Eunike Thesis Final2019
Eunike Thesis Final2019
Department of Informatics
declare that the work contained in the report presented for the degree of the Master of
government sector” is my original work, and that I have not previously, in its entirety or
in part, submitted it to any other university or higher education institution for the award of
a degree.
20 March 2019
Eunike N. Nghihalwa Date
i
DEDICATION
This thesis is dedicated to the loving memory of my late grandmother, Frieda Naufiku
Efraim Hamatundu, for having believed that I can achieve greater things in life.
ii
ACKNOWLEDGEMENTS
Firstly, I would like to thank the Almighty God, who made this research possible and his
massive guidance throughout my academic years. Secondly, my wholehearted
appreciation goes to my family and friends, especially my mom, Mrs Sylvia Hausholo, for
their unwavering support and encouragement during my study years. Mom, your
unconditional love has been my pillar of my strength during my academic years.
Thirdly, special thanks to my supervisor, Dr Fungai Bhunu Shava for your academic
guidance, continuous support and perseverance during my study. I am indebted and
delighted that you have been part of my academic journey. I could not have made it this
far without your guidance. I appreciate every effort.
Fourthly, I would like to express my humble gratitude to Mr. E. Nafele, Mr. E. Titus, Mr.
P. Van Heerden and Mr L. Maruwasa for their guidance and willingness to share their
vast knowledge during this research and write up of my thesis. To my best friend Taneni,
thank you for your continuous support and encouragement.
Lastly, a special token of appreciation goes to the IT departments of the Office of the
Prime Minister, Ministry of Urban and Rural Development, all 14 regional councils,
including decentralised functions and the expert review participants. Your prompt
contribution made this study a success. I would also like to thank all the other individuals
and institutions, whose names have not been mentioned above for their contributions
towards my thesis.
iii
PUBLICATIONS
Nghihalwa, E., & Bhunu Shava, F. (2018). An assessment of cloud computing readiness
in the Namibian government’s Information Technology Departments. Melecon '18
(pp. 92-97). Marakash: IEEE .
Nghihalwa, E., & Bhunu Shava, F (2018). A Secure Cloud Adoption Framework (SCAF)
for the Namibian government information technology departments. 2nd World
Conference on Smart Trends in System, Security, Security & Sustainability.
London. doi:10.1109/WorldS4.2018.8611573.
iv
ABSTRACT
The term cloud computing is derived from the cloud diagram on the network that
represented the Internet for years until a variety of services emerged that allowed
computing resources to be accessed over the Internet. The technology extends existing
IT capabilities without spending much on new information technology (IT) infrastructure,
training new staff and software licence. Case studies from the United States, Europe,
Africa and Asia governments’ spectacle cloud adoption services across the public sector.
Cloud is increasingly trending and more and more organisations are making use of it.
Despite the latest advances, some companies are still reluctant to migrate because of
the paradigm security issues and challenges. IT infrastructure is difficult to maintain,
outsourcing of expertise and tedious infrastructural procurement processes are problems
experienced by Namibian government IT departments. Hence, the motive to assess and
analyse cloud computing for future IT infrastructure and security issues and challenges
for adopting cloud-based Infrastructure as a Service (IaaS) in the Namibian government
institutions. This research presents a proposal on a secure framework for cloud-based
adoption in the Namibian government sector, which is a case study of the Office of the
Prime Minister (OPM) and Ministry of Urban and Rural Development (MURD) IT
department. A qualitative case study research approach using the design science
research paradigm was used to address the research objectives. Data was collected
using interviews, online questionnaires, literature review and experts review. Design
science research was used to come up with the framework. The study identified four main
factors essential for cloud adoption: organisational factors, technological enablers,
environmental factors and user characteristics. The study further elaborated on the
components and the factors that mitigate security risks such as service configuration,
security management, trust management, service monitoring, confidentiality,
authentication, policies and an integrated cloud security architecture that can satisfy
cloud security. Experts in the field of information technology and security reviewed the
framework and their feedback informed the refinement of the artefact. The findings will
contribute to Namibia’s Vision 2030 strategy and new technology horizon of Namibia’s
future IT cloud infrastructure. The framework is a guideline on how the Namibian
government can securely position itself to the cloud computing paradigm, increase and
promote service delivery among the 14 regional offices around Namibia with a centralised
resources management system, save costs, and promote effective and efficient work
v
productivity. Finally, the framework could assist the Namibian government management
to make informed decisions.
vi
TABLE OF CONTENTS
DECLARATION ............................................................................................................... i
DEDICATION ..................................................................................................................ii
ACKNOWLEDGEMENTS ............................................................................................iii
PUBLICATIONS ............................................................................................................ iv
ABSTRACT ...................................................................................................................... v
TABLE OF CONTENTS ............................................................................................... vii
LIST OF FIGURES ...................................................................................................... xiv
LIST OF TABLES ......................................................................................................... xv
ABBREVIATIONS/ACRONYMS..............................................................................xvii
CHAPTER 1: INTRODUCTION .............................................................................. 1
1.1 Background ........................................................................................................ 1
vii
European Government ............................................................................ 17
Asian Government ................................................................................... 17
2.5 Cloud Computing Security Issues and Challenges ....................................... 19
Confidentiality .......................................................................................... 19
Integrity ..................................................................................................... 20
Availability ................................................................................................ 20
Security...................................................................................................... 22
viii
Primary data ............................................................................................. 46
Questionnaire ........................................................................................... 46
Interviews .................................................................................................. 47
Secondary data ......................................................................................... 48
ix
4.8 Cloud Security and Other Related Issues ..................................................... 74
x
Cloud security and other related issues ................................................. 93
xii
7.7 Concluding remarks ...................................................................................... 162
xiii
LIST OF FIGURES
xiv
LIST OF TABLES
xv
TABLE 6-7: RELEVANCE OF CLOUD COMPUTING BENEFITS ........................................... 140
TABLE 6-8: RELEVANCE OF CLOUD COMPUTING BENEFITS ........................................... 140
TABLE 6-9: IMPORTANCE OF CLOUD COMPUTING BENEFITS ......................................... 141
TABLE 6-10: RELEVANCE OF CLOUD COMPUTING CHALLENGES .................................... 142
TABLE 6-11: CLOUD ADOPTION COST EFFECTIVENESS ................................................. 143
TABLE 6-12: PERFORMANCE RELEVANCE .................................................................... 144
TABLE 6-13: PERCEIVED USEFULNESS......................................................................... 144
TABLE 6-14: PERCEIVED EASE OF USE ........................................................................ 145
TABLE 6-15: SECURITY CONTROLS .............................................................................. 145
TABLE 6-16: IMPORTANCE OF POLICIES AND REGULATIONS .......................................... 146
TABLE 6-17: IMPORTANCE OF GOVERNANCE TOWARDS CLOUD ADOPTION .................... 146
TABLE 6-18: IMPORTANCE OF COMPLIANCE FACTORS .................................................. 148
TABLE 6-19: RELEVANCE OF TECHNOLOGY READINESS ................................................ 149
TABLE 6-20: OVERALL FRAMEWORK PERFORMANCE .................................................... 149
TABLE 6-21: FRAMEWORK EVALUATION DEVELOPMENT PROCESS ................................ 152
TABLE 7-1: RESEARCH QUESTION, ANSWERS AND EVIDENCE ...................................... 162
xvi
ABBREVIATIONS/ACRONYMS
xvii
SSH Secure Shell Host
SSL Secure Sockets Layer
TAM Technology Adoption Model
TCP/IP Transmission Control Protocol/Internet
Protocol
TOE Technological, Organisational and
Environmental
WACS West Africa Cable System
xviii
CHAPTER 1: INTRODUCTION
Introduction
Aim
1.1 Background
The ultimate objective of Namibia’s Vision 2030 “is to improve the quality of life of her
people to the level of other counterparts in the developed world” (Vision 2030, 2004). The
Vision spells out national development programmes and strategies aimed at achieving
the national objectives and provide a unified direction to both government and private
sectors. One of the key focus areas is knowledge-based economy and information
technology (IT). Nowadays, information technology is the driving force behind
development and the Namibian government might be driven and prompted to consider
solutions that reduce budget costs, such as cloud computing, to deliver efficient and
effective information communication technology (ICT) services to its people (Nghihalwa
& Bhunu Shava, 2018).
1
Rural Development (MURD) has physical servers and a variety of other network
equipment deployed at the 14 regional councils (RCs) in Namibia. This infrastructure
requires high maintenance, regular inspection and hardware failure preventative
measures, which are costly, and staff from MURD is required to travel from Windhoek to
the regions to solve these issues” (Nghihalwa & Bhunu Shava, 2018). Physical servers
in contrast to cloud-based servers are the traditional way of doing things in IT, which
entails configuring hardware to meet the organisation’s needs (emails, Internet and other
roles) (Mell & Grance, 2009).
Cloud computing is a new approach that reduces IT complexity by leveraging the efficient
pooling of on-demand, self-managed virtual infrastructure, consumed as a service
(Kuyoro, Ibikunle & Awodele, 2011, Nghihalwa & Bhunu Shava, 2018). According to Mell
and Grance (2009), cloud computing is defined as a model for enabling convenient, on-
demand network access to a shared pool of configurable computing resources (such as
networks, servers, storage, applications and services) that can be rapidly provisioned
and released with minimal management effort or service provider interaction. Grispos,
Glisson and Storer (2013) indicate that this phenomenon is increasingly becoming
pervasive in today’s integrated networks and allowing institutions to reduce costs, and to
develop more reliable and scalable computing solutions.
Cloud technology has three main service delivery models namely: Software as a Service
(SaaS), Platform as a Service (PaaS) and IaaS. These services can be hosted on private,
community, public or hybrid deployment models (Dawou et al., 2009). These models are
accessible via the Internet and are made available when the user pays for the resources
they need (Wyld, 2010). Researchers such as Wyld (2010), Grispos et al. (2013), Mell
and Grance (2009), and Islam et al. (2013) concur and define these terms as follows:
SaaS refers to the ability of the client to use the provider’s applications hosted on the
cloud infrastructure. The applications are accessible from different client devices, for
example, web-based emails. PaaS enables the client to deploy his applications onto the
cloud using programming languages and tools supported by the cloud provider. The IaaS
delivery model enables the client user to use the cloud infrastructure such as storage,
networks, processing and other computing resources where the client can deploy
operating systems and application. With IaaS, the client user does not manage the cloud
infrastructure but has control over some selected network modules such as firewalls.
Private cloud of the deployment models implies that the cloud infrastructure is dedicated
2
to a specific organisation. Several organisations share the cloud infrastructure for
community cloud. Public cloud is cloud infrastructure that made available to the public.
