TY - JOUR
T1 - Determining factors pertaining to cloud security adoption framework in government organizations
T2 - An exploratory study
AU - Alassafi, Madini O.
AU - Alghamdi, Rayed
AU - Alshdadi, Abdulrahman
AU - Al Abdulwahid, Abdulwahid
AU - Bakhsh, Sheikh Tahir
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2019/9/19
Y1 - 2019/9/19
N2 - In wealthy developing countries like the Kingdom of Saudi Arabia (KSA), the adoption of cloud computing is progressing slowly compared to the developed countries. To accelerate the cloud computing adoption, this study takes place exploring and investigating the associated security factors with cloud computing that influence organisations' desire for adopting the services of cloud computing. This exploratory study has been conducted through two steps: (1) develop a framework based on security factors discussed in related studies and (2) validate the security factors' relationships within the developed security framework. In the validation study, an instrument was distributed to 217 IT experts in different Saudi government organisations. Correlation analysis is used to explore the relationship(s) among items and factors. The results suggested that the security factors were significantly correlated with each other. The internal consistency reliability analysis results were great. Worthy Cronbach's alpha results also indicated that the items used to measure each factor were independent measures, which are positivity correlated with one another. The key findings of the exploratory factor analysis revealed three main components named as security benefits, security risks, and security awareness. Overall, the implications of this exploratory study provide a significant contribution towards cloud adoption in Saudi organisations. The outcomes of this study will serve as valuable information for policymakers, practitioners, and researchers.
AB - In wealthy developing countries like the Kingdom of Saudi Arabia (KSA), the adoption of cloud computing is progressing slowly compared to the developed countries. To accelerate the cloud computing adoption, this study takes place exploring and investigating the associated security factors with cloud computing that influence organisations' desire for adopting the services of cloud computing. This exploratory study has been conducted through two steps: (1) develop a framework based on security factors discussed in related studies and (2) validate the security factors' relationships within the developed security framework. In the validation study, an instrument was distributed to 217 IT experts in different Saudi government organisations. Correlation analysis is used to explore the relationship(s) among items and factors. The results suggested that the security factors were significantly correlated with each other. The internal consistency reliability analysis results were great. Worthy Cronbach's alpha results also indicated that the items used to measure each factor were independent measures, which are positivity correlated with one another. The key findings of the exploratory factor analysis revealed three main components named as security benefits, security risks, and security awareness. Overall, the implications of this exploratory study provide a significant contribution towards cloud adoption in Saudi organisations. The outcomes of this study will serve as valuable information for policymakers, practitioners, and researchers.
KW - Cloud computing
KW - Saudi government organisations
KW - adoption
KW - security factors
UR - http://www.scopus.com/inward/record.url?scp=85077809973&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2019.2942424
DO - 10.1109/ACCESS.2019.2942424
M3 - Article
AN - SCOPUS:85077809973
SN - 2169-3536
VL - 7
SP - 136822
EP - 136835
JO - IEEE Access
JF - IEEE Access
M1 - 8844652
ER -