Case Study Analysis of the Use of Cloud Computing for Assessing Big Data Risks
Abstract
Risks associated with adopting big data and cloud computing and exposing sensitive information must be evaluated as usage of these technologies continues to rise rapidly within businesses. Also, the company needs to investigate the potential consequences of cyber security threats, considering the severity of those risks. There has been no comparative analysis of the risk assessment methods available to businesses in various nations. Thus, the researcher in this study asked forty people from four countries (Canada, Jordan, South Africa (SA), and the United Kingdom (UK)) questions on the risk assessment procedures at their respective organizations using semi-structured interviews. After compiling and analyzing the data, it became clear that Canada and the UK were the frontrunners in adopting big data and cloud computing. It also demonstrated that Jordan and SA are in the early phases of an evolving adoptive relationship. Recommendations are made to strengthen the organization's standing in light of the different risk assessment frameworks used in each country.
Downloads
References
K. Raja and S. M. Hanifa, "Bigdata Driven Cloud Security: A Survey.," IOP Conference Series: Materials Science and Engineering., vol. 255, no. 1, Aug 2017.
V. Rao and T. Rao, "Big Data and Its Applications," International Journal of Advanced Research in Science, Communication and Technology, vol. 2, no. 3, pp. 57-149, 15 Feb 2021.
R. P. Padhy, M. R. Patra, and S. C. Satapathy, "Cloud computing: security issues and research challenges," nternational Journal of Computer Science and Information Technology & Security (IJCSITS), vol. 1, no. 2, pp. 136-146, 2011.
Y. Sivasubramanian, S. Z. Ahmed, and V. P. Mishra, "Risk assessment for cloud computing," International Research Journal of Electronics and Computer Engineering, vol. 4, p. 6, June 2017.
P. R. Kumar, P.H. Raj, and P. Jelciana "Exploring data security issues and solutions in cloud computing," Procedia Computer Science,, vol. 125, pp. 691-697, 2018.
M. H. Raza, A. F. Adenola , A. Nafarieh, and W. Robertson, "The slow adoption of cloud computing and IT workforce," Procedia Computer Science, vol. 52, pp. 1114-1119, 2015.
C. K. Chen, and M. N. Almunawar, "Cloud Computing in Higher Education," Impact of Economic Crisis on Education and the Next-Generation Workforce: IGI Global, 2016, pp. 285-308.
S. Y. Tabassam, I. Sattar, N. Manzoor, and S. Ashraf, "Cloud Service Providers: A Comparative Analysis of Cloud Storage Pricing," International Journal of Computer Applications, vol. 975, p. 8887, 2017.
Q. Hammouri, and E. A. Abu-Shanab, "Major factors influencing the adoption of cloud computing in Jordan," International Journal of Technology and Human Interaction (IJTHI),, vol. 16, no. 4, pp. 55-69, 2020.
M. Awad, and R. Khanna, "Efficient learning machines: theories, concepts, and applications for engineers and system designers," Springer nature, 2015.
A. Sprintson, "Network coding and its applications in communication networks," in Algorithms for Next Generation Networks, Springer, 2010, pp. 343-372.
E. Raguseo, "Big data technologies: An empirical investigation on their adoption, benefits and risks for companies," International Journal of Information Management, vol. 38, no. 1, pp. 187-195, 2018.
C. Stergiou, K. E. Psannis, B. B. Gupta, and Y. Ishibashi, "Security, privacy & efficiency of sustainable cloud computing for big data & IoT," Sustainable Computing: Informatics and Systems, vol. 19, pp. 174-184, 2018.
N. Zanoon, A. Al-Haj, and S. M. Khwaldeh, "Cloud computing and big data is there a relation between the two: a study," International Journal of Applied Engineering Research, vol. 12, no. 17, pp. 6970-6982, 2017.
H. Y. a. X. C. S. Zhang, "Research on key technologies of cloud computing," Physics Procedia, vol. 33, pp. 1791-1797, 2012.
S. Zhang, H. Yan, and X. Chen, "Recent applications of big data in finance," Proceedings of the 2nd International Conference on Digital Tools & Uses Congress, pp. 1-6, 2020.
V. N. Inukollu, S. Arsi, and S. R. Ravuri, "Security issues associated with big data in cloud computing," International Journal of Network Security & Its Applications (IJNSA), vol. 6, no. 3, p. 45, 2014.