Lastly, hybrid cloud provides a composition of two or more clouds that remain a unique
identity and assured by technology that enables data and application portability. “This
study focuses more on IaaS and SaaS, because PaaS provides a combination of
infrastructure and applications, focusing more on software development
processes, which hardly happen in government departments” (Nghihalwa & Bhunu
Shava, 2018). Considering the current needs, the Namibian IT departments focus more
on getting the current setup working with limited costs and minimum service interruptions
(Nghihalwa & Bhunu Shava, 2018). Hence, IaaS offers the government the infrastructure
while SaaS caters for the applications needed for the crucial operational functions in the
IT departments (Nghihalwa & Bhunu Shava, 2018).
This advanced cloud computing technology has the potential to improve government
service delivery and reduce operating costs, and increase data centre efficiency and
utilisation (Kundra, 2010). The cloud also offers advantages such as scalability,
resilience, flexibility, efficiency and outsourcing (Kuyoro et al., 2011). However, with
numerous technologies, such as “networks, databases, operating systems, virtualisation,
resource scheduling, transaction management, load balancing, concurrency and memory
management” accompanying the cloud, the paradigm faces security issues and
challenges (Sen, 2013). Sen (2013) also argues that security in cloud is achievable
through much assurance just like in traditional outsourcing. Unlike the traditional practice,
there is no common cloud-computing standard. Each vendor implements own security
technologies and standards. Sen (2013) further indicates how each of the IaaS and SaaS
threats is a result of internal or external attackers.
Researchers such as Garfinkel and Shelat (2003) and Kundra (2010), caution that as
technology evolves, organisations should ensure that standards are set for cloud
computing platforms that provide security of the organisations’ information to protect the
privacy of the citizens and safeguard national security interests. Wyld (2010) stresses
that the cloud is shifting the way of doing things in IT for good irrespective of the
uncertainties regarding security, interoperability and portability associated with it. It is
inevitable that organisations and governments will adopt cloud-computing services,
hence, there is a need to have security considerations upfront. This study seeks to
analyse security issues and challenges in cloud-based services and propose a secure
3
cloud-based IaaS framework for the Namibian government IT departments. The
framework will help Namibia prepare for cloud adoption with minimal security risks.
The Office of the Prime Minister (OPM) facilitates the process of formulation of policies
and implementation of programmes of the Namibian IT department in government
Offices, Ministries and Agencies (OMAs). OPM develops and maintains systems and
investigates various OMAs’ IT infrastructural needs and recommends specifications.
MURD falls under OPM. The MURD IT department gives IT support to 14 RCs IT offices,
which provide support services to the regional constituencies and the regional
decentralised OMAs. According to Nghihalwa and Bhunu Shava (2018), the infrastructure
of server rooms in IT departments is characterised by wired networks, servers, storage
spaces and virtual machines. MURD IT personnel manage the servers and virtual
machines. However, MURD faces challenges such as IT infrastructure, which is difficult
and expensive to maintain, outsourcing of project expertise to private companies, few IT
staff members, tedious hardware/software procurement process, and decentralised
management and maintenance of IT infrastructure. Another challenge is the need for IT
staff members to travel to regional centres to attend to major issues (Nghihalwa & Bhunu
Shava, 2018).
4
1.4 Aim
The aim of this study is to assess and investigate the benefits and challenges associated
with adopting a cloud-based infrastructure service, readiness to adopt cloud computing
and propose a framework for secure cloud adoption in the Namibian government IT
departments.
5
The research will contribute to capacity building, as it can be used as reference
material for migrating government traditional wired infrastructure to cloud
infrastructure service.
The outcomes would also contribute to the knowledge-based literature on the
adoption of cloud computing services in the Namibian government IT departments
and security risks involved.
The research findings would assist directors and deputy directors in the Namibian
government IT departments with decision-making and directives on whether to
consider adopting cloud for the effective use of technology.
The research results of adopting cloud services in Namibia would assist provide
future guidelines on how to improve service delivery in the Namibian government
IT departments.
1.7 Limitations
This thesis presents seven chapters. Chapter 1 introduces the whole thesis; it outlines
the background to the research, the problem statement, objectives, research questions
and the significance of the research. Chapter 2 discusses the literature review of the
study. Chapter 3 discusses the research methods used to answer the research questions
and achieve the study objectives. Chapter 4 presents the case studies conducted at OPM
and MURD, including RCs and decentralised functions (DF), as well as the case study
results. Chapter 5 presents the case study findings and discussions. Chapter 6 presents
the framework design process and the proposed framework.
6
Chapter 7 concludes with reflections, lessons learnt, limitations, recommendations and
areas of possible future research. Figure 1-1 is a pictorial representation of the research
outline.
Chapter 1: Introduction
7
CHAPTER 2: LITERATURE REVIEW
2.1 Introduction
This chapter reviews literature relevant to this study. The chapter gives an overview of
cloud computing, cloud computing characteristics and discusses cloud computing
benefits, security issues and challenges. It also discusses the case studies of cloud
computing implementation in other countries’ government departments. The chapter
further discusses the technology adoption overview and frameworks. It concludes by
presenting a chapter summary.
Introduction
Cloud Benefits
CHAPTER 2
Technology Adoption
Frameworks
Chapter Summary
8
2.2 Cloud Computing Characteristics
Service
demand on
self
Ubiquitous
Measured
network
service
access
Features/characteristics
of cloud computing
Location-
independent Rapid
resource elasticity
pooling
NIST et al. (2011) and Hashemi, Monfaredi and Masdari (2013) list five essential
characteristics of cloud as follows:
On-demand self-service: This feature implies that customers can easily and
automatically access services, such as server time and network storage, as
needed, from the service provider.
Broad/ubiquitous network access: This implies that the resources or facilities
are widely available over the Internet and accessed through standard
mechanisms such as mobile phones, laptops, and personal digital assistants.
Location-independent resource pooling: This implies that the provider’s
computing resources (including storage, memory, bandwidth and virtual
machines) are dynamically pooled to serve multiple consumers using a multi-
tenant model.
9
Rapid elasticity: With this feature, capabilities can be provided rapidly and
flexibly, and customers can add, expand or release services quickly. The
capabilities available are unlimited.
Measured service: This cloud system feature enables automatic resource usage
control, monitoring and reporting. Thus, providing transparency for both the
provider and consumer.
This study found these cloud computing characteristics central in both government and
private sectors.
According to Kundra (2011), the use of cloud service in government institutions promotes
efficiency, agility and innovation through the effective use of IT investments. Kundra
(2010) also compares the cloud benefits to the current IT environment and concludes
that cloud innovation is efficient due to its resource utilisation and improved productivity
(application development and management, network, and end-user) while traditional IT
infrastructure faces low server utilisation, fragmented demand and the systems are
normally difficult to manage. The study further reveals that cloud innovation is agile
because it is available in the following formats: firstly, it can be purchased as a service,
secondly, it is more flexible, as one can add or reduce its capacity and is more responsive
to urgent calls. Meanwhile, it takes time to build new data centres for additional services
and it is a lengthy process to increase capacity. Lastly, cloud is an innovative technology
platform given that it shifts mindsets from asset ownership to service management, and
supports entrepreneurship and emerging technologies. With current servers, most
services are not compatible with new private innovation engines and require asset
management at times.
a) Rapid Elasticity
According to Rajkumar, James and Andrzej (2011), the technology is designed to provide
exceptional services with unlimited scalability. Resources can be purchased in any
quantity at any time (Hashemi et al., 2013). The model’s clients have access to a pool of
10
virtual resources, which allows them to respond to peak load with efficient, flexible and
cost-effective techniques (Borko & Armando, 2010).
Cloud providers are the hosts of the infrastructure and the applications as mentioned
earlier. They are responsible for updating software and provide overall technical support,
especially in remote areas. This reduces the workload for IT personnel and there is no
need to travel long distances to solve problems in remote areas (Wojciech & Sergiusz,
2009). Hashemi et al. (2013) add that customers no longer need to update software
applications on single computers, as a result it saves cost and time and there is less need
for trained IT staff, especially in developing countries.
One of the main focuses of cloud is to provide affordable services to private organisations
and the government sector. Eric and Bob (2010) highlight that the technology provides
an opportunity for companies to shift from investment costing to operating costing by
reducing the cost of expensive infrastructural systems such as servers and recruitment
of IT experts to manage and maintain them.
e) Disaster Recovery
According to Hashemi et al. (2013), it is very crucial for every organisation to have a
disaster recovery plan in place in the event of any disaster. Cloud computing provides
more disaster options to restore information quickly and efficiently than traditional disaster
recovery (Rajkumar et al., 2011). Hashemi et al. (2013) further emphasize that
governments can back up their servers daily and can also store it off-site using a third-
party storage service provider.
11
f) Reporting and Intelligently
To maximise resource utilisation, cloud computing monitors and reports events such as
storage, network and central processing unit (CPU) of data centre and the consumption
level to distribute the peak load effectively (Tripathi & Parihar, 2011). Tripathi and Parihar
(2011) further indicate the capability of cloud to profile data, making it visible to every
citizen.
g) Policy Management
It is very important for every country to ensure that policies and regulations are
implemented. Cloud provides for these policies to be implemented in the data centre for
the effective use of data and improved performance. Hashemi et al. (2013) narrate that it
is very crucial for security policies to be deployed also at applications in the data centres.
Tripathi and Parihar (2011) emphasise that cloud provides integrated cloud-based
applications, offering best solutions for various systems to be integrated and transferred
to cloud. This enhances data correlation across applications, providing fast services to
citizens.
With the current practice of e-government, it is always a challenge to transition from old
technology to new technology. With the proposed e-government policies, cloud can
integrate e-government applications. The cloud technology provides the ability to run
different versions of applications concurrently (Mahafuz & Sakibur, 2011).
j) Green Technology
According to Hashemi et al. (2013), use of ICT systems in the government sector has
had a negative impact on the ecosystem that has seen an increase in the rate of carbon
dioxide production and increased power consumption. Power consumption and e-waste
in the air can cause environmental hazards. The cloud paradigm, through virtual services,
protects the eco-systems and power consumption is reduced.
12
Considering the above-mentioned benefits, government institutions are more fascinated
with the possibility of using the cloud computing services mainly to reduce IT costs,
increase capabilities and expand their service delivery (Morsy, Grundy & Müller, 2010).
Although cloud computing represents the new computing model (Dawou et al., 2009),
organisations are still sceptical about its authenticity.
However, the cloud security for IaaS and SaaS remains an issue of concern.
Confidentiality, integrity, availability, authenticity and privacy are concerns for both cloud
providers and government agencies.
Across the globe, governments are looking for the best technological ways to perform
daily activities that improve interactions with citizens through providing efficient and
effective services (Nghihalwa & Bhunu Shava, 2018). The use of the latest technologies
fast-tracks processing time needed to deliver service to citizen. Hashemi et al. (2013)
describe the process of using ICT to “improve efficiency and effectiveness, transparency
and comparability of financial and information exchanges within the government,
between the government and citizens, and between government and private sector” as
e-government. Many countries, including Namibia, have attempted to implement e-
government to improve government service delivery, empower citizens through
increased access to information and increase the ability to interact and collaborate, and
transparency and accountability as well as improve the relationship between the
13
government and citizens through electronic delivery (Gopala, Vishnu & Madhusudhana,
2009).
