The Community for Technology Leaders
RSS Icon
Issue No.10 - October (2010 vol.43)
pp: 47-55
Nir Kshetri , University of North Carolina-- Greensboro, Greensboro
The developing world must exploit the opportunities afforded by cloud computing while minimizing the associated risks to allow access to advanced IT infrastructure, data centers, and applications and protect sensitive information.
cloud computing, software as a service, cyberespionage, developing world, e-education
Nir Kshetri, "Cloud Computing in Developing Economies", Computer, vol.43, no. 10, pp. 47-55, October 2010, doi:10.1109/MC.2010.212
1. The Economist, "The Long Nimbus,"25 Oct. 2008, special section, pp. 15-17.
2. T.S. Parikh, "Engineering Rural Development," Comm. ACM, vol. 52, no. 1, 2009, pp. 54-63.
3. R.L. Grossman, "The Case for Cloud Computing," IT Professional, vol. 11, no. 2, 2009, pp. 23-27.
4. V. Yeo, "'Instant Noodle' Mindset Undermines Cloud Security," ZDNet Asia, 30 June 2010; www.zdnetasia.cominstant-noodle-mindset-undermines-cloud-security-62201091.htm .
5. J. Burt, "Emerging Markets a Key for IT Hardware Vendors: Gartner,",22 July 2009; .
6. R. Smith, "IDC Says IT Cloud Services To Reach $42 Billion By 2012," Information Week, 20 Oct. 2008, 2008/10idc_says_it_clo.html.
7. P. Mwaniki, "Kenya; Out of the Blue, Here's the New," Daily Nation, 14 Aug. 2009, -index.html.
8. S. Kannan, "Rising on the Cloud," Hindu Business,19 Apr. 2010; 19/stories2010041950100300.htm.
9. M. Cleverley, "Viewpoints: Emerging Markets: How ICT Advances Might Help Developing Nations," Comm. ACM, vol. 52, no. 9, 2009, pp. 30-32
10. SciDev.Net, "Africa; Plan to Slow the Brain Drain From Africa," Africa News,23 Dec. 2009.
11. Alibaba Group, Corporate Overview, 2009; .
12. R. Firth, "Use the Cloud to Work from Home," ITWeb, 13 Aug. 2009, .
13. P. Abrar, "Managed Services Spell Big IT Business," The Economic Times, 27 July 2009; Managed-services-spell-big-IT-business/ articleshow4823813.cms.
14. D. MacMillan, "Google, Zoho Challenge Microsoft Abroad, Too," Businessweek,13 Sept. 2009; sep2009tc20090911_644394.htm.
15. "SMBs in Brazil to Spend $260USM on IT Security in 2007," BusinessWire,20 Nov. 2006.
16. K. Kinyanjui, "High Speed Internet Exposes Kenya to Cybercrime," Business Daily,13 Aug. 2009; -/rx1rgv/-index.html.
17. C. Otis and P. Evans, "The Internet and Asia-Pacific Security: Old Conflicts and New Behavior," Pacific Rev., vol. 16, no. 4, 2003, pp. 549-550.
18. L. McCreary, "What Was Privacy?" Harvard Business Rev., vol. 86, no. 10, 2008, pp. 128-130.
19. Information Warfare Monitor/Shadowserver Foundation, Shadows in the Cloud: Investigating Cyber Espionage 2.0, Joint Report: Information Warfare Monitor Shadowserver Foundation, JR03-2010, 6 Apr. 2010; .
20. J. Adams, "Virtual Defense," Foreign Affairs, vol. 80, no. 3, 2001, pp. 98-112.
21. N. Kshetri, "The Adoption of E-Business by Organizations in China: An Institutional Perspective," Electronic Markets, vol. 17, no. 2, 2007, pp. 113-125.
22. M.F. Guillén and S.L. Suárez, "Explaining the Global Digital Divide: Economic, Political, and Sociological Drivers of Cross-National Internet Use," Social Forces, vol. 84, no. 2, 2005, pp. 681-708.
23. R. Mullins, "The Biggest Cloud on the Planet Is Owned by … the Crooks: Security Expert Says the Biggest Cloud Providers Are Botnets," Network World,22 Mar. 2010; .
24. N. Kshetri, The Global Cyber-crime Industry: Economic, Institutional and Strategic Perspectives, Springer-Verlag, 2010.
25. N. Vardi, "Chinese Take Out," Forbes,25 July 2005, p. 54.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool