IDEAS home Printed from https://ideas.repec.org/a/arp/tjssrr/2018p599-606.html
   My bibliography  Save this article

Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq

Author

Listed:
  • Omar Adil Dheyab*

    (Universiti Pendidikan Sultan Idris, Malaysia)

  • Ahmed Ibrahim Turki

    (Department of Physics, University of Samarra)

  • B. Rahmatullah

    (Universiti Pendidikan Sultan Idris,Malaysia)

Abstract

Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing. In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq. Consequently, many countermeasures are proposed. Descriptive research methodology is adopted in this research. The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.

Suggested Citation

  • Omar Adil Dheyab* & Ahmed Ibrahim Turki & B. Rahmatullah, 2018. "Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq," The Journal of Social Sciences Research, Academic Research Publishing Group, pages 599-606:6.
  • Handle: RePEc:arp:tjssrr:2018:p:599-606
    as

    Download full text from publisher

    File URL: https://www.arpgweb.com/pdf-files/spi6.14.599.606.pdf
    Download Restriction: no

    File URL: https://www.arpgweb.com/journal/7/special_issue/12-2018/6/4
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:arp:tjssrr:2018:p:599-606. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Managing Editor (email available below). General contact details of provider: http://arpgweb.com/?ic=journal&journal=7&info=aims .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.