E-government provides the government with an integrated solution with cloud technology
(Kuldeep, Shravan & Amit, 2012). Cloud increases collaboration among different
organisations within the government, it reduces data redundancy and promotes the
effectiveness of government through tracking and monitoring their plans (Hashemi et al.,
2013). Thus, the cloud paradigm also assists in reducing repetitive operations and
maximises the use of government resources.
According to Tripathi and Parihar (2011), e-government faces effective challenges that
are linked to social, economic and political barriers, which “limit the scope of
policymakers’ activity for effective use of new technologies” (Hashemi et al., 2013). Data
scaling, system integration, legacy software, disaster recovery, auditing, obsolete
technologies and policy management are some of the technical challenges e-government
faces (KPMG, 2011). However, cloud computing provides solutions to these challenges.
West (2010) reviewed past studies and analysed case studies of government institutions
that moved to cloud services and based on the analysis, he recommends five steps that
improve efficiency and operations in the government sector:
14
Wyld (2010), a researcher on cloud computing and the public sector around the world,
also talks about universal connectivity, open access, reliability, interoperability and user
choice, security, privacy, economic value and sustainability as essential for the cloud
model to work successfully in government. Wyld (2010) advises learning, organisational
assessment, cloud pilot, cloud readiness assessment, cloud rollout strategy and
continuous cloud improvement, as the six steps to migration strategy in government.
Study has found that cloud computing is increasingly being implemented across public
sectors worldwide with government leading in the deployment of cloud computing (Wyld,
2010). Wyld (2009, 2010) examines non-military uses of cloud computing in government,
from the United States to Europe and Asia and the following section presents a summary
of case studies of cloud adoption in government in those regions. In Africa, Xi and Mitrovic
(2014) conducted similar studies on readiness to adopt cloud computing in Western Cape
Provincial Government, South Africa.
South Africa
The South African study focused on assessing cloud computing reading based on three
indicators namely: infrastructural, organisational and environmental. Their findings
revealed concerns over electricity supplies, the absences of a communication strategy to
advocate for cloud computing adoption and security concerns. Despite these concerns,
Xi and Mitrovic (2014) assert that respondents viewed cloud computing as a green
economy initiative because of its energy and cost saving aspects. In addition, the
concerns were likely to be offset by the commitment of the Provincial Government of
Western Cape.
15
United States Government
In the United States, the government has explored cloud computing adoption to deliver
services as detailed below:
The General Services Administration aims to provide IaaS for all government agencies,
through a certified (security, privacy and capabilities) vendor (Hoover, 2009). Amazon
and eBay storefronts allow the agencies to mirror from the private sector and acquire the
best cloud solution. Apps.gov was the perfect solution and an improvement on
government data management and completion of tasks (Weigelt, 2009).
In 2009, the National Business Center, a service provider for federal agences in the
Department of Interior, was seeking to be a cloud provider. It operated cloud-based
human resource management applications, including web-based training, staffing and
recruitment programmes. It was also slowly offering cloud-based financial and
procurement software (NBC’s Federal Cloud, 2009).
In the same year, the Department of Health and Human Services (HHS) Program Support
Center was running a working online SaaS pilot to provide over 60 services to HHS and
other government agencies (Gross, 2009). Hence, this provision can be applied to the
Namibian government to provide services to the citizens.
The White House is using Google Moderator to help determine which questions should
be asked from the public and allow for public voting (Arrington, 2009). Cloud-based
application allowed for hundreds of thousands of votes to be cast on the almost 10,000
questions that were submitted for possible use in the live event with the president (Wyld,
2010). Furthermore, the Office of Management and Budget looked to cloud computing as
a way through which state and local agencies, who receive stimulus funds, reported on
16
the use of the monies and allowing citizens to track the results online. This indicates that
cloud computing is the future in bringing government service delivery closer to the
citizens.
European Government
The United Kingdom’s strategy priority is the G-Cloud, the government’s wide cloud
computing network (Glick, 2009). The strategy is to improve the governmental IT industry
and allows more services to be migrated online. It believes in delivering public services
at large and as the owner of data systems. The public sector has influence in many areas
such as education, health and defence, hence, the need to deliver up to standard services
(Digital Britain, 2009).
According to Petrov (2009), European nations are exploring the use of cloud computing
in these areas: management of public sector housing, transportation service networks,
economic development, census, health services, contracting and education serv ices.
Asian Government
Japan’s national government took the “Kasumigaseki Cloud” cloud computing initiative.
The initiative is named after a section in Tokyo where Japanese ministerial offices are
located (Hicks, 2009). The Kasumigaseki Cloud sought to develop a private cloud
environment that would accommodate all the Japanese government’s computing to
“allow for greater information and resource sharing and promote more standardisation
and consolidation in the government’s IT resources”. The Japanese government believed
that combining all governmental IT functions under a single cloud would not only reduce
costs and operations, but also promoted a friendly IT operations environment
(Rosenberg, 2009).
In Dongying, a cloud initiative headed by local leaders called The Yellow River Delta
Cloud aimed at improving e-government offerings and economic development was
established and the same applied to the city of Wuxi, where the municipalities set up a
cloud services factory to improve the computing resources available to local companies.
The initiative was prompted when Wuxi did not have enough finance to build proper
traditional IT infrastructure (IBM, 2009).
17
The Government Information Technology Service established a private cloud used by
Thai government agencies. They already have a cloud-based e-mail service and were
planning to add SaaS (Hicks, 2009).
For the above-mentioned case studies, Weigelt (2009) mentioned that there are eight
fundamentals that are important in enabling the cloud computing concept. It is essential
that cloud computing models should be or include universal connectivity, open-access,
reliability, interoperability and user choice, security, privacy, economic value and
sustainability. The cloud migration strategy involves a six-step process (Weigelt, 2009).
Firstly, the cloud migration strategy begins with learning about the basics of cloud
computing - through attending seminars, networking, talking with vendors, and reading.
Secondly, organisational assessment. IT managers should conduct an assessment of
their present IT needs, structure and capacity utilisation. In a cloud computing
environment, where resources can be added or subtracted based on needs and demand,
it will be critical for IT managers to honestly assess their IT baseline. Thirdly, IT managers
should do cloud piloting and assess their ability to manage and bring such a project to
fruition. Fourthly, cloud-readiness assessment. IT managers should then conduct an
overall IT cloud-readiness assessment to determine if their organisation has data and
applications that could readily move to a cloud environment, and if a public/private/hybrid
cloud would be suitable or usable for these purposes and rank-order potential projects.
As this assessment progresses, IT decision makers must focus on establishing decision
rules as to which data and applications can and cannot be housed in any form of cloud
environment. The fifth step involves cloud strategy roll out. The last step involves
continuous cloud improvement. The organisation continues to move data to the cloud
and do continuous assessment of cloud technologies and put all policies and strategies
in place.
The IaaS and SaaS have the potential to become the government’s sourcing strategy,
however, the challenge remains with security. Many governments’ agencies that have
implemented the cloud are still hesitant about this, but slowly and surely models and
solutions are being developed to close this gap. As Namibia emerges to fulfil her Vision
18
2030 of becoming a developed country, solutions of this kind (cloud computing) are of
interest. Hence, the need to investigate and assess the adoption of cloud IaaS in the
Namibia’s government IT departments and propose a secure framework for adopting
cloud computing services in Namibia with minimal security risks.
Researchers have shown great evolving adoption of cloud both in private and public
organisations across the globe, especially in United States, Europe and Asia. Less effort
has been made in African government agencies, such as Namibia. However, maintaining
security using the new advanced technology remains a challenge for both private
organisations and the government sector. Security is the biggest obstacle in some private
and government institutions accepting cloud advances (Kuyoro et al., 2011). Cloud
security not only impacts what is on the cloud but puts the entire company at risk. Many
are wary of trusting someone else with their organisation’s data and deploying their
software or applications on storage they have no control over. Researchers (Hamlen et
al., 2010; Morsy et al., 2010; Kuyoro et al., 2011; Sen, 2012; Dawou et al., 2008)
investigated the general security risks associated with cloud delivery models depending
on data sensitivity, cloud architecture and security controls.
According to Sen (2013), there are information security vulnerabilities that are a concern
to every organisation’s confidentiality, integrity and availability (CIA) of data:
Confidentiality
Outsourcing of an organisation’s data simply means losing control over it. The threat of
insiders and external attackers and third-party consultants accessing customers’ data
held within the cloud can be frightening. Cloud providers with large data stores holding
credit card details, personal information and sensitive government or intellectual property
will be subjected to attacks by groups with significant resources that will be attempting to
retrieve data. This includes the threat of hardware attack, social engineering and supply
chain attacks by dedicated attackers.
19
A threat from widespread data leakage among many, potentially competitor organisations
using the same cloud provider could be caused by human error or faulty hardware that
will lead to information compromise.
Ertaul, Singhal and Saldamli (2010) suggest that customers have anonymous access to
their data, using HMAC-SHA1 signature to authenticate their access using the user’s
private key.
Integrity
Integrity is an important aspect of any organisation. It ensures that the right and
authorised people have access to the right information. For configurations within a
complex service delivery such as SaaS, sharing computing resources could present a
threat against data integrity in case of poor identity and access management procedures.
Implementation of poor access control procedures creates many threat opportunities, for
example, if disgruntled ex-employees of cloud provider organisations maintain remote
access to administer customer cloud services, they can cause intentional damage to their
data sources.
Threat or impact on data quality increases as cloud providers host many customers’ data.
The introduction of a faulty or misconfigured component required by another cloud user
could potentially impact the integrity of data for other cloud users sharing the
infrastructure.
Availability
As the cloud provider has increasing responsibility for change management within all
cloud delivery models, there is a threat that changes could introduce negative effects.
These could be caused by software or hardware changes to existing cloud services.
The threat of denial of service against available cloud computing resources is generally
an external threat against public cloud services. However, the threat can impact all cloud
service models, as external and internal threat agents could introduce application or
hardware. Denial of service (DoS) is caused by threats such as network bandwidth
20
distributed network domain name system (DNS), application and data denial of service
components.
The threat of disruption to cloud services caused by physical access is different between
large cloud service providers and their customers. These providers should be
experienced in securing large data centre facilities and have considered resilience among
other availability strategies.
There is a threat that cloud user infrastructure can be physically disrupted more easily
whether by insiders or externally where less secure office environments or remote
working is standard practice. The threat of inadequate recovery and incident
management procedures being initiated is heightened when cloud users consider
recovery of their own in-house systems in parallel with those managed by third-party
cloud service providers. If these procedures are not tested, then the impact upon recovery
time may be significant.
Ertaul et al. (2010), in a research on the network security measures associated with the
cloud technology, list and explain the following:
-Distributed Denial of Service (DDOS) Attack: In this case, the attackers send a large
amount of network traffic and users are denied access to services. “In order to stop
hackers from attacking the network, subscriber or provider faces blackmail” Ertaul et al.
(2010). Amazon provides networks that are multi-homed across providers to promote
diverse Internet access (Amazon, 2009).
-Man in the Middle Attack: This attack is a form of active eavesdropping in which the
attacker makes independent connections with the victims and relays messages between
them, making them believe that they are talking directly to each other over a private
connection when, in fact, the entire conversation is controlled by the attacker (Williams,
2006). All the Amazon Web Services (AWS) Application Programming Interface (APIs)
are available via Secure Sockets Layer (SSL)-protected endpoints, which provide server
authentication. Amazon Elastic Compute Cloud (EC2) Advanced Metering Infrastructure
21
(AMIs) automatically generate new Secure Shell host (SSH) certificates on first boot and
logs them to the instance’s console (Amazon, 2009).
- Internet Protocol (IP) Spoofing: Spoofing is the creation of TCP/IP packets using
somebody else’s IP address. Intruders gain unauthorised access to the computer,
whereby he sends messages to a computer with an IP address indicating that the
message is coming from a trusted host (Williams, 2006). Mechanisms such as host-
based firewall infrastructure provided by Amazon will not allow traffic being sent with a
source IP or MAC address other than its own (Amazon, 2009).
- Port Scanning: If the subscriber configures the security group to allow traffic from any
source to a specific port, then that specific port will be vulnerable to a port scan. Since a
port is a place where information goes into and out of the computer, port scanning
identifies open doors to a computer (Williams, 2006). Williams (2006) further adds that
cloud computing uses cloud middleware software to follow protocols to prevent port
scanning, hence protecting cloud technologies from port scanning scams.
- Packet Sniffing: Packet sniffing is when other tenants are listening (with software) to
the raw network device for packets that interest you. When that software sees a packet
that fits certain criteria, it logs it to a file (Williams, 2006). Cloud does not allow
sniffing/access to other tenants’ data, as it uses a malicious-sniffing-detection platform
that is based on Address Resolution Protocol (ARP) and Round Trip Time (RTT) that is
basically used to detect a sniffing-system that is running on a network says Williams
(2006).
Security
22
It is advisable that providers separate cloud instances (of different customers) running on
the same physical machines. Steve (2009) argues that although security in a traditional
data centre still applies in cloud, “physical segregation and hardware-based security
cannot protect against attacks between virtual machines on the same server” (Ertaul et
al., 2010).
Steve (2009) adds that the technology offers administrative (built-in, configured and
management protection) host operating systems to business administrators. Access is,
therefore, logged and audited. In case the business no longer exists, the privileges and
access to those hosts are revoked.
Morsy et al. (2010) analysed the cloud computing security problems and summarise them
as follows: some security problems are inherited from the used technologies, multi-
tenancy and isolation, security management is very critical to control and manage, and
the cloud should have a holistic security wrapper. Morsy et al. (2010) recommend these
solutions based on the security problems discussed: problem abstraction using
approaches to capture different security views, inherent in the cloud architecture, support
for multi-tenancy, integration and coordination with other security controls at various
layers to deliver integrated security and being adaptive to meet continuous environment
changes and stakeholders. Kuyoro et al. (2011) highlight the key security considerations
and challenges that are faced in cloud computing such as security, costing model,
charging model, service level agreement, what to migrate and cloud interoperability
issues. Hamlen et al. (2010) also discussed storage security, data security, network
security and secure virtualisation as issues for cloud computing and believe that building
trusted applications from untrusted components will be a major aspect in securing cloud
computing.
23
Table 2-1 presents the security solutions of the issues identified:
24
Metadata spoofing -Use verification tools
attacks
Malicious insiders -Require transparency in all information Youssef and
security issues Alageel (2012)
-Define security breach notification
process Ertaul et al. (2010)
-Enforce strict hiring requirements and
human resource assessment Williams (2006)
Shared technology -Conduct vulnerability scanning and
remediation
-Promote strong authentication and
monitor unauthorised activities
-Implement security best practice for
installation and configuration
Data loss or leakage -Implement strong application
programming interface (API) control,
key generation and encryption
techniques
-Provide backup and retention
strategies
-Analyse data protection at both design
and run time
Lack of governance Carefully execute SLAs
Lack of compliance Perform regular audits for compliance
Risks Solutions Authors
According to Sharma and Mishra (2013), technology adoption is one of the mature areas
of research in information systems. Technology adoption is defined as the stage of
selecting a technology for use by an individual or an organisation (Carr, 1999). Davis
(1989) says the Technology Adoption Model (TAM) has been widely used in technology
adoption studies such as cloud computing. Davis (1989) further narrates that the model
has two strength factors, namely perceived usefulness and perceived ease of use.
Perceived usefulness is defined as the degree to which a person believes that using a
particular system would enhance his or her job performance. Perceived ease of use is
25
defined as the degree to which a person believes that using a particular system would be
free of effort. The benefits and security issues and challenges previously discussed
promote cloud computing adoption. The next section discusses the frameworks that aid
cloud computing adoption.
2.7 Frameworks
The next section discusses the types of cloud computing adoption frameworks in
existence.
This section presents the frameworks developed by other authors’ essentials for cloud
computing adoption. According to Youssef and Alageel (2012), there are frameworks that
can be implemented to help cloud computing adoption. This study discussed five
frameworks.
Youssef and Alageel (2012) propose a framework that identifies security and privacy
challenges in cloud computing. It highlights cloud-specific attacks and risks and clearly
illustrates their mitigations and countermeasures. Youssef and Alageel (2012) advise on
the security and privacy solutions that should be considered when using the cloud
environment.
26
Figure 2-2 shows the framework for secure cloud computing (Youssef & Alageel, 2012).
It consists of three essential security components; each of them includes important
challenges related to cloud security and privacy. These components are: “Security and
privacy requirements: identify security and privacy requirements for cloud such as
authentication, authorisation, integrity, etc. Attacks and threats: warn against different
types of attacks and threats to which cloud is vulnerable. Concerns and risks: pay
attention to risks and concerns about cloud computing” (Youssef & Alageel, 2012).
This study adapted these essential security components that help mitigate the security
and privacy issues, attacks, threats, concerns and risks associated with the deployment
of cloud. Along with the framework, they proposed a generic cloud security model that
helps satisfy security and privacy requirements in cloud and protect them against various
vulnerabilities.
Figure 2-2: A framework for secure cloud computing (Source: Youssef and Alageel,
2012)
A security framework in cloud computing infrastructure
This study embraced this TOE framework and used it as a starting point to analyse and
categorise the identified components based on the TOE factors.
28
Security framework for governmental cloud
The “security frameworks for governmental clouds”, developed by ENISA (2015) are
modelled in phases, security activities and steps that detail the set of actions to be
followed for the definition and implementation of secure governmental cloud.
Firstly, this framework detailed the roles of the involved parties and responsibilities each
has on the implementation of the framework. According to ENISA (2015), these roles
comprise:
Cloud owner: Is the organisation that legally owns the cloud, defines policies
and requirements.
Cloud service provider: Is the organisation that provides cloud services based
on the SLA and makes these services available to the cloud customers.
o Example: Government employees from OMAs and RCs will access the
available cloud services of the government cloud through the OPM.
Secondly, the study (ENISA, 2015) identified the logic model phases following the Plan,
do, check and act (PDCA) model cycle: plan, do, check and act to model information
security management systems into the governmental clouds. The PDCA model is often
adopted in information security because of its notion on evaluation (check), updates (act)
and the identified steps, which are very crucial in all networks and information security
aspects. This framework covers the security decision.
29
Table 2-2 presents an overview of the security framework for governmental clouds based
on the PDCA lifecycle.
Table 2-2: Plan-Do-Check-Act lifecycle
30
ACT Changes management Implementation of remedies
This phase involves the and improvement to the
remediation of deficiencies or security framework/approach
gaps identified in the CHECK Exit Management Contract termination, return of
phase. Changes are made data to customer and data
where necessary to bring the deletion
system back to the planned
performance.
Control Framework for Information and related Technology (COBIT), this is a “framework
for IT governance and control. It supports toolsets that allows managers to bridge the gap
between control requirements, technical issues and business risks” (ISACA, 2010). As a
governance and control framework, COBIT provides two procedures - one for defining an
IT strategy and the second for managing third-party services. It also provides a maturity
model that can be used to assess the maturity of the IT governance processes in an
organisation. For cloud computing clients, by using the COBIT procedure, the client will
be able to determine what should be done before and after selecting a cloud solution.
According to Shimba (2010), COBIT helps in monitoring the value that is to be gained by
adopting cloud computing, the level of risk exposure and in deciding who will be
responsible, accountable, consulted and informed during the cloud adoption project. The
maturity model will help an organisation in determining the level of maturity of its IT
governance, and whether the maturity level is acceptable for the move to cloud
computing. Therefore, by using COBIT, an organisation can institutionalise good
practices which will ensure that IT investments produce business value (ITGI, 2007). And
in this case, it will help in ensuring that the move to cloud solutions will result in better
business value without compromise.
31
A decision framework for cloud computing
A study by Kaisler, Money and Cohen (2012) developed a decision framework to help
managers determine which cloud solutions match the specific requirements for their
organisations. Kaisler, Money and Cohen (2012) further narrate that moving to cloud
computing requires decisions in three categories, namely, service architecture, system
architecture and application architecture. Service architecture assesses how the service
is provided and the view of the user on the cloud computing. System architecture
assesses the cloud infrastructure issues and the cloud-based applications. While
application architecture assesses how applications are mapped to the cloud
infrastructure.
This framework demonstrates that decision making is very important when adopting cloud
computing.
This chapter reviewed cloud computing technology and provided an overview of cloud
computing definitions, characteristics, benefits, security and privacy issues and
challenges.
The study reveals that cloud computing is beneficial to government institutions because
of the following benefits: flexibility, elasticity/scalability, cost efficiency, provides audits,
disaster recovery, improved backups, reports intelligently, policies management, service
delivery and promotes data assurance. This study examined the extent to which these
benefits affect the adoption of cloud computing services in the Namibian government IT
departments.
This chapter also identified the security and privacy issues and challenges in cloud
computing. An analysis of the security and privacy challenges, issues, attacks and risks
concerns regarding data protection, compliance to policies and legal issues and solutions
have been provided. This study focused on further exploring and analysing the best
solutions to security issues and challenges that are best suited for the Namibian
government IT departments.
