scispace - formally typeset
Search or ask a question
Author

Amab Dutta

Bio: Amab Dutta is an academic researcher from University of Sheffield. The author has contributed to research in topics: Cloud computing security & Cloud computing. The author has an hindex of 1, co-authored 1 publications receiving 126 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The most critical top 10 risks perceived by IT experts were found to be caused by current legal and technical complexity and deficiencies associated with cloud computing, as well as by a lack of preparation and planning of user companies.
Abstract: Cloud computing has become an increasingly prevalent topic in recent years. However, migrating hitherto internal IT data and applications to the cloud is associated with a wide range of risks and challenges. The study reported in this paper aims to explore potential risks that organisations may encounter during cloud computing adoption, as well as to assess and prioritise these risks, from the perspective of IT practitioners and consultants. A questionnaire was designed and distributed to a group of 295 highly experienced IT professionals involved in developing and implementing cloud based solutions, of which 39 (13.2%) responses were collected and analysed. The findings identified a set of 39 cloud computing risks, which concentrated around diverse operational, organisational, technical, and legal areas. The most critical top 10 risks perceived by IT experts were found to be caused by current legal and technical complexity and deficiencies associated with cloud computing, as well as by a lack of preparat...

134 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Assessing the determinants of cloud computing adoption is based on an analysis of the manufacturing and services sectors and the results show clear trends in adoption towards cloud-based services.

868 citations

Journal ArticleDOI
TL;DR: It is found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of Information security.

312 citations

Journal ArticleDOI
TL;DR: Four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK and those key factors include competitive pressure, complexity, technology readiness and trading partner pressure.
Abstract: Purpose – The purpose of this paper is to determine the factors influencing managers’ decision to adopt cloud computing in the UK using the “Technology-Organisation-Environment” (TOE) framework. Design/methodology/approach – Data were collected through a self-created questionnaire based survey that was completed by 257 mid-to-senior level decision-making business and information technology (IT) professionals from a range of UK end-user organisations. The derived hypotheses were tested using various data analysis techniques including principal component analysis and logistic regression. Findings – The results show that four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK. Those key factors include competitive pressure, complexity, technology readiness and trading partner pressure. The latter predictor; trading partner pressure, was the most significant factor for the adoption decision of cloud services reflecting organisations’ c...

231 citations

Journal ArticleDOI
TL;DR: How IT-based capabilities may be used to leverage cloud delivery models to positively influence the successful implementation of cloud computing, and ultimately, firm performance for the processes and operations supported by the cloud is discussed.

188 citations

Journal ArticleDOI
01 Dec 2016
TL;DR: A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations and exemplify the importance of interoperability, portability and standards in cloud computing.
Abstract: Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem in the cloud environment. Consequently, most customers are unaware of proprietary standards which inhibit interoperability and portability of applications when taking services from vendors. This paper provides a critical analysis of the vendor lock-in problem, from a business perspective. A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations. The analysis of our survey of 114 participants shows that, as computing resources migrate from on-premise to the cloud, the vendor lock-in problem is exacerbated. Furthermore, the findings exemplify the importance of interoperability, portability and standards in cloud computing. A number of strategies are proposed on how to avoid and mitigate lock-in risks when migrating to cloud computing. The strategies relate to contracts, selection of vendors that support standardised formats and protocols regarding standard data structures and APIs, developing awareness of commonalities and dependencies among cloud-based solutions. We strongly believe that the implementation of these strategies has a great potential to reduce the risks of vendor lock-in.

167 citations