{"title":"Risks of Critical Infrastructure Adoption of Cloud Computing by Government","authors":"Mansoor Al-Gharibi, M. Warren, W. Yeoh","doi":"10.4018/ijcwt.2020070104","DOIUrl":null,"url":null,"abstract":"The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"26 1","pages":"47-58"},"PeriodicalIF":0.2000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Warfare and Terrorism","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcwt.2020070104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"POLITICAL SCIENCE","Score":null,"Total":0}
引用次数: 2
Abstract
The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.