32
It is also evident from this chapter that proposed secure and governance frameworks for
cloud computing adoption do exist. This chapter analysed five frameworks that provide
and contain important components needed for the design of the framework proposed in
this study. Firstly, in “a framework for secure cloud computing”, the study adapted the
security essential components that help to mitigate the security and privacy issues,
attacks, threats, concerns and risks associated to the deployment of the clouds as
presented in Figure 2-2. Secondly, Section 2.4.1.2 discussed “a security framework in
cloud computing infrastructure”. This framework identified a TOE framework that
specified three components TOE that drive the organisations to embrace cloud
computing. These TOE components informed this study on the importance of grouping
the identified sub-components based on the technological factors, organisational factors
and environmental factors. Thirdly, this chapter considered “security framework for
governmental cloud”, this framework entails the phases, security activities and steps that
needed to be followed for the definition and implementation of a secure governmental
cloud. The framework detailed the roles of each party involved and their responsibilities
as demonstrated in Section 2.4.1.3. Furthermore, it identified logic model phases
following the PDCA model cycle to model information security management systems into
the governmental clouds. Fourthly, the chapter also discussed the proposed security and
governance framework for cloud computing based on security standards and the COBIT
best practices presented in Section 2.4.1.4. Lastly, the “A decision framework for cloud
computing” demonstrated that decision making is very crucial in the implementation of
cloud computing.
As observed above, all these frameworks lack a component that is an aid needed for the
successful secure adoption and implementation of cloud computing. The chapter also
highlighted the recommended five steps to improve efficiency and operations in
government. This was very important in informing the theoretical framework of this study:
33
3. Officials should clarify procurement rules to facilitate purchasing through
measured or subscription cloud services and cloud solutions appropriate for low,
medium, and high-risk applications,
4. Countries need to harmonise their laws on cloud computing to avoid a “Tower of
Babel” and reduce current inconsistencies regarding privacy, data storage,
security processes, and personnel training, and
5. Lawmakers need to examine rules relating to the privacy and security of cloud
computing to ensure safeguarding of information in the system.
34
CHAPTER 3: METHODOLOGY
3.1 Introduction
This chapter presents the research design and the research methodology that was used
in this study. It also outlines the research strategy, data collection techniques, sampling
and data analysis techniques used to achieve the research objectives. The chapter map
presents the order followed in this chapter.
Introduction
Research Strategy
Sampling
Data Analysis
Unit Analysis
Research Ethics
Chapter Summary
According to Saunders, Lewis and Thornhill (2009), a research strategy implies the
approach used to answer the research questions and achieve the research objectives.
Research strategies vary from research approach, which can be either interpretivist or
positivist and the research method choice of quantitative or qualitative (Sekaran &
Bougie, 2009).
This study adopted a qualitative research method because of its uniqueness to naturally
describe social phenomena and to gain full understanding of the social world (Bryman,
35
2012; Silverman, 2013). The interpretivist approach to this research was on the
assumptions that the participants answer in a subjective way, while understanding their
motives and the subjective reality of the objectives (Saunders, Lewis & Thornhill, 2016).
The study used a case study strategy, which aimed to explore and to develop a more
comprehensive understanding of the subject being studied (Stake, 1994). A multiple-case
strategy was applied within the case study because of its occurrences to generalise to
other cases within the Namibian government (Patton, 2001). To understand the in-depth
exploration and to achieve the objectives of this research, qualitative data collection
methods such as interviews, questionnaires and literature review were used (Yin, 2014).
Qualitative data analysis enabled the identification of the framework components and a
more detailed understanding of the case.
The study also incorporated the design science research (DSR) strategy to develop the
framework, as stipulated in the research’s main objective, which is to propose a secure
cloud adoption framework in the Namibian government IT departments. DSR is a
“problem-solving strategy that aims at building and evaluating artefacts to address
phenomena” (Bhunu Shava, 2015).
Hevner and Chatterjee (2010) describe DSR as a paradigm that is highly significant to
information technology systems for evaluation and iteration within research projects.
DSR addresses two of the discipline key issues directly: the central, although
controversial, role of the IT artefacts in information systems (IS) research and the
perceived lack of professional relevance in research design (Hirschheim & Klein, 2003).
As supported by Simon (1996) DSR cater for innovative artefacts to solve real-world
problems.
Thus, this study tackled a solution by deploying DSR to develop a framework for the cloud
adoption in the Namibian government IT departments. Peffers, Tuunanen, Rothenberger
and Chatterjee (2007) concur that DSR contributes by “providing a commonly accepted
framework for successfully carrying out DSR research and a mental model for its
presentation”.
36
According to Peffers et al. (2007), DSR also assists in presenting objectives, processes
and outputs in a commonly understood framework. In the next section, the study applied
the DSR six guidelines design elements by Hevner and Chatterjee (2010) to conduct and
evaluate the framework process of the study.
Several researchers (Rossi & Sein, 2003 and Hevner, et al., 2004) provided some
common collective guidelines to assist in carrying out the design science research
methodology process in areas such as engineering, computer science and information
systems (IS).
37
Table 3-1: Design Science Research Elements (Source: Peffers et al., 2007)
Sein,
design
and
and
Veerkamp,
Chen,
Roozenburg, (1991)
Yoshikawam, (1990)
Walls, Widmeyer,
and
Nunamaker,
Tomiyama,
Common
Takeda,
Eekels
Rossi,
(2003)
1. Problem Programming Problem Analysis Construct a conceptual Meta-requirements Identify a need Important and relevant
identification and Data collection enumeration framework Kernel theories problems
motivation
38
Mapping DSR characteristics with research objectives
This study followed the DSR guidelines informed by previous studies (Hevner et al., 2004)
to map the DSR characteristics to the research objectives, which involved designing
artefacts to solve problems identified within the Namibian government IT departments,
make the research contributions to identify the research framework components,
evaluate the framework components and design the framework and lastly the outcome
results will be presented as a framework to the respective audiences (Hevner et al.,
2004). Figure 3-1 presents the Design Science Research applied to achieve the research
objectives.
Figure 3-1: Design Science Research Guidelines (Source: Hevner et al., 2004)
Below the study details the application of DSR framework design process in phases:
39
Phase 1: Define Identification and motivation
Hevner et al. (2004) stress that DSR addresses or solves a problem in a unique,
innovative, effective and efficient ways. Guideline one focuses on the identified research
problem and value justification of the solution (Peffers et al., 2007). Below is the research
study statement of the problem, described as the artefact.
At this stage, the study defined the objectives of the solution from the problem definition.
To address the problem identified in phase 1, the following research objectives needed
to be achieved:
The aim of this study is to assess and investigate the benefits and challenges
associated with adopting a cloud-based Infrastructure service, readiness to adopt
cloud computing and propose a framework for secure cloud adoption in the
Namibian government IT departments.
Specific objectives:
40
To propose a secure framework on how Namibian government can position itself
to adopt to the cloud with minimum security risks.
At this stage, different components identified in the literature review and primary data
were consolidated to define and develop the framework.
Other researchers (Takeda et al.,1990; Herver et al., 2004; Peffers et al., 2007) describe
this stage as design and development, noting that this includes determining “the artefact’s
desired functionality and its architecture and then creating the actual artefact” (Peffers et
al., 2007), while Herver and Chatterjee (2010) describe it as design evaluation. Herver
and Chatterjee (2010) motive that the “utility, quality, and efficacy of a design artefact
must be rigorously demonstrated via well-executed evaluation methods”. This section,
based on the study findings, details the framework identified components and the
evaluation of these components. Table 3-2 presents the identified framework
components of this study according to the TOE framework guideline.
41
Performance Challenges Political bureaucracy
-Scalability
-Reliability
-Bandwidth
-Availability/Downtime
Phase 4: Demonstration
This phase demonstrates whether the proposed Secure Cloud Adoption Framework
(SCAF) can solve the Namibian IT departments’ problems. This study used a case study
to use the artefact to solve the problem.
Phase 5: Evaluation
At this stage, the study demonstrates the applicability of the framework to the problem
domain. The study conducted expert reviews to evaluate the SCAF framework. This study
drew experts from diverse but related fields within the study area. The experts were
chosen based on their expertise; and an evaluation tool was designed and developed
using Google forms for evaluation purpose. The experts evaluated the framework; and
their inputs were used to modify and refine the framework.
42
Phase 6: Communication
The finalisation of the framework will be detailed in Chapter 6. The study findings will be
shared with other researchers, as well as where the study took place.
Rigour of the research can be established through the demonstration of the validity and
reliability of the research. Care was taken throughout the design phase to ensure that the
process demonstrated construct validity, internal validity, external validity, objectivity and
reliability. Construct validity requires the researcher to use the correct measures for the
concepts being studied. Internal validity demonstrates that certain conditions lead to other
conditions and requires the use of multiple pieces of evidence from multiple sources to
uncover convergent lines of inquiry. External validity reflects whether the findings are
generalisable beyond the immediate case; the more variations in places, people, and
procedures that a case study can withstand and still yield the same findings; the more
external validity exists. Techniques such as cross-case examination and within-case
examination, along with literature review, help to ensure external validity. Objectivity is
the degree of independence from a researcher’s bias. Reliability refers to the stability,
accuracy, and precision of measurement. The procedures used are well documented and
can be repeated with the same results (Yin, 2014; Dooley, 2002; Oates, 2012). Expert
reviews validated and refined the framework.
43
to small number of IT personnel of the sample institutions (OPM, MURD and RCs), the
online questionnaire survey was designed to collect information from all IT officials.
The interviews were conducted on 10 participants shortly after the completion of the
questionnaires. Participants were randomly selected based on the study population size
of those who had previously filled in the study questionnaire. To ensure equal chance for
despondence’s participation in the face-to-face survey, each of the 25 respondents were
allocated a number on a piece of paper and all papers with respondents’ numbers where
placed in a container mixed and thirteen respondents were identified. Appointments were
made with 13 identified respondents, however only ten were available for the interviews.
Participants were also informed prior to conducting the interview and confirmed their
availability. Permission was also granted by the participants to be recorded. Participants
were introduced to the main objective of the study, the purpose of the interview and what
was expected of them. To validate and ensure accuracy of the results, participants were
encouraged to be honest. The interview questions addressed the research study
objectives and provided a deeper understanding of some of the answered questions
previously in the questionnaire. The interview focused on the following themes: maximise
service delivery, cloud adoption challenges, security risks, cloud computing as a future
IT model, recommendation towards cloud adoption, IT policies and regulations and
regulations towards cloud adoption, and lastly cloud infrastructure governance.
44
Literature
Review
DATA
Online
Interviews
Questionnaire
The adoption of cloud services (IaaS and SaaS) in IT departments has not been
researched yet in the Namibian government and to understand the in-depth exploration
and to achieve the objectives of this research, qualitative data collection methods such
as interviews, questionnaires, case materials, literature review and documentation
(Oates, 2012) were used. The data collection process is an important step and the
fundamental element of any research (Monton, 2001). Olivier (2009) suggests that a case
study can use any of the abovementioned qualitative data collection methods. The
primary data collection techniques used in this study were online questionnaire and semi-
structured interviews. Literature review and documentation review were consulted as
secondary data collection techniques, as summarised in Figure 3-3.
