Improvement, vol.
11, pp.34-37, 2011.
[33] H. P. Borgman, and et al., “Cloudrise: Exploring Cloud Computing Adoption and Governance with the
TOE Framework” , 2013 46th Hawaii International Conference on System Sciences, pp. 4425-4435, 2013.
[34] K. C Lorraine Morgan, “Factors Affecting The Adoption Of Cloud Computing: An Exploratory Study” ,
Association for Information Systems AIS Electronic Library, 2013.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020 : 716 – 725
10. TELKOMNIKA Telecommun Comput El Control Ì 725
[35] Mathews Z. Nkhoma, and Dang D, “Contributing Factors of Cloud Computing Adoption: a Technology-
Organisation-Environment Framework Approach” , International Journal of Information Systems and
Engineering (IJISE), vol.1, no.1, pp.38-49, 2013.
[36] A. Saedi, N. A Iahad, “An integrated theoretical framework for cloud computing adoption by small and
medium-sized enterprises” , Association for Information Systems AIS Electronic Library, PACIS 2013
Proceedings 48, 2013.
[37] P. F. Hsu, and et al. , “Examining cloud computing adoption intention, pricing mechanism, and deploy-
ment model” , International Journal of Information Management, vol. 34, no. 4, pp.474-488, 2014.
[38] E. O Yeboah-Boateng, and K. A Essandoh,“Factors Influencing the Adoption of Cloud Computing by
Small and Medium Enterprises in Developing Economies” , International Journal of Emerging Science
and Engineering, vol. 2, no. 4, pp. 13-20, 2014.
[39] S. Nedev, “Exploring the factors influencing the adoption of Cloud computing and the challenges faced by the
business” , BSc Dissertation, Business and ICT, Sheffield Hallam University, UK, vol, 5, 2014.
BIOGRAPHY OF AUTHOR
Iqbal Ahmed got his Bachelor of Science (BSc) Honors degree in Computer Science and
Engineering from University of Chittagong, Bangladesh in 2007 and achieved joint Master de-
gree from PERCCOM program of European Union in September 2015. He received his Master of
Complex System Engineering degree from University of Lorraine (UL), France then Master in Tech-
nology from Lappeenranta University of Technology (LUT), Finland and Master degree in Pervasive
Computing and Communication for Sustainable development from Lulea University of Technology
(LTU), Sweden. He received his Ph.D. degree from the Department of Information Science, Saga
University, Japan in 2018. He has been working as an Associate Professor in the department of com-
puter science & Engineering in University of Chittagong since August 2018. His current research
interest lies in the field of green and sustainable computing, cloud computing and information pro-
cessing. He has been awarded Cat-A scholarship of Erasmus Mundus from European Union two
times in 2010 and 2013 respectively.
Technology organization environment... (Iqbal Ahmed)