energies-logo

Journal Browser

Journal Browser

Cloud Computing and Its Applications

A special issue of Energies (ISSN 1996-1073). This special issue belongs to the section "A1: Smart Grids and Microgrids".

Deadline for manuscript submissions: closed (31 October 2021) | Viewed by 3262

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Information Sciences, University of the Cumberlands, Williamsburg, KY 40769, USA
Interests: Cryptography, Cryptography applications, Cybersecurity, Risk management and management of cybersecurity

Special Issue Information

Dear Colleagues,

Cloud computing security or, more generally, cloud security refers to a wide set of management, technical, and physical policies, knowledge, technology, applications, and controls used to protect virtualized IP, applications, data, services, and the connected infrastructure of cloud computing. Cloud computing is part of cybersecurity, computer security, network security, and, on a wider scale, information security.

Risk assessment and risk management with cloud computing has been a difficult subject because the end-user has no control over the service provider. The service provider must offer the right service for their business. A loss of data can be incredibly costly to a business and, in some cases, even lead to closure.

With this technology, end-users can either rely only on the service provider or take control to avoid loss of security and loss of customers’ data.

The most important question in this context is what happens if the service provider is compromised. A prime example of this is using cloud-based tax preparation, which could be the subject of data loss (IRS released in Federal Tax Law Topics/Federal Tax Related Matters (Tax Security 20 A Tax Pros Security Checklist) May 21, 2020 webinar). This case provides proof that the end-user of a cloud service must have control (as an extra level of security) to avoid loss of security and loss of customers’ data.

Prof. Dr. Wasim AlHamdani
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Energies is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cloud Computing
  • Cloud Computing Security
  • Cybersecurity
  • Risk Management
  • Risk Assessments
  • Computer Security
  • network Security
  • Information Security.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 623 KiB  
Article
Enhancing User Experiences with Cloud Computing via Improving Utilitarian and Hedonic Factors
by Juthamon Sithipolvanichgul, Charlie Chen, Judy Land and Peter Ractham
Energies 2021, 14(7), 1822; https://doi.org/10.3390/en14071822 - 25 Mar 2021
Cited by 5 | Viewed by 2561
Abstract
This study provides insights into the initial and post-adoption of cloud computing services by integrating information technology adoption, social influence, trust, security, and information systems quality theories. Social influence, hedonicity, and automaticity are hedonic predictors of user satisfaction with cloud computing services. Perceived [...] Read more.
This study provides insights into the initial and post-adoption of cloud computing services by integrating information technology adoption, social influence, trust, security, and information systems quality theories. Social influence, hedonicity, and automaticity are hedonic predictors of user satisfaction with cloud computing services. Perceived risks, trust in the provider, and system quality are utilitarian predictors of user satisfaction with cloud computing services. The Partial Least Squares (PLS) was employed to test eight hypotheses on the causal relationships between the variables. Six out of eight hypotheses were supported. Hedonic factors appear to have more influence than the utilitarian factor of increasing user satisfaction with cloud computing services in the school setting. The findings lead to both theoretical and practical implications for improving the initial and post-adoption of cloud computing services. Full article
(This article belongs to the Special Issue Cloud Computing and Its Applications)
Show Figures

Figure 1

Back to TopTop