Researcher: Amin Saedi
Title: An Integrated Theoretical Framework for Cloud Computing Adoption by Malaysian Small and Medium-Sized Enterprises in Information and Communication Technology Sector

Research on Cloud Computing (CC) adoption seems to be one of the less explored and examined topics in the Information Systems (IS) domains, particularly for Small and Medium-sized Enterprises (SMEs). Prior research on CC adoption does not appreciate the benefits of using innovation translation approach. Instead, essentialist approach, a simplistic view of CC adoption which is based only on the technological characteristics of the innovation is prevalent. Thus, this study is aimed at integrating the technology-organization-environment framework as an IS adoption theory while actor network theory as an innovation translation approach in proposing the SMEs-CC adoption framework. Quantitative data through conducting a survey will be collected from Malaysian SMEs in information and communication technology sector that plan to adopt CC (non-adopters) or have already adopted CC (adopters). Partial Least Squares Structural Equation Modelling (PLS-SEM) technique will be used for analysing the survey data. The expected outcome of this research would be an integrated theoretical framework in two different versions of SMEs-CC adoption framework namely adopters and non-adopters framework. Findings from this research will help Malaysian SMEs to integrate the research framework into their current business model and to support both Malaysian SMEs and CC services providers’ policies and concerns. The outcome of this research will also present a conceptual foundation for future researches on the adoption of CC by Malaysian SMEs and other SMEs globally.

Researcher: Hamzah Alabool and Ahmad Kamil Mahmood
Title: An evaluation framework for improving trust level of Infrastructure as a Service

In the Infrastructure as a Service (IaaS) industry, the decision-making to choose the prioritized trust improvement actions is significant as to ensure the trustworthiness and service continuity of the IaaS cloud providers. This is done by checking the trust control elements (TCEs) of IaaS cloud regularly so as to put together an efficient and effective improvement plan. However, it is very difficult to put such improvement plan unless it is based on the results of a preparatory evaluation. This paper, present rigorous and reliable evaluation framework based evaluation theory called trust evaluation of IaaS cloud framework. The main goal of this evaluation framework is to help IaaS cloud providers to identify the unimproved gaps according to particular TCEs. Diagrammatic trust tree and hybrid evaluation and ranking technique combining fuzzy set, simple additive weight, and important performance analysis (IPA) are the main components of this novel framework. The proposed framework is applied to evaluate the IaaS cloud of two providers. The results show that each provider has several different unimproved gaps that need urgent improvement actions. Moreover, based on the analysis results of IPA, several recommendations have been suggested to fill these gaps.

Researcher: Noreen Izza Arshad
Title: Governance for Disaster Risk Reduction: A Development of a Standard Policy to Utilize Online Flood Data Management System

A policy on data management system for flood disasters is to be created to be utilized efficiently following three measures: (1) Flood Mitigation (2) Preparedness and Flood Disaster Response, (3) Recovery and Reconstruction Plan. A good data management system should contribute to the improvement of each of this measure. Without a well-designed data management system, it may create chain of issues such as not having an effective medium of communication to share all the data during the flood and also to store all the data that have been collected properly. One of the main reasons these can occur is because most of the data needed are being collected manually and presented in hardcopy form. There might be some delay to pass the data to others that need the data urgently by using fax machine, or even to transfer it to softcopy form and send via email or any other online medium. In order to utilize the online data management system, a policy should be created to show and to guide the future users of the system on how to use it effectively. This policy will consider government and private agencies who are involved directly or indirectly. The following activities will be followed to prepare the policy: (1) Understand and analyze the existing policies and guidelines, action plans and standard operating procedures that relates to flood, (2) Create a policy to utilize the data management system that will fit the requirements needed by users to perform their tasks according to the standard operating procedures, and (3) Solicit feedback from actual and potential users. It is significant to produce a policy to utilize the data management system for flood disaster management that could assist government and private agencies to react when disaster happens, thus benefit the flood victim at large.