Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq

View through CrossRef
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing. In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq. Consequently, many countermeasures are proposed. Descriptive research methodology is adopted in this research. The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.
Title: Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq
Description:
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere.
In addition, many other features and services can be offered to customers.
However, cloud computing still suffers many threats which may cause vulnerabilities.
Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality.
Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing.
In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq.
Consequently, many countermeasures are proposed.
Descriptive research methodology is adopted in this research.
The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.

Related Results

Cloud Computing Trends: A Literature Review
Cloud Computing Trends: A Literature Review
This study is a literature review on cloud computing cloud computing trends as one the fastest growing technologies in the computer industry and their benefits and opportunities fo...
Resource Allocation in Cloud Computing Environment using AHP Technique
Resource Allocation in Cloud Computing Environment using AHP Technique
Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and...
Iraq’s archive fever
Iraq’s archive fever
This article contemplates Iraq’s archive fever, a repositioning of Freud’s death-drive as prescribed by Jacques Derrida, to contextualize the feverish obsession with Iraq’s archive...
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
As the number of context-aware and unique data extracting and computing has grown leaps and bounds, paving way to their application in many platforms, Internet of Things (IoT) has ...
L'éducation des enfants venus de pays étrangers en Hollande
L'éducation des enfants venus de pays étrangers en Hollande
The adoption-organizations pleaded for a reform of the adoption-legislation in the Netherlands in 1956. It was hardly a concern of the politics. The number of Dutch children ...
The North Iraq Dataset (NIDS) files: Northern Iraq under Bathist rule, 1968‐911
The North Iraq Dataset (NIDS) files: Northern Iraq under Bathist rule, 1968‐911
The first archival collection from Saddam Hussein’s regime to receive the attention of researchers in the early 1990s was the large number of documents secured by Iraqi Kurdish reb...
Contemporary Terrorist Challenges and Threats in Europe
Contemporary Terrorist Challenges and Threats in Europe
This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a un...
The art of nature in Iraq’s marshes: Images of the occupation
The art of nature in Iraq’s marshes: Images of the occupation
In August 2003, Iraqi exile Zaid Kubra returned to Baghdad to restore and conserve the country’s marshes, once drained by Saddam Hussein, as the signature emblem for the new state....

Back to Top