E-ISSN: 2963-3699
P-ISSN: 2964-0121
Homepage: https://return.publikasikupublisher.com
This work is licensed under CC BY-SA 4.0
ANALYSIS OF CLOUD COMPUTING CHARACTERISTICS, SERVICES AND
SECURITY AGAINST INFORMATION TECHNOLOGY STRATEGY FOR SMALL
MEDIUM ENTERPRISES
Dheva Sari Silaban
1*
, Sardjoeni Moedjiono
2
Universitas Budi Luhur, Jakarta, Indonesia
1,2
dhevasari83@gmail.com
1
, moedjiono@gmail.com
2
ABSTRACT
Along with the development of the economy and technology, especially in cloud computing in Indonesia,
Small and Medium Enterprises (SME) services also take part in this development. Cloud computing is
an information technology innovation that allows users to use resources based on demanding utilities.
Limited capital, human resources, and access to marketing networks are no longer a problem for SME
businesses significant because of the benefits of Cloud Computing. Based on partial testing, the results
of this study indicate there is no influence and insignificance of cloud computing security on variables
characteristic variables of cloud computing. Similarly, the security variable has no influence and
insignificant on the adoption of the strategy variable. While service variables have a positive and
significant effect on security variables.
Keywords : Cloud computing; characteristics; security; utilities; adoption; SMEs of Indonesia
INTRODUCTION
Sectors of the economy and technology in developing countries are currently well
developed. Market players do not cease to innovate in advance their business. This also applies
to the sector of Small and Medium Enterprises (SMEs). In sum, SMEs in Indonesia 100 times
more than large-scale enterprises (Fardani & Surendo, 2011). In 2018, there were 1,032,643 billion.
The role of SMEs is highly recognized as the spearhead of a country’s economic progress
(Ministry of Cooperatives and SMEs, 2009). However, in some aspects, SMEs have not been
able to compete with large-scale enterprises in the industry competition.
The concept of cloud computing has been raised since 2005 and sparked the enthusiasm of
the business to improve its performance by relying on information technology solutions more
practical and economical. Services that can be used in cloud computing are very diverse to target
the wider sector. Cloud computing is also one solution for the SME sector which is plagued
procurement of information technology resources. Service that is generally found on Cloud
Computing services is Infrastructure as a Service, Platform as a Service, and Software as a
Service.
For this research, the studied variables are the characteristics of cloud computing needed
by SMEs, the basis of cloud computing services that became the foundation of SME IT
infrastructure, and data security issues that can help the development of the SME business
(Kuyoro S. O et al., 2011). In the future, cloud computing will become a trend in the IT field who
provide bright prospects for industry players (V. Chawla & Sogani, 2011; Raj et al., 2014; Varghese
& Buyya, 2018). However, to get optimal performance requires the right strategy for SMEs in
Indonesia to adopt Cloud Computing technology effectively and efficiently for the SME business
transform into a better direction (Adiyasa et al., 2018; Gui et al., 2020; Mangula et al., 2012).
The proposed research aims to formulate a strategy on SME adoption of cloud computing in
Indonesia. Business opportunities in this cloud will be an opportunity also for doing research
(Meyer et al., 2013; Sangupamba et al., 2014; Дресвянников et al., 2019). In the future, the
characteristics, services, and cloud security can grow much more rapidly because of the needs of
the various sectors are quite extensive (Ibrahim & Kusnawi, 2013). The formulation of the problem
which is the basis of this research include: Does the characteristics of cloud computing affect the
security level of cloud computing for SMEs; Does the analysis of cloud computing services affect
the level of security of cloud computing for SMEs; Does cloud computing security affect the
adoption of information technology adoption strategies for SMEs; Do the characteristics,
services, and security of cloud computing influence the implementation of information technology
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
67
Return: Study of Management, Economic And Business, Vol 3 (1), January 2024
adoption strategies for SMEs?
Restrictions issue in this study is limited to the object of research by small and medium
business customers in the field of Financial Technology at PT Blue Power Technology and
already using the cloud provider that Alibaba Cloud. This research is limited by research on the
characteristics, services, and security variables towards the adoption of cloud computing
strategies.
In Indonesia, an Act to regulate the Micro, Small and Medium Enterprises (SMEs) is Law
No. 20 of 2008. In these laws SMEs are described as: "A company is classified as SMEs are a small
company owned and managed by a person or owned by a small group of people with a certain
amount of wealth and income ". And engaged in SME startup world is of course very diverse. But
the startup business field is on the rise today is Financial Technology. The business was highly
controlled by the government primarily because of financial issues crucial for the wider community.
In carrying out its operational functions, companies SME or startup requires the IT
environment such as Cloud computing. NIST defines cloud computing as a model of pay-
according-use (pay-per-use) in the use of computing resources (network, server, storage,
applications, services) that are always available, accessible, and relies on the network (on-demand)
which can be accessed by multiple users; which can quickly be used and released by the
management effort or service provider interaction is minimal. The following are the five features
of cloud computing:
1. Resource Pooling
Cloud service providers provide services through resources grouped in one or multiple data
center locations.
2. BroadNetwork Access
Service capabilities available via the network can be accessed by various types of devices.
3. Measured Service
Services are available to optimize and monitor the services used automatically.
4. Rapid elasticity
The resource capabilities used by consumers, such as server performance and data storage
size, can be easily adjusted according to their needs.
5. Self Service
Cloud consumers can independently configure the services they want to use through a
system.
The concept of cloud computing could not be separated from the service layer arranged. In
general, there are three main services offered to the Software as a Service (SaaS), Platform as a
Service (PaaS) and Infrastructure as a Service (IaaS) as illustrated in Figure 1 (Balboni, 2020).
Figure 1 The main service cloud Source: Fardani and Surendro, (2011)
Cloud Computing presents many challenges to the organization Fauziah, (2014) in (Alfarizi
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
68 Return: Study of Management Economic And Business, Vol 3 (1), January 2024
& Ikasari, 2023). When organizations move to the public cloud computing services infrastructure of
the computing system is controlled by a third party, namely the Cloud Service Provider (CSP) and
this challenge must be addressed through management initiatives. The management initiatives will
require a clear picture of the role of ownership and responsibility of the CSP and the organization
that acts as a customer. As renewable technologies, qualified adoption strategy would need to study
the implementation of cloud computing (Rittinghouse & Ransome, 1999). ROCCA is a generic model
that is based on research on matters related to the adoption of cloud computing. Because generic,
this model can be applied to multiple domains cloud computing, in any organization and any cloud
platform and infrastructure (Anggraini et al., 2019; Bunyamin et al., 2018; Haryanto, 2019; Maniniti,
2014; Perdana & Suharjito, 2017). This adoption model integrating factors that become the focus in
the adoption of cloud computing in organizations. These factors included:
a) Confidence (trust),
b) Security (security),
c) Suitability of legal rules (legal and compliance) and
d) Organizational factors (organizational issue). Aspects or important issues that should be
considered in the adoption of cloud computing is the trust, security, suitability legal rules,
and organizational factors.
From background of the problem and the theoretical basis of the above, the framework of this
research can be seen in Figure 2.
Figure 2 The Framework
Hypothesis
H1: Allegedly the characteristics of cloud computing have a positive relationship to levels cloud
computing security.
H2: Cloud computing services allegedly have apositive influence on the level of security cloud
computing.
H3: Suspected security of cloud computing positive influence on cloud adoption strategy
computing.
H4: Suspected characteristics, services, and cloud computing security has positive effect to the
adoption of information technology strategy for SMEs.
H1
Security
(Y1)
H3
Adoption
strategies
(Y2)
Service
(X2)
H2
H4
istics
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
69
Return: Study of Management, Economic And Business, Vol 3 (1), January 2024
RESEARCH METHOD
The method used in this research is explanation (explanatory) with quantitative and
qualitative approach. The purpose of this study was to test the hypothesis and to explain the causal
relationship between the variables, is characteristics, services, and security for the strategy
adoption of information technology. In this study, the type of data used is primary data and
secondary data. The primary data obtained by distributing a questionnaire or a questionnaire given
to respondents who selected and conducted interviews. While secondary data obtained from
borrowing other documents related to this research.
The population of this research is customer SME Cloud team Xtream PT Blue Power
Technology that already use products Alibaba Cloud service as many as 38 companies. Once the
target population is determined, the next step is to determine the number and sampling techniques.
Then after these steps are met, need to be determined number of samples taken. The sampling
method used in this study is the method of sampling based on certain considerations (purposive
sampling) were selected based on certain considerations were selected based on the category of
companies engaged in the field of Financial Technology and the individual respondents are
workers who work implementing the system of their company on Alibaba Cloud.
The model of this research is using descriptive statistics and inferential statistics (D. Chawla
& Deorari, 2005; Dilevko, 2007; Khakshooy & Chiappelli, 2018; Laccourreye et al., 2021; Larson, 2006;
Turner & Houle, 2019). Descriptive statistics were used in this study to measure the use of cloud
computing by using the provider Alibaba Cloud against adoption strategy and its impact on the
ability of technology adoption are financial companies that become customer technology PT Blue
Power Technology. Descriptive statistics were analyzed in this study using the characteristics of
respondents by the old establishment of the company, the number of employees at the company,
revenue per year, and status monitoring of the Financial Services Authority (FSA). In this study,
also using inferential statistical methods parametric with path analysis (path analysis) and the
research data processing assisted by SPSS software version 20. SPSS is statistical applications to
manage and analyze the data for various purposes by using statistical techniques. Model path
analysis (path analysis) to determine the effect of independent variables on the dependent
variable, either directly or indirectly
RESULT AND DISCUSSION
This study uses data collected from respondents who filled out the questionnaire.
Questionnaires were distributed to customer teams Cloud Xtream PT Blue Power Technology
that uses the services of Alibaba Cloud ranging from Infrastructure as a Service (IaaS), Platform
as a Service (PaaS), and Software as a Service (SaaS) for the functioning of the system unit
respective business of the company. Total questionnaire distributed in this study amounted to 38
questionnaires. Of the 38 (100%) questionnaires distributed, 30 (80%) questionnaires received
back. Of the 30 (80%) received the questionnaire, 30 (100%) the data on the questionnaire can
be processed.
Descriptive statistics of Research Respondents
Respondents are divided based on certain criteria such as the old establishment of the
company, number of employees, revenue per year, and status monitoring Financial Services
Authority (FSA). The respondents can be seen in the following table.
Table 1 Respondents research is based on the old foundation of the company
long standing
amount
Percentage (%)
<2 years
10
33%
2-3 years
13
43%
> 3 years
7
24%
Total
30
100%
Source: Data Proses SPSS version 20, 2020
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
70 Return: Study of Management Economic And Business, Vol 3 (1), January 2024
Table 2 Respondents research is based on the number employees of the company
Number of Employees
amount
Percentage (%)
<20
13
43%
20-50 people
9
30%
> 50 people
8
27%
Total
30
100%
Source: Data Proses SPSS version 20, 2020
Table 3 Respondents research is based on the annual revenue the company
The annual revenue
amount
Percentage (%)
<Rp 700.000.000
16
53%
USD 700.000.000 -
Rp 1.400.000.000
4
14%
> Rp 1.400.000.000
10
33%
Total
30
100%
Source: Data Proses SPSS version 20, 2020
Table 4 Respondents research is based on the FSA supervised the company
FSA
Supervised
amount
Percentage (%)
Yes
13
43%
In the Process
0
0%
No
17
57%
Total
30
100%
Source: Data Proses SPSS version 20, 2020
Validity of Test Results
Test validity is used to measure the validity of a questionnaire (Bolarinwa, 2015;
Taherdoost, 2016). In this study, the questionnaire can be said to be valid if the value of R
arithmetic> R table. R table obtained from the (n-2) = 28 is 0.361 with a significance level of 5%.
Test validity can be seen in Table 5 below
Table 5 Test Validity
Variable
R arithmetic
R Table
Information
X1.1
0.884
0.361
Valid
X1.2
0.553
0.361
Valid
X1.3
0.828
0.361
Valid
X1.4
0.776
0.361
Valid
X1.5
0.838
0.361
Valid
X2.1
0.805
0.361
Valid
X2.2
0.769
0.361
Valid
X2.3
0.779
0.361
Valid
X2.4
0.815
0.361
Valid
X2.5
0.791
0.361
Valid
Y1.1
0.912
0.361
Valid
Y1.2
0.683
0.361
Valid
Y1.3
0.613
0.361
Valid
Y1.4
0.882
0.361
Valid
Y1.5
0.397
0.361
Valid
Y1.6
0.958
0.361
Valid
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
71
Return: Study of Management, Economic And Business, Vol 3 (1), January 2024
Y2.1
0.845
0.361
Valid
Y2.2
0.810
0.361
Valid
Y2.3
0.817
0.361
Valid
Y2.4
0.868
0.361
Valid
Y2.5
0.856
0.361
Valid
Source: Data Proses SPSS version 20, 2020
On Table 5 shows that r count> r table. R table in this test has a value of 0.361. Then all
the items on each variable is declared invalid.
Reliability Test Results
Reliability testing is the process of testing the entire statement in the questionnaire (Saw &
Ng, 2001; Souza et al., 2017). This test specifies whether the contents of the statement have been
reliable. A variable is said to be reliable if the value of Cronbach Alpha (a)> 0.6. (Ghozali, 2019).
A reliability test can be seen in Table 6.
Table 6 Test Reliability
variables
Cronbach
Alpha
Information
X1
0,879
Reliable
X2
0,836
Reliable
Y1
0.826
Reliable
Y2
0.883
Reliable
Source: Data Proses SPSS version 20, 2020
In Table 6 shows that the Cronbach Alpha> 0.6 and it can be concluded that all of the
variables in this study is reliable.
Partial assay results (t test)
Testing the hypothesis in this study using the Alpha value of 5% is 2.042. Then criteria for
acceptance or rejection of the hypothesis is Ha accepted and H0 is rejected when the value of
t>2.042 and significance <0.05. The results of data processing t test using SPSS version 20
can be seen in Table 7.
Table 7 Test Reliability
Variables
t
t table
Sig
Significant boundary
R2
Characteristics
Security
1.719
2,042
0.097
0.05
0.095
Service Security
4.973
2,042
0,00
0.05
0.469
Security
Adoption strategies
1.487
2,042
0.148
0.05
0.27
Source: Data Proses SPSS version 20, 2020
Simultaneous Test Result (Test F)
Result data processing simultaneously with the F-test using SPSS version 20 Solid seen in Table 8.
Table 8 Results of Simultaneous Testing (Test F)
Variables
t
t table
Sig
Significant boundary
R2
Characteristics
Services Security
12.419
3.34
0.000
0.05
.479
Characteristics,
Service, and
SecurityAdoption
strategies
31.826
3.34
0.000
0.05
.789
Source: Data Proses SPSS version 20, 2020
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
72 Return: Study of Management Economic And Business, Vol 3 (1), January 2024
Discussion and Interpretation of Results
Based on the partial results of testing against the security and characteristics of cloud
computing cloud computing can be concluded the results of testing the effect of the characteristics
of cloud computing to the user's security level indicates the positive direction with R
2
values of
9.5% and amounted to 1,719 t value is smaller than t table is 2.042 and the significance of
0.097. Value Significance testing is also greater than the value of 0.05. Thus, the characteristics of
cloud computing is not significant influence and partially on user security. This means
hypothesis1 is rejected. This can happen because the user already accepted the risk if their
resources on cloud computing is the use of a lease and sharing (Almutairi et al., 2018; Mustafa et
al., 2015). Characteristics of cloud computing do not make users believe much of the security
provided cloud provider (Grobauer et al., 2011; Subashini & Kavitha, 2011).
Based on the results of the partial testing cloud computing services to the security of cloud
computing can be concluded the test results influence the characteristics of cloud computing to
the user's security level indicates the positive direction with R
2
values of 46.9% and amounted to
4.973 t value is smaller than t table is 2,042 and significance of 0.00. Value Significance testing
is also smaller than the value of 0.05. Thus, the characteristics of cloud computing and the
significant influence partially on user security. First to hypothesis 2 is accepted. The ease and
familiar IT infrastructure to make the user more like this product compared to other products. In
addition, the resource provided infrastructure such as processor, memory, and storage are already
available and can be used directly if already paid. Specifications infrastructure cloud services
available ranging from the smallest (1-core CPU, 0.5 GB RAM, and 20 GB storage) to the largest
(whitelist 16 GB, 96 GB RAM and 48 TB of storage blocks). Uniquely, these infrastructure
resources can be scaled at any time (Manvi & Krishna Shyam, 2014; Zia Ullah et al., 2017).
