A framework for assuring conformance of cloud-based email at higher education institutions
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
- Authors: Willett, Melanie
- Date: 2013
- Subjects: Cloud computing -- Security measures , Computer networks -- Security measures , Web services , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9815 , http://hdl.handle.net/10948/d1018664
- Description: Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
- Full Text:
- Date Issued: 2013
Cloud information security : a higher education perspective
- Authors: Van der Schyff, Karl Izak
- Date: 2014
- Subjects: Cloud computing -- Security measures , Information technology -- Security measures , Data protection , Internet in higher education , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4692 , http://hdl.handle.net/10962/d1011607 , Cloud computing -- Security measures , Information technology -- Security measures , Data protection , Internet in higher education , Education, Higher -- Technological innovations
- Description: In recent years higher education institutions have come under increasing financial pressure. This has not only prompted universities to investigate more cost effective means of delivering course content and maintaining research output, but also to investigate the administrative functions that accompany them. As such, many South African universities have either adopted or are in the process of adopting some form of cloud computing given the recent drop in bandwidth costs. However, this adoption process has raised concerns about the security of cloud-based information and this has, in some cases, had a negative impact on the adoption process. In an effort to study these concerns many researchers have employed a positivist approach with little, if any, focus on the operational context of these universities. Moreover, there has been very little research, specifically within the South African context. This study addresses some of these concerns by investigating the threats and security incident response life cycle within a higher education cloud. This was done by initially conducting a small scale survey and a detailed thematic analysis of twelve interviews from three South African universities. The identified themes and their corresponding analyses and interpretation contribute on both a practical and theoretical level with the practical contributions relating to a set of security driven criteria for selecting cloud providers as well as recommendations for universities who have or are in the process of adopting cloud computing. Theoretically several conceptual frameworks are offered allowing the researcher to convey his understanding of how the aforementioned practical concepts relate to each other as well as the concepts that constitute the research questions of this study.
- Full Text:
- Date Issued: 2014
- Authors: Van der Schyff, Karl Izak
- Date: 2014
- Subjects: Cloud computing -- Security measures , Information technology -- Security measures , Data protection , Internet in higher education , Education, Higher -- Technological innovations
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4692 , http://hdl.handle.net/10962/d1011607 , Cloud computing -- Security measures , Information technology -- Security measures , Data protection , Internet in higher education , Education, Higher -- Technological innovations
- Description: In recent years higher education institutions have come under increasing financial pressure. This has not only prompted universities to investigate more cost effective means of delivering course content and maintaining research output, but also to investigate the administrative functions that accompany them. As such, many South African universities have either adopted or are in the process of adopting some form of cloud computing given the recent drop in bandwidth costs. However, this adoption process has raised concerns about the security of cloud-based information and this has, in some cases, had a negative impact on the adoption process. In an effort to study these concerns many researchers have employed a positivist approach with little, if any, focus on the operational context of these universities. Moreover, there has been very little research, specifically within the South African context. This study addresses some of these concerns by investigating the threats and security incident response life cycle within a higher education cloud. This was done by initially conducting a small scale survey and a detailed thematic analysis of twelve interviews from three South African universities. The identified themes and their corresponding analyses and interpretation contribute on both a practical and theoretical level with the practical contributions relating to a set of security driven criteria for selecting cloud providers as well as recommendations for universities who have or are in the process of adopting cloud computing. Theoretically several conceptual frameworks are offered allowing the researcher to convey his understanding of how the aforementioned practical concepts relate to each other as well as the concepts that constitute the research questions of this study.
- Full Text:
- Date Issued: 2014
Exploring lecturer experiences of the use of ICT in blended learning : a case study at a South African university
- Authors: Ntlabathi, Siyanda
- Date: 2015
- Subjects: Blended learning -- South Africa , Information technology -- South Africa , Education, Higher -- Technological innovations , Computer-assisted instruction -- South Africa , Internet in education -- South Africa , Educational technology -- South Africa , Critical realism
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:2044 , http://hdl.handle.net/10962/d1017355
- Description: ICTs have had a tremendous impact on our educational environment. There have been a huge number of developments and support in implementation of ICT in Higher Education teaching and learning, also referred to as e-learning. Similarly there appears to be quite a number of research conducted on the use of ICTs in blended learning settings worldwide and as well as in South Africa. Very little research however, has focussed on the experiences of lecturers with e-learning, specifically as it relates to Learning Management Systems (LMS). In trying to meet the requirements of its academic programmes and be in line with new developments worldwide, the University which is the focus of this study pilot projected the use of an LMS in a blended learning approach which integrates face-to-face classes with Blackboard, an ICT-based system or tool. Following the implementation of the pilot project, this study explores the experiences of lecturers in their blended learning environments at this university in the Eastern Cape province of South Africa. The research design was that of an interpretative paradigm within a qualitative research approach in a case study methodology. Purposive sampling of six lecturers from departments within faculties across two campuses was done. The data was gathered through interviews, a follow-up questionnaire and document analysis was employed. Using Critical and Social Realism as meta-theories the study employed aspects of Activity Theory as substantive theory to understand particular experiences of blended learning environments and identify conditions which enable and constrain engagement in these environments so as to explore potential lessons to inform the kind of educational support which could be offered to facilitate uptake of the LMS.
- Full Text:
- Date Issued: 2015
- Authors: Ntlabathi, Siyanda
- Date: 2015
- Subjects: Blended learning -- South Africa , Information technology -- South Africa , Education, Higher -- Technological innovations , Computer-assisted instruction -- South Africa , Internet in education -- South Africa , Educational technology -- South Africa , Critical realism
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:2044 , http://hdl.handle.net/10962/d1017355
- Description: ICTs have had a tremendous impact on our educational environment. There have been a huge number of developments and support in implementation of ICT in Higher Education teaching and learning, also referred to as e-learning. Similarly there appears to be quite a number of research conducted on the use of ICTs in blended learning settings worldwide and as well as in South Africa. Very little research however, has focussed on the experiences of lecturers with e-learning, specifically as it relates to Learning Management Systems (LMS). In trying to meet the requirements of its academic programmes and be in line with new developments worldwide, the University which is the focus of this study pilot projected the use of an LMS in a blended learning approach which integrates face-to-face classes with Blackboard, an ICT-based system or tool. Following the implementation of the pilot project, this study explores the experiences of lecturers in their blended learning environments at this university in the Eastern Cape province of South Africa. The research design was that of an interpretative paradigm within a qualitative research approach in a case study methodology. Purposive sampling of six lecturers from departments within faculties across two campuses was done. The data was gathered through interviews, a follow-up questionnaire and document analysis was employed. Using Critical and Social Realism as meta-theories the study employed aspects of Activity Theory as substantive theory to understand particular experiences of blended learning environments and identify conditions which enable and constrain engagement in these environments so as to explore potential lessons to inform the kind of educational support which could be offered to facilitate uptake of the LMS.
- Full Text:
- Date Issued: 2015
- «
- ‹
- 1
- ›
- »