Abdulhafid Bughari Abdulkarim Abdulgadr, A. Hamad, Mansour Khalifa Hamad Mohamed
{"title":"利比亚中小企业成功采用云计算安全模式","authors":"Abdulhafid Bughari Abdulkarim Abdulgadr, A. Hamad, Mansour Khalifa Hamad Mohamed","doi":"10.1109/ICOTEN52080.2021.9493538","DOIUrl":null,"url":null,"abstract":"Cloud computing system facilitates the promotion of the convenient on demand networks that include application services, servers, networks, and storage devices. It is becoming significant to have the cloud computing security system as the issues related to the security still appear to be unsolved. Therefore, the utilization of the technological advances is essential for the organizations in Libya. The key purpose of this paper is to incorporate cost effectiveness, IT compliance, and security effectiveness for the successful adoption of the Cloud Computing security system in Libyan companies. At the moment, there is a shortage of the guidelines for the adoption of the Cloud Computing and building the trust. Thus, this study focuses on the examining different theories and identifying the new integrated theoretical framework accordingly for the adoption of the Cloud Computing in general, specifically in Small and Medium Enterprises (SMEs) in Libya.","PeriodicalId":308802,"journal":{"name":"2021 International Congress of Advanced Technology and Engineering (ICOTEN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Successful Adoption of Cloud Computing Security Model for SMEs in Libya\",\"authors\":\"Abdulhafid Bughari Abdulkarim Abdulgadr, A. Hamad, Mansour Khalifa Hamad Mohamed\",\"doi\":\"10.1109/ICOTEN52080.2021.9493538\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing system facilitates the promotion of the convenient on demand networks that include application services, servers, networks, and storage devices. It is becoming significant to have the cloud computing security system as the issues related to the security still appear to be unsolved. Therefore, the utilization of the technological advances is essential for the organizations in Libya. The key purpose of this paper is to incorporate cost effectiveness, IT compliance, and security effectiveness for the successful adoption of the Cloud Computing security system in Libyan companies. At the moment, there is a shortage of the guidelines for the adoption of the Cloud Computing and building the trust. Thus, this study focuses on the examining different theories and identifying the new integrated theoretical framework accordingly for the adoption of the Cloud Computing in general, specifically in Small and Medium Enterprises (SMEs) in Libya.\",\"PeriodicalId\":308802,\"journal\":{\"name\":\"2021 International Congress of Advanced Technology and Engineering (ICOTEN)\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Congress of Advanced Technology and Engineering (ICOTEN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOTEN52080.2021.9493538\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Congress of Advanced Technology and Engineering (ICOTEN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOTEN52080.2021.9493538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Successful Adoption of Cloud Computing Security Model for SMEs in Libya
Cloud computing system facilitates the promotion of the convenient on demand networks that include application services, servers, networks, and storage devices. It is becoming significant to have the cloud computing security system as the issues related to the security still appear to be unsolved. Therefore, the utilization of the technological advances is essential for the organizations in Libya. The key purpose of this paper is to incorporate cost effectiveness, IT compliance, and security effectiveness for the successful adoption of the Cloud Computing security system in Libyan companies. At the moment, there is a shortage of the guidelines for the adoption of the Cloud Computing and building the trust. Thus, this study focuses on the examining different theories and identifying the new integrated theoretical framework accordingly for the adoption of the Cloud Computing in general, specifically in Small and Medium Enterprises (SMEs) in Libya.