A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
In the 21st century, education has evolved from being confined to the four walls of a classroom to a more flexible online environment using Cloud Computing (CC) technology which has brought immense technological transformation in the field of education. This technology is rapidly growing and improvi...
| Main Authors: | Rahman, Mohammad Musudur, Suhaimi, Mohd Adam, Shah, Asadullah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/68686/ http://irep.iium.edu.my/68686/1/68686_A%20model%20of%20factors%20influencing%20cloud%20computing.pdf http://irep.iium.edu.my/68686/2/68686_A%20model%20of%20factors%20influencing%20cloud%20computing_SCOPUS.pdf http://irep.iium.edu.my/68686/3/68686_A%20model%20of%20factors%20influencing%20cloud%20computing_WOS.pdf |
Similar Items
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
A security-based survey and classification of cloud architectures, state of the art and future directions
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
The adoption of Knowledge Management Systems (KMS) among academicians in Nigeria universities
by: Salami, Ahmed, et al.
Published: (2019)
by: Salami, Ahmed, et al.
Published: (2019)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children
with autism spectrum disorder (ASD)
by: Khowaja, Kamran, et al.
Published: (2020)
by: Khowaja, Kamran, et al.
Published: (2020)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2019)
by: Ahmad, Azuan, et al.
Published: (2019)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Development of a game for history course of secondary school students
by: Ghulamani, Sumbul, et al.
Published: (2017)
by: Ghulamani, Sumbul, et al.
Published: (2017)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Competitive algorithms for online conversion problems with interrelated prices
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018)
by: Khan, N., et al.
Published: (2018)
A model for real-time recognition and textual representation of Malaysian sign language through image processing
by: Karabasi, Mostafa, et al.
Published: (2013)
by: Karabasi, Mostafa, et al.
Published: (2013)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Similar Items
-
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015) -
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014) -
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019) -
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014) -
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)