Based on the test results of partial security of cloud computing to the strategy of adoption
of cloud computing can be concluded the test results influence the security of cloud computing to
the strategy of technology adoption shows the positive direction with R2 values of 27% and with
a t value of 4.973 is greater than t table is 2,042 and Significance amounting to 0.148. Value
Significance testing is also greater than the value of 0.05. Thus, cloud computing security has no
effect and no Significant partially on technology adoption strategy. This means that hypothesis 3
is rejected. The issue of data security was evidently still holding the highest attention if you want
to use the services of cloud computing. There are many aspects that can be seen in assessing
security holes in cloud computing (Liu, 2014; Sun et al., 2014).
Based on test results of simultaneous characteristics, service, and security to the adoption
of cloud computing strategy can be summed up the characteristics influence the test results,
services, and security of cloud computing to the technology adoption strategy indicates the
positive direction with R2 values of 78.6% and the calculated F value of 31.826 bigger than F
table is 3,34 and Significance of 0.000. Value Significance testing is also smaller than the value
of 0.05. With such characteristics, services, and cloud computing security and significant effect
simultaneously on technology adoption strategy. This means that hypothesis4 is accepted. At the
stage of adoption, users ensure that the application will be able to function in the new infrastructure
and continue to operate with applications that do not participate migrated. SLA outsourcing
strategy and determination should also be determined (Lu et al., 2012). At this time the user
determines the characteristics, services, and security sufficient to meet each company's standards.
CONCLUSION
There is no significant positive effect and partially of variable cloud characteristics to the
security of the user's system with R
2
values of 9.5% and with a t value of 1.719 <t table 2.042
and Significance 0.097 <0.05. There is a positive and significant effect of the variable partial
cloud services to the user's system security with R
2
values of 46.9% and with a t value of 4,973 >
t table 2.042 and Significance 0.000<0.05. There is no significant positive effect and partially
of variable cloud security to cloud computing technology adoption strategy with R
2
values of
27% and with a t value of 1.487 < t table 2.042 and Significance 0.148 <0.05. There is a positive
and significant effect simultaneously on the variable characteristics, services, and cloud security
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
73
Return: Study of Management, Economic And Business, Vol 3 (1), January 2024
to cloud computing technology adoption strategy with R
2
values of 78.6% and the value of F
value 31.826 <F table 3,34 and Significance 0,00 <0.05.
REFERENCES
Adiyasa, H., Hidayanto, A. N., Pinem, A. A., Solikin, Negara, E. S., & Putri, P. B. M. (2018).
Exploring the Factors for Cloud Computing Adoption in Indonesia. 2018 International
Conference on Computing, Engineering, and Design (ICCED), 137142.
https://doi.org/10.1109/ICCED.2018.00035 Google Scholar
Alfarizi, D. N., & Ikasari, I. H. (2023). Tinjauan Literatur Terhadap Pemanfaatan Cloud
Computing. JURIHUM : Jurnal Inovasi Dan Humaniora, 1(1), 148154. Google Scholar
Almutairi, A., Sarfraz, M. I., & Ghafoor, A. (2018). Risk-Aware Management of Virtual
Resources in Access Controlled Service-Oriented Cloud Datacenters. IEEE Transactions on
Cloud Computing, 6(1), 168181. https://doi.org/10.1109/TCC.2015.2453981 Google
Scholar
Anggraini, N., Binariswanto, & Legowo, N. (2019). Cloud Computing Adoption Strategic
Planning Using ROCCA and TOGAF 9.2: A Study in Government Agency. Procedia
Computer Science, 161, 13161324. https://doi.org/10.1016/j.procs.2019.11.247 Google
Scholar
Balboni, P. (2020). Cloud Computing for e-health of Data Protection Issues. ENISA Working
Group on Cloud Computing. https://www.enisa.europa.eu/news/enisa-news/cloud-
certification-scheme Google Scholar
Bolarinwa, O. (2015). Principles and methods of validity and reliability testing of questionnaires
used in social and health science researches. Nigerian Postgraduate Medical Journal, 22(4),
195. https://doi.org/10.4103/1117-1936.173959 Google Scholar
Bunyamin, T. K., Harisno, Kusumawardhana, V. H., & Warnars, H. L. H. S. (2018). Cloud
Computing Adoption Strategy Planning at Agricultural Central Data and Information
System, Ministry of Agriculture with Roadmap for Cloud Computing Adoption (ROCCA)
Model. 2018 Indonesian Association for Pattern Recognition International Conference
(INAPR), 274282. https://doi.org/10.1109/INAPR.2018.8627006 Google Scholar
Chawla, D., & Deorari, A. (2005). Inferential Statistics: Introduction to Hypothesis Testing.