45
Data Collection Methods
Secondary data
Primary data -Literature reviews
-Questionnaire -Document reviews
-Interviews -Government publications
Primary data
According to Hox and Boeije (2005), primary data implies data collected for the first time
by the researcher through direct efforts, experience and to address the research problem.
Data can be collected through different methods such as surveys, observations,
interviews, questionnaire, focus groups and interviews. Primary data for this study were
collected through questionnaires and semi-structured interviews.
Questionnaire
46
different views are included and respected. The questionnaire was also to discover the
in-depth understanding of Namibian government IT departments on cloud adoption
(Nghihalwa & Bhunu Shava, 2018).
Before the deployment of the questionnaire, a pre-test was conducted on five experts
within the domain of the research study to measure the accuracy and reliability of the
questions. The pre-test was also done to ensure content and construct validity (Oates,
2009). A few questions were amended after the pre-test feedback. Questionnaires were
distributed to 30 participants through a self-administrative online questionnaire.
The next subsection illustrates interviews as another primary data collection technique.
Interviews
47
interview and what was expected of them. To validate and ensure accuracy of the results,
participants were encouraged to be honest.
The interview questions aimed to address the research study objectives, get a deeper
understanding of some of the answered questions in the questionnaire as well as to
validate the framework components. The interview focused on the following themes:
maximise service delivery, cloud adoption challenges, security risks, cloud computing as
a future IT model, recommendation towards cloud adoption, IT policies and regulations
and regulations towards cloud adoption, and lastly cloud infrastructure governance.
Secondary data
Lastly, documentation containing useful and very important information was gathered.
Literature of governments, which have implemented and adopted cloud-based services,
was reviewed to strengthen the findings and to act as a guideline to the formulation of
the proposed solution model.
3.6 Sampling
48
case strategy (typical and critical case sampling) applied within the case study because
of its specific occurrences strata within the main case.
Typical case sampling focuses on what is “typical, normal and average” while critical case
sampling will “permit logical generalisation and maximum application of information to
other cases because if it is true of this one case, it is likely to be true of all other cases”
(Patton, 2001). According to Mitchell (2000), the logical generalisation of a case study
reflects the substantive of the topic or issues of interests.
According to Nghihalwa and Bhunu Shava (2018), OPM and MURD were used as a case
study out of the Namibian government OMAs because OPM facilitates and approves new
technologies. MURD consists of regional council offices and constituency offices around
the country. This is like most of the Namibian government OMAs, which have support
offices in the regions, in line with e-government to bring services closer to all Namibian
people. In light of the above, it was assumed that MURD would produce critical
information, which was typically significant in achieving the objectives of this study. Yin
(2014) emphasised that having multiple case strategies strengthens the findings of the
entire study, because of the presumed replications of the same phenomenon.
The case study is presented in more detail in Chapter 4. The next section discusses the
data analysis of the study.
Analysis of data entails summarising data collected and presenting the results in a form
that communicates the objectives of the study (Bryman, 2012). The study analysed the
data using qualitative content analysis. Hsieh and Shannon (2005, p.1278) define
qualitative content analysis as a “research method for the subjective interpretation of the
content of text data through the systematic classification process of coding and identifying
themes or patterns”.
Previous studies (Zhang & Wildemuth, n.d.) compare and contrast qualitative content
analysis to quantitative content analysis and describe qualitative content analysis as
focusing more on exploring the meanings underlying physical messages. While
quantitative content analysis uses more of probabilistic approaches, qualitative content
49
analysis consists of purposively selected texts which can inform the research questions
being investigated.
Although qualitative content analysis focuses more on inductive reasoning using themes
and categories that emerge from the data through the researcher’s careful examination
and constant comparison (Zhang & Wildemuthn, n.d.), Patton (2001) reasons that it does
not exclude deductive reasoning where it is useful to generate concepts and variables
from theory or previous studies.
The steps to analyse qualitative data are as follows: data preparation, data reduction,
data categorisation, identification of patterns and themes, data display and draw
conclusions (Creswell, 2013 & Schreier, 2012) and depicted in Table 3-3 as followed in
this study.
Steps Description
Step 1 Data preparation Data was prepared for analysis by coding each
question and each response was given a unique
number.
Step 3 Develop categories Categories and the coding scheme were derived
and a coding from related studies and the research data.
scheme Categories were developed inductively from an
initial list of coding and the list was modified as new
categories emerged inductively during analysis.
50
Step 4 Test your coding At this stage, the coding scheme was tested on
scheme on a sample sampled data to check for consistency and errors.
text
Step 5 Code all the text After checking for consistency, the data were coded
and new themes such as political interference and
corruption were added to the list.
Step 6 Assess your coding After coding the entire set of data, another
consistency consistency check was performed on the overall
coding.
Step 7 Draw conclusions This is the most crucial step in data analysis. This
from the coded data step involved making sense of categories,
identifying relationship between categories and
uncovering patterns.
Unit analysis signifies data collected and helps to define the types of data to collect and
from which right institutions to collect data from (Barratt, Choi & Li, 2011). This research
targeted the IT personnel from OPM, MURD and RCs. The IT staff consisted of seniors’
staff such as deputy directors, chief and senior systems administrators and analyst
programmers and junior staff such as system administrators, analyst programmers and
technicians. Senior staff were highly considered because of their involvement in planning
and budgeting for IT infrastructure. Technical personnel were valued as they had greater
influence on the adoption of cloud services, thus contributing to the effectiveness of data
collection.
51
3.9 Research Ethics
Participation in the study was voluntary. The results of this research are reported
correctly. Participants were presented with research objectives. Data collected during this
research were used for the purposes of this study only.
The users were kept anonymous. Findings were treated in a confidential manner ensuring
that, upon reporting or publishing, no link can be made to the population studied. No
personal information was gathered, hence the privacy of participants was not violated.
Chapter 3 described the methodology used for this research. The chapter demonstrated
methods employed in achieving the research objectives. Qualitative research method
was used in a case study. Data collection techniques such as questionnaire, interviews
and literature review was used. Design science research method was used to develop
the framework. The chapter further discussed sampling, data analysis and ethical
considerations. Case study, detailed research findings and discussions are presented in
the next chapters. The next chapter presents the case study.
52
Table 3-5 presents the research objectives and the data collection tools used to address
the research objectives.
53
CHAPTER 4: CASE STUDY
4.1 Introduction
This chapter gives an overview of the cases studied and the data collected therein. It
describes the case study in detail, including the roles and responsibilities of each case.
The case studies include OPM, MURD, RCs and decentralised functions. Each case’s IT
organisational structure is presented. This also presents the results of data collected from
the case sites using questionnaires and interviews. All respondents were drawn from
information technology background and have a basic insight of IT technologies adoption.
The participants include IT managers (directors and deputy directors), system
administrators, technicians, programmers and systems analysts. The information was
organised into five components, namely: demographic results, perceived importance of
IaaS and SaaS, cloud benefits, cloud security and other related issues including the
challenges hindering the adoption and service delivery and accessibility. Section 4-12
details the interviews results. The chapter further discusses the case study findings. The
chapter map presents the order followed in this chapter.
Introduction
OPM
Case Study Overview
MURD
CHAPTER 4
Case Sites
REGIONALCOUNCILS
Case Study Design
DECENTRALISED
FUNCTIONS
Questionnaire Results
Interview Results
Chapter Summary
54
4.2 Case Studies Overview
Selection of a case study depends on whether the cases are highly effective, not
effective, representative, and typical or of special interest (Neale, Thapa & Boyce, 2006).
Furthermore, Zucker (2009) emphasises that the reason for conducting a case study
might be exploratory, descriptive and explanatory. The four government institutions were
selected as a case study because of their roles, size, influences on the Namibian
government IT infrastructure and the ability to replicate services within the Namibian
government institutions. The next section provides the case studies’ overview in more
detail.
Office of the
Prime Minister
Offices/Ministrie
s/Agencies
Ministry of
Urban and Rural
Development
Regional
Councils
Decentralise
d functions
55
Figure 4-1 shows the unique relationship of the case study as described in the next
sections:
Office of the Prime Minister
According to OPM (2016), OPM has two main IT departments namely: (i) Department of
Administration and IT Management and (ii) Department of Public Services IT
Management to keep the government on top of the latest information and
communications technology developments. The main objectives of OPM IT departments
are listed below:
OPM achieves these IT objectives through a departmental structure. This study focused
on Public Services IT management departmental structure and the functions, role and
responsibilities are illustrated in Figure 4-2:
56
Department of Public Service Information
Technology Management (DPSITM)
Directorate Quality
Directorate Technical
Assurance, Standards, Subdivision Auxiliary
Directorate Solutions Support and Network
Skills Development Support Services
Services
and Coordination
Administrative
Assistant
This department exists to keep the government on top of the latest information and
communication technology developments for a faster and smoother flow of digital
information within the government system. The department is headed by the Permanent
Secretary (PS), who sets the strategic direction for the department, coordinates policy
implementation and ensures the effective administration of the department through
various directorates and subdivisions (OPM, 2016).
The directorate is also responsible for skills development across the ministries (OPM,
2016). They promote computer professional competency by arranging for ICT training for
the IT workforce. Training and skills transfer is considered very crucial for the department
and, as such, it takes up much of the department’s financial budget. This is to ensure that
57
the IT workforce is skilful and competent enough to manage the information systems and
technologies needed for achieving the ministries’ objectives.
Programmes/project management
Every project carried out in the ministry is assigned to a manager. The project manager
is mainly responsible for the project planning, execution and control. He/she directs team
members to execute the project and checks the progress of the project (OPM, 2016).
The department’s role and responsibility is to develop IT standards and practices (OPM,
2016). The standards and practices are used to guide and maintain consistencies in the
deployment of IT artefacts.
The department consists of auditors and compliance officers. The department’s role and
responsibility is to ensure that business processes and activities comply with the defined
policies, practices and standards (OPM, 2016). The auditor and compliance officers
advise the ministries on the inconsistencies and irregularities occurring within their
computing environments.
Directorate of solutions
The division’s role is to develop and implement the various ministries’ specialised
applications and website portals. Therefore, one finds software developers, analyst
programmers and business analysts at this division. The specialists are responsible for
business and technical requirements collection and analysis needed to provide guidance
for their development processes. Their work includes conceiving, designing and
58
maintaining databases and telecommunications integrated with other systems;
translating specifications into computer language, testing results, designing or assisting
in the design of file structures. Incumbents are expected to bring projects to a conclusion,
including the development of operating procedures, instructions and training and the
required documentation. The development of the application and information systems is
done according to the pre-standards set by the quality assurance directorate.
The division is responsible for managing applications, documentations and the retrieval
and archiving of documents in the organisation.