B. M. Balachandran, S. Prasad, "Challenges and benefits of deploying big data analytics in the cloud for business intelligence," Procedia Computer Science, vol. 112, pp. 1112-1122, 2017.
T. Alashoor, "Cloud computing: a review of security issues and solutions," International Journal of Cloud Computing, vol. 3, no. 3, pp. 228-244, 2014.
N. Fotiou, A. Machas, G. C. Polyzos, and G. Xylomenos, "Access control as a service for the Cloud," Journal of Internet Services and Applications, vol. 6, pp. 1-15, 2015.
H. Boinepelli, "Applications of big data," in Big Data: A Primer, Springer, 2015, pp. 161-179.
A. L'heureux, K. Grolinger, H. F. Elyamany, and M. A. M. Capretz, "Machine learning with big data: Challenges and approaches," Ieee Access, vol. 5, pp. 7776-7797, 2017.
K. V. D. Schyff, and K. E. M. Krauss, "Higher education cloud computing in South Africa: towards understanding trust and adoption issues," South African Computer Journal, vol. 55, no. 1, pp. 40-55, 2014.
Sodikin, "Cloud computing," vol. 39, no. 1, pp. 1-15, Jan 2014.
R. Machuga, "Factors determining the use of cloud computing in enterprise management in the EU (considering the type of economic activity)," Problems and Perspectives in Management, vol. 18, no. 3, p. 93, 2020.
M. G. Cains, L. Flora, D. Taber, Z. King, and D. S. Henshel, "Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation," Risk Analysis, vol. 42, no. 8, pp. 1643-1669, 2022.
K. Williamson, G. Johanson, "Research methods: Information, systems, and contexts," Chandos Publishing, 2017.
J. V. Maanen, "Reclaiming qualitative methods for organizational research: A preface," Administrative science quarterly, vol. 24, no. 4, pp. 520-526, 1979.
S. Yeasmin, and K. F. Rahman, "Triangulation research method as the tool of social science research," BUP jounal , vol. 1, no. 1, pp. 154-163, 2012.
G. Zissis, and P. Bertoldi, "Status of LED-lighting world market in 2017," Ispra: European Commission, 2018.
G. H. Galal-Edeen, "Information systems requirements engineering: An interpretive approach," The Egyptian Informatics Journal, vol. 6, no. 2, pp. 154-174, 2005.
R. W. Service, "Book Review: Corbin, J., & Strauss, A.(2008). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory . Thousand Oaks, CA: Sage," Organizational Research Methods, vol. 12, no. 3, pp. 614-617, 2009.," pp. 614-617, 2008.
M. A. Abdel-Fattah, "Grounded theory and action research as pillars for interpretive information systems research: A comparative study," Egyptian Informatics Journal, vol. 16, no. 3, pp. 309-327, 2015.
H. R. Bernard, "Social research methods: Qualitative and quantitative approaches," Sage, 2013.
J. Wieczorkowski, and I. Pawełoszek, "Big data privacy concerns in the light of survey results," IADIS International Journal on WWW/Internet, Available from: shorturl.at/kyIW3, vol. 14, no. 1, pp. 70-85, 2016.
H. Rezaei, B. Karimi, and S. J. Hosseini, "Effect of cloud computing systems in terms of service quality of knowledge management systems," Lecture Notes on Software Engineering, vol. 4, no. 1, p. 73, 2016.
S. M. Ali, S. M. N. Hoq, A. B. M. M. Bari, G. Kabir, and S. K. Paul, "Evaluating factors contributing to the failure of information system in the banking industry," Plos one, vol. 17, no. 3, p. e0265674, 2022.
S. Gutwirth, Y. Poullet, P. De Hert, and R. Leenes, "Computers, privacy and data protection: An element of choice," Springer, 2011.
I. Obeidat, and A. Mughaid, "Implementing Factors of Information Security in Governmental Organizations of Jordan," The Thirteenth International Conference on Digital Society and eGovernments, 2019.
L. Masilela, and D. Nel, "The role of data and information security governance in protecting public sector data and information assets in national government in South Africa," Africa’s Public Service Delivery and Performance Review, vol. 9, no. 1, p. 385, 2021.


Copyright (c) 2023 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)