Journal of Neonatology, 19(3), 259264. https://doi.org/10.1177/0973217920050313
Google Scholar
Chawla, V., & Sogani, P. (2011). Cloud Computing The Future (pp. 113118).
https://doi.org/10.1007/978-3-642-22577-2_15 Google Scholar
Dilevko, J. (2007). Inferential statistics and librarianship. Library & Information Science
Research, 29(2), 209229. https://doi.org/10.1016/j.lisr.2007.04.003 Google Scholar
Fardani, A., & Surendo, K. (2011). Strategi Adopsi Teknologi Informasi Berbasis Cloud
Computing untuk Usaha Kecil dan Menengah di Indonesia. Seminar Nasional Aplikasi
Teknologi Informasi 2011 (SNATI 2011) Yogyakarta, A1A6. Google Scholar
Ghozali, I. (2019). Multivariate Analysis Applications. Universitas Diponegoro. Google Scholar
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding Cloud Computing
Vulnerabilities. IEEE Security & Privacy Magazine, 9(2), 5057.
https://doi.org/10.1109/MSP.2010.115 Google Scholar
Gui, A., Fernando, Y., Shaharudin, M. S., Mokhtar, M., Karmawan, I. G. M., & Suryanto, -.
(2020). Cloud Computing Adoption Using TOE Framework for Indonesiaâ€
TM
s Micro
Small Medium Enterprises. JOIV : International Journal on Informatics Visualization, 4(4),
237242. https://doi.org/10.30630/joiv.4.4.458 Google Scholar
Haryanto, T. (2019). Implementation of Cloud Computing Using the Roadmap for Cloud
Computing Adoption (ROCCA) Method in Non-Ministry Government Institutions (Case
Study of Lembaga Ilmu Pengetahuan Indonesia). PINISI Discretion Review, 3(1), 69.
https://doi.org/10.26858/pdr.v3i1.13274 Google Scholar
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
74 Return: Study of Management Economic And Business, Vol 3 (1), January 2024
Ibrahim, M., & Kusnawi, K. (2013). Analisis Dan Implementasi Owncloud Sebagai Media
Penyimpanan Pada Yayasan Salman AlFarisi Yogyakarta. Data Manajemen Dan
Teknologi Informasi (DASI), 14(3), 32. Google Scholar
Khakshooy, A. M., & Chiappelli, F. (2018). Inferential Statistics I. In Practical Biostatistics in
Translational Healthcare (pp. 7190). Springer Berlin Heidelberg.
https://doi.org/10.1007/978-3-662-57437-9_5 Google Scholar
Kuyoro S. O, Ibikunle, F., & Awodele, O. (2011). Cloud Computing Security Issues and
Challenges. International Journal of Computer Networks (IJCN), 3(5), 247255. Google
Scholar
Laccourreye, O., Jankowski, R., & Lisan, Q. (2021). Mastering the descriptive statistics used in
otorhinolaryngology. European Annals of Otorhinolaryngology, Head and Neck Diseases,
138(5), 387390. https://doi.org/10.1016/j.anorl.2020.12.004 Google Scholar
Larson, M. G. (2006). Descriptive Statistics and Graphical Displays. Circulation, 114(1), 7681.
https://doi.org/10.1161/CIRCULATIONAHA.105.584474 Google Scholar
Liu, X. (2014). Data Security in Cloud Computing (pp. 801806). https://doi.org/10.1007/978-1-
4614-3872-4_103 Google Scholar
Lu, K., Röblitz, T., Chronz, P., & Kotsokalis, C. (2012). SLA-Based Planning for Multi-Domain
Infrastructure as a Service (pp. 243257). https://doi.org/10.1007/978-1-4614-2326-3_13
Google Scholar
Mangula, I. S., van de Weerd, I., & Brinkkemper, S. (2012). Adoption of the cloud business model
in Indonesia. Proceedings of the 14th International Conference on Information Integration
and Web-Based Applications & Services, 5463. https://doi.org/10.1145/2428736.2428749
Google Scholar
Maniniti, V. (2014). A Survey on Strategic Issues in Cloud Computing Adoption. International
Journal of Research, 1, 99114. Google Scholar
Manvi, S. S., & Krishna Shyam, G. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41,
424440. https://doi.org/10.1016/j.jnca.2013.10.004 Google Scholar
Meyer, K., Louridas, P., Steijaert, A., Galeazzi, F., Ruda, M., & Radojevic, B. (2013). Cloud
Service Delivery Across the Ramp;E Community - Opportunities and Risks. EUNIS 2013
Congress Proceedings: 2013: ICT Role for Next Generation Universities, 1(1).
https://doi.org/10.7250/eunis.2013.062 Google Scholar
Mustafa, S., Nazir, B., Hayat, A., Khan, A. ur R., & Madani, S. A. (2015). Resource management
in cloud computing: Taxonomy, prospects, and challenges. Computers & Electrical
Engineering, 47, 186203. https://doi.org/10.1016/j.compeleceng.2015.07.021 Google
Scholar
Perdana, P. A., & Suharjito, S. (2017). Cloud Computing Impelementation Using Model
Roadmap for Cloud Computing Adoption (ROCCA) on IT Consultant Industry. ComTech:
Computer, Mathematics and Engineering Applications, 8(3), 145.
https://doi.org/10.21512/comtech.v8i3.3887 Google Scholar
Raj, E. D., Babu, L. D. D., EzenduAriwa, Nirmala, M., & Krishna, P. V. (2014). Forecasting the
Trends in Cloud Computing and its Impact on Future IT Business (pp. 1432).
https://doi.org/10.4018/978-1-4666-5166-1.ch002 Google Scholar
Rittinghouse, J. W., & Ransome, J. F. (1999). Cloud Computing: Implementation, Management
and Security. Cloud Computing Implementation Management and Security. Google Scholar
Sangupamba, O. M., Prat, N., & Comyn-Wattiau, I. (2014). Business Intelligence and Big Data
in the Cloud: Opportunities for Design-Science Researchers (pp. 7584).
https://doi.org/10.1007/978-3-319-12256-4_8 Google Scholar
Saw, S. M., & Ng, T. P. (2001). The Design and Assessment of Questionnaires in Clinical
Research. Singapore Medical Journal, 42(3), 131135. Google Scholar
Souza, A. C. de, Alexandre, N. M. C., Guirardello, E. de B., Souza, A. C. de, Alexandre, N. M.
C., & Guirardello, E. de B. (2017). Propriedades psicométricas na avaliação de
Analysis of Cloud Computing Characteristics, Services and Security Against Information Technology
Strategy for Small Medium Enterprises
75
Return: Study of Management, Economic And Business, Vol 3 (1), January 2024
instrumentos: avaliação da confiabilidade e da validade. Epidemiologia e Serviços de Saúde,
26(3), 649659. https://doi.org/10.5123/S1679-49742017000300022 Google Scholar
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of
cloud computing. Journal of Network and Computer Applications, 34(1), 111.
https://doi.org/10.1016/j.jnca.2010.07.006 Google Scholar
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data Security and Privacy in Cloud Computing.
International Journal of Distributed Sensor Networks, 10(7), 190903.
https://doi.org/10.1155/2014/190903 Google Scholar
Taherdoost, H. (2016). Validity and Reliability of the Research Instrument; How to Test the
Validation of a Questionnaire/Survey in a Research. SSRN Electronic Journal.
https://doi.org/10.2139/ssrn.3205040 Google Scholar
Turner, D. P., & Houle, T. T. (2019). Conducting and Reporting Descriptive Statistics. Headache:
The Journal of Head and Face Pain, 59(3), 300305. https://doi.org/10.1111/head.13489
Google Scholar
Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and research
directions. Future Generation Computer Systems, 79, 849861.
https://doi.org/10.1016/j.future.2017.09.020 Google Scholar
Zia Ullah, Q., Hassan, S., & Khan, G. M. (2017). Adaptive Resource Utilization Prediction
System for Infrastructure as a Service Cloud. Computational Intelligence and Neuroscience,
2017, 112. https://doi.org/10.1155/2017/4873459 Google Scholar
Дресвянников, В., Dryesvyannikov, V., Бунимович, И., & Bunimovich, I. (2019). Cloud
Technologies in Knowledge Management. Bulletin of Kemerovo State University. Series:
Political, Sociological and Economic Sciences, 2018(4), 6772.
https://doi.org/10.21603/2500-3372-2018-4-67-72 Google Scholar