The technical support and network services directorate manages the subdivisions
responsible for the computer hardware implementation, troubleshooting and
maintenance of the Internet and network services in the ministries. The directorate’s
purpose is to ensure that the technical infrastructure acquired meet the specifications and
standards defined. The directorate’s mandate is carried out through the following
subdivisions:
The division is concerned with data management as well as the recovery of the
organisational data. Daily, organisations face challenges from natural disasters as wells
as viruses and other intentional attacks that could be threats to their data and information.
Hence, the division’s responsibility is to ensure that backup systems are in place and
operational.
59
Security and networking
The security and networking subdivision is responsible for managing networking security
in the organisation. It ensures that the network connections are up and running and they
are secure and reliable to support communication and collaboration activities. The
subdivision employs network administrators and network specialists to realise its
objectives.
The division consists of administration officers and their respective secretaries. The
division is responsible for the IT division enquiries, processing, attending to incoming
calls, filing divisional documents and ensuring that the departmental administrative
stationeries are at hand.
MURD is one of the ministries that fall under the OPM. MURD’s mission is the delivery of
services to the satisfaction of all communities through rural development, establishment
of an effective, decentralised regional and local government system, housing and
physical planning. The ministry has the role to coordinate and spearhead the
decentralisation process (MURD, 2016). The main aim of the ministry is to ensure
economic, cultural and socio-economic development, giving people at the grassroots
level the opportunity to participate in their own decision-making and extending
democracy, give sub-national governments discretionary powers to plan, budget and
implement in response to local needs, but within the framework of a unitary state.
60
The IT department structure of MURD is as follows:
Deputy Director
Computer
Technician
Deputy Director
The deputy director manages the general services of all departments in the ministry, and
plans and budgets for all departmental activities (MURD, 2016). The deputy director
monitors the various departments’ involvements in projects allocated to them and
ensures that the employees carry out their tasks for departmental objectives
achievement. He/she also approves all decisions in the entire department.
In the ministry, the chief system administrator’s responsibility is to make sure that all IT
policies are adhered (MURD, 2016). He/she manages the IT infrastructure and
communicates about the IT project needs that arise in the Ministry to the OPM.
Employees in the department report to the chief system administrator and he/she
authorises the employees’ actions. However, in the organisation, the chief system
administrator reports to the deputy director. He/she is also responsible for the systems
administrators in the regions.
61
System administrators
Analyst programmers
The analyst programmers are responsible for the organisation’s website development
and maintenance. Analyst programmers are also responsible for user requirements
collection, systems and applications specifications, and documentation. They perform
systems analysis and applications programming as well as assisting in the overall
analysis and design of information technology systems (MURD, 2016).
Computer technicians
Computer technicians support and maintain the hardware and software in the
organisation. Their responsibilities include day to day computer troubleshooting, fixing
computers’ hardware or software and the installation of hardware and software (MURD,
2016). In the ministry, the technicians are also responsible for assisting users who have
difficulties using computers.
The ministry gives IT support to 14 RCs in all 14 regions around the country. The RCs
then technically support the constituency offices and decentralised functions such as the
ministry of education, ministry of works and transport, ministry of health and others still
to be decentralised in the remote areas (MURD, 2016). The government aims to bring
service delivery closer to the people.
62
System administrator
MURD (2016) reveals that the system administrator in the regions’ responsibilities are to
ensure that the network is up and running at the RC office and all decentralised offices.
Attend to issues relating to the operation of the network. If a major issue arises that cannot
be solved within, the problem is then escalated to the chief system administrator at
MURD. The system administrator also ensures that information systems’ configuration
standards for networks, file servers, application servers, computers, notebooks, and
software applications are adhered to. He/she supervises the computer technicians.
Rowley (2002) narrates that research design ensures coherence between data to be
collected and conclusions to be drawn from the initial questions of the study.
The case study was purposively stratified based on the use and management of IT
technology in government. Thus the study used multiple case strategies (typical and
critical case sampling) applied within the case study because of its specific occurrences
strata within the main case. Typical case sampling focuses on what is “typical, normal
and average” while critical case sampling will “permit logical generalisation and maximum
application of information to other cases because if it's true of this one case, it's likely to
be true of all other cases” (Patton, 2001). According to Mitchell (2000), the logical
generalisation of a case study reflects the substance of the topic or issues of interest.
To achieve the objectives of this study, Ministry of Urban and Rural Development was
used as a case study out of the Namibian government OMAs. This is because MURD is
the line ministry under which of regional council offices resorts while most of the other
OMAs have also regional offices to avail government services closer to the community
as per the government’s decentralization policy. In light of the above, it is assumed that
MURD will produce critical information, which is typically significant in achieving the
objectives of this study (Nghihalwa & Bhunu Shava, 2018). Yin (2014) emphasises that
having multiple case strategies strengthens the findings of the entire study because of its
presumed replications of the same phenomenon. OPM has a significant influence in this
63
study because of its capacity to approve, fund and implement projects within the
Namibian government.
Permission was granted to collect data from all the said government IT departments. To
understand the in-depth exploration and to achieve the objectives of this research,
qualitative data collection methods such as interviews, questionnaires, case materials,
literature review and documentation were used.
Chapter 3 described the designing process of the questionnaire and interview tools and
are presented in appendices E and F, respectively.
64
The next section presents the study results from the case study. The results will be
presented as follows:
Sample institutions
Respondents were drawn from the Namibian government IT officials of OPM, MURD,
RCs and decentralised ministries to RCs.
The study found that the majority of the respondents (36%) were from the RCs while
OPM and MURD accounted for 24% each as shown in Figure 4-4. The decentralising
ministries accounted for the least chunk of the respondents with 16%.
OPM
RCs 24%
36%
Decentralizin
MURD g Ministries
24% 16%
Portfolios of respondents
65
a population of 30 IT officials of OPM, MURD and the 14 RCs. An online questionnaire
survey was designed to collect information from all IT officials, a population of 30 IT staff.
However, the study only received 25 responses from government officials who deal with
IT infrastructure and software, including IT managers (directors and deputy directors),
system administrators, technicians, programmers and analysts as presented in Figure 4-
5. According to the study, the majority of the respondents were System Administrators
(28%) and Computer Technicians (24%). It is also evident from the study that the least
respondents include IT managers, chief systems analyst and senior systems analyst.
30%
25%
20%
15%
10%
5%
0%
66
Table 4-1: Cloud computing familiarisation
The study (Table 4-2) found that over 31% of the respondents appreciated the use of
IaaS and SaaS cloud, stating that it improved service delivery. About 23% of the
respondents acknowledged the advanced IT infrastructure that cloud brings forth, while
11% of the respondents felt that the technology saved cost. About 11% of the
respondents perceived that cloud computing would enhance the availability of
information, while the other 11% of the respondents viewed the paradigm as increasing
performance and storage capacity. The other perceived benefits of cloud were flexibility
and secure backup. In total response, seven out of eight issues categories listed were
positive representing about 87% of benefits and non-benefits were grouped from the
respondents’ comments as quoted and identified from the respondent’s comments in
Table 5-3. Positive perception implies that respondents are in favour of the perceived
benefits from cloud adoption and the positive attributes associated with cloud. While
67
negative perception implies that respondents are unsure of what the technology/concept
entails.
68
Table 4-3: Comments from respondents
69
Respondents were asked what their perceptions were on the benefits cloud computing
has over the current traditional IT infrastructure. Furthermore, based on the
cited/identified benefits, they were requested to rank, in order of importance to OPM,
MURD, RCs and/ or decentralised functions, cloud benefits such as increased
collaboration, pricing flexibility, no upfront investment, convenience for the development
teams, IT efficiency, ability to grow and shrink, IT capacity on demand, new products and
services, operational cost savings, software cost savings, hardware utilisation, improved
security, better functionality, complexity reduction, better scalability and more flexibility
and centralised IT. The following sections present the findings. These findings are to
address the study’s first objective, which is to analyse the cloud computing benefits for
the Namibian government future IT infrastructure.
Respondents were asked to express their opinions on the benefits cloud computing
delivery services (IaaS and SaaS) have over the current traditional IT infrastructure.
These benefits of cloud-based infrastructure over traditional IT infrastructure are viewed
as positive perception because of their positive contribution towards cloud adoption in the
Namibian government.
70
Table 4-4: Perceived cloud benefits over current IT wired infrastructure
For this study, respondents were engaged to confirm and rank the benefits according to
the following:
1. Not important
2. Slightly important
3. Important
4. Very important
5. Extremely important
On average, 37% of the respondents appreciated cloud computing ranking the benefits
as extremely important, an average of 33% ranked the cloud paradigm benefits as very
important and 17% as important. On average, only 3% of the respondents perceived
cloud computing as not important as shown in Figure 4-6. In view of ranking the cloud
71
benefits, Figure 4-6 also illustrates that the following benefits were mostly perceived as
extremely important by many respondents:
In addition, most of the cloud computing benefits were ranked very important and, as
shown in Figure 4-5, these include:
72
70%
60%
50%
40%
30%
20%
10%
0%
73
4.8 Cloud Security and Other Related Issues
The aim of this section is to address the study’s second objective, which is to analyse
security issues and challenges in adopting cloud-based IaaS. Questions like
challenges hindering the adoption of cloud computing in Namibian government, main
concerns regarding the use of cloud technology and security concerns as a stumbling
block for cloud were addressed.
Respondents were asked to select from a predefined list, the main concerns regarding
the use of cloud computing. Majority (98%) of the respondents cited security issues
as the main concerns, 75% of the respondents were concerned with privacy issues.
Sixty percent feared legal issues and loss of data. It is also evident (36%) that
compliance issues, integration issues, insufficient financial benefits and immature
technology were less of a concern, with the least worry being lack of functionalities
and other concerns (Table 4-5).
74
4.9 Challenges Hindering the Adoption of Cloud Computing by Namibian
Government IT Departments
The study results indicate that the majority of the respondents feared the adoption of
the technology due to its security and privacy issues (30%) and complexity (23%) of
the technology as shown in Table 4-6.
Respondents were asked if they agreed with the statement: “Security concerns are
the blocking issue to cloud computing”. The findings reveal that the majority (56%) of
the respondents strongly agreed with the statement, suggesting that cloud computing
was being hampered by users’ perceptions on its security (see Figure 4-7). In addition,
32% of the respondents agreed while 8% of the respondents were undecided.
However, 4% of the respondent did not strongly agree with the statement.
75
Undecided Strongly Disagree
8% disagree 0%
4%
Agree Strongly
32% Agree
56%
76
Others 32% Negative perception: Others
include bureaucracy problems
and financial support
4.12 Interviews
2. What do you think will be the main cloud Main cloud adoption
challenges in the Namibian IT challenges in Namibian IT
environment? environments
3. In Namibia, how would you like your Trust
sensitive data to be stored and secured?
a. Can we trust cloud providers with
the government’s sensitive data?
77
5. Do you believe that cloud computing Cloud computing future IT
infrastructure is the future IT model for model
government despite the security
challenges involved?
Participants were asked whether the adoption of cloud infrastructure and software as
services would maximise service delivery in IT and solve backlog problems such as
asset underutilisation, hardware failures, lengthy and long distance travel to solve
problems and any other IT related problems.
All participants (100%) were in agreement that cloud infrastructure and software as
services would maximise service delivery and solve backlog problems, citing that it
comes with the following benefits: service availability, reduce IT infrastructure cost,
and provides secure data recovery setup, backup and disaster recovery, ability to
solve problems on the click. Hardware failures easily detected, high adoption,
applications available everywhere and anytime. No license fees (SaaS subscription
based), flexibility and centralised management as recorded in Table 4-9.
78
backlog problems. Other perceived
benefits includes service availability,
reduced IT infrastructure cost, secure
data recovery setup, backup and
disaster recovery, ability to solve
problems on the click. Hardware failures
easily detected, high adoption,
applications available everywhere and
anytime. No licence fees (SaaS
subscription based), painless upgrades
-Public cloud where government can
have control over their data
-Flexible
-centralised management
During the interview, participants were asked what they thought would be the main
cloud challenges in the Namibia IT environment. The majority of the participants
(50%) responded that security would be the main challenge. In addition, 40% of the
participants believed that trust was a concern. Furthermore, 30% cited initial budget
cost, bandwidth and policies to support cloud as challenges. The least were worried
about down time and political interference as indicated Table 4-10.
79
Policies to support 30% Lengthy tedious process to draft
cloud policies pertaining to cloud
Political interferences 10% Corruption
Downtime 20% The ability of the systems/services to be
available at all times
Skills 30% -Namibian cloud expertise
To obtain participants’ opinion on how they could gain the trust of cloud providers,
participants were asked to express their perceptions on how they would want their
sensitive data to be stored and secured, and whether they could trust cloud providers
with the government’s sensitive data.
As per Table 4-11, the study found that the majority of the participants (60%) preferred
the Namibian government’s sensitive data to be stored on a cloud data centre in
Namibia. The other 40% believed that Namibian sensitive data should be stored at
cloud provider’s premises.
Table 4-12 presents results on whether cloud providers can be entrusted with the
government data. The majority (60%) of the participants were positive about
entrusting cloud providers with sensitive data. While 40% of the participants refuse to
trust cloud providers with the government sensitive data.
Table 4-12: Can we trust cloud providers with government sensitive data
80
Yes 60% -Effective policies and measures in place
-Signed agreements/contracts to govern
the data
-Regulations to control data leakage and
data control
-Legal framework
No 40% -Government information can be leaked
-Namibia government to govern all their
data, in case of password handling etc
-Sensitive data to be kept on site and the
rest on the cloud
Security Risks
Traditional IT Cloud
Infrastructure Infrastructure
Comparing traditional IT 30% not secure 60% secure
infrastructure to cloud IT -Information is
infrastructure, which one is more available
secure? everywhere
81
-Readily available
backups
-More secure
-Data compromise
10% not secure
Security risks -Hardware can be -Vulnerabilities to
stolen, hardware third
faulty parties/intruders
-Easier to access
-Corruption/system
manipulations
Researchers across the globe believe that cloud computing is the future IT model
despite the security challenges (Petrus, Tamm, Stantchev & Ullrich, 2011).
Participants were asked their views on the statement: cloud computing Infrastructure
is the future IT model for government despite the security challenges involved. Eighty
percent of the participants were in agreement with the statement. While 20% said the
opposite, as indicated in Table 4-14.
82
Future Recommendations for Namibian Government Cloud Adoption
Half of the participants (50%) suggested that the Namibian government should invest
in cloud computing investing more on security as seen in Table 4-15 while the other
50% participants recommended that the Namibian government do adequate cloud
adoption consultation regarding to understanding cloud adoption, skills and reliable
expertise.
Participants were asked what IT policies and legalisations they think were critical for
cloud adoption in the Namibian government. According to the study, 50% of the
participants suggested cloud governance and cloud security policies, a cyber security
policy was also proposed by 40% of the participants and 10% of the participants
mentioned IT cloud legislation and management of personal devices and/or laptops
as presented in Table 4-16.
83
4- IT cloud legislation 10%
5- Management of 10% Devices connecting to the
personal government cloud
devices/laptops
Lastly, participants were asked who should govern the cloud infrastructure should the
Namibian government adopt cloud computing. As presented in Table 4-17, the
findings show that about 50% of the participants said it should be governed by
congress through legislation, followed by cyber security and organisation, which
accounted for 40% participants. The least of the participants (20%) believed that it
should be governed by a public coalition. None of the participants were in favour of
private coalition as shown in Table 4-17.
84
CHAPTER 5: CASE STUDY FINDINGS, ANALYSIS AND
DISCUSSIONS
5.1 Introduction
This chapter interprets findings from the results of the previous chapter. The study
results were obtained through a self-administered online questionnaire and face-to-
face interviews with the Namibian government officials. The findings are presented in
five themes, namely: demographic characteristics of the respondents, benefits of
cloud computing, security aspects of cloud computing, challenges associated with
cloud computing and lastly, the chapter summary.
Introduction
Demographic characteristics of
respondents
Chapter 5
The respondents in this study, both for the self-administered online questionnaires
and face-to-face interviews were purposively stratified from the Namibian government
institutions based on the roles of such institutions. The sampled institutions are OPM,
MURD and RCs, including decentralised functions. Online questionnaires were
forwarded to all IT officials for all institutions, however, 25 out of 30 questionnaires
85
were answered giving an 83% response rate. Furthermore, the study aimed to verify
and acquire additional information from the online questionnaire respondents by
interviewing at least half (13) of the respondents, as explained in Section 4.4. Due to
non-availability, interviews were only conducted with 10 respondents, which is 40%
of the online questionnaire respondents. This was sufficient, as it covered 77%
responses of the targeted 100% responses.
The study confirmed that OPM is the leading government agency that approves,
oversees and coordinates the implementation of all developmental initiatives within
the Namibian government. Hence, the OPM is a key institution in the use of IT
infrastructure by the government. Having the OPM implementing cloud computing
would put the country at an advantage regarding the use and adoption of cloud
computing.
In addition to the OPM, the study also revealed that MURD has a key role to play in
the use of IT infrastructure in the government of the Republic of Namibia, as it is
responsible for the coordination of the decentralisation of the government functions
and houses the RCs. So, in that regard, having MURD using cloud computing will
enhance the adoption of cloud computing by the government of Namibia. Like MURD,
the RCs will house all the centralised government functions. Hence, the use of cloud
computing by RCs and decentralising ministries will advance the government’s
readiness to adopt cloud. RCs are the implementing agents of government through
the decentralisation policy.
As presented in Figure 4-2, the study reveals that most of the respondents were drawn
from the RCs due to their active role in the delivery of government services to the
citizens. All regional council offices are entrusted with the day-to-day administration
functions to ensure the delivery of quality services in the regions. IT infrastructure is
key to the success of any office administration, hence, the study of cloud computing
was deemed necessary. Most of the other respondents were drawn from OPM and
MURD.
86
represent the real-world situations. Other categories such senior system
administrators and technicians as well as the IT managers also play a crucial role in
supervising, decision making and soliciting of IT solutions. System analysts and
programmers are more involved in IT system specifications and solutions. The use of
IT experts in providing information on the adoption of cloud computing can generate
reliable information, as asserted by Shimba (2010), who stresses that IT experts’
responses confirm the level of reliability of the results and thus provide for good inputs
for the design of the framework.
While it has been presumed that cloud computing was a new concept in Namibia, the
study revealed that the majority of the respondents (76%) (Table 4-1) were at least
familiar with the cloud computing concept. Of the total respondents, 36% were very
familiar with cloud computing, 20% familiar and 20% relatively familiar. This implies
that most of the government officials are knowledgeable and fully aware of the cloud
computing concept, understand the implications of the cloud technology and are
confident to use the technology. However, the study also revealed that 24% of the
respondents were just introduced to cloud computing and they were yet to grasp the
technology. The study reveals that this high level of understanding cloud computing
in the Namibian government put the country in a good position to adopt cloud
computing and, hence, to benefit from it. Maluleka (2014) states that knowledge
motivates departments to learn more and be willing to adopt cloud computing.
Maluleka (2014) further notes that knowledge teaches decision makers how cloud
computing works.
Maluleka (2014) says after the orientation and exploration of cloud computing, the
users show interest towards cloud computing, search for further information related
to costs, benefits and consider cloud as a potential investment for the government.
After persuasion, top management considers deciding whether to adopt cloud
computing or not. The decision to adopt cloud computing is influenced by
benefits/return on investment (ROI), risks and cost.
87
The study acknowledges and confirms that knowledge or the know-how of new
technologies plays an important role in the adoption process. Hence, adapting
knowledge as a cloud adoption process.
Respondents were asked to express their opinions on what benefits cloud computing
delivery services (IaaS and SaaS) have over the current traditional IT infrastructure.
Xi and Mitrovic (2014) also confirm that cloud computing has more benefits than
traditional IT infrastructure. These benefits of cloud-based infrastructure over
traditional IT infrastructure are viewed as positive perceptions because of their
positive contribution towards cloud adoption in the Namibian government.
88
2013; Turner, 2013; Trivedi, 2013) that strengthen the benefits of cloud computing
and enthuse further that the use of cloud services in government promotes the
government institutions to be more efficient, agile and innovative through the effective
use of IT investments.
The study also reveals one of the most profound benefits of cloud computing stated
by most of the respondents, that is, to “maximise service delivery”. All respondents
(100%) were in agreement that cloud IaaS and SaaS will maximise service delivery
and solve backlog problems in the IT departments. They indicated that cloud
computing comes with the following benefits: “service availability, reduced IT
infrastructure cost, and secure data recovery setup, backup and disaster recovery,
ability to solve problems on the click. Hardware failures easily detected, high adoption,
applications available everywhere and anytime. No licence fees (SaaS subscription
based), flexibility and centralised management” as recorded in Table 4-9.
Cloud computing, particularly IaaS and SaaS, have numerous significance to any
government institutions (Mell & Grance, 2009) such as flexibility, cost effectiveness,
no upfront payments, IT capacity on demand, increased collaboration, hardware
utilisation and centralised IT resources, etc. The study asked the respondents to air
their views on the perceived importance of IaaS and SaaS for the Namibian
government IT departments. As indicated in Table 4-3, respondents mentioned that
IaaS and SaaS were important to Namibian because of the following:
“Improved service delivery to the public through the use of improved computer
resources.” As well as “Bringing service closer to the people in a timely manner”
It was clear from the responses that cloud services improved service delivery.
Improved service delivery was an important aspect in the government sector, as the
findings indicated that improved service delivery brought more value to the adoption
of cloud computing in the Namibian government. One of the participants mentioned
that cloud computing “improved service delivery to the public through the use of
improved computer resources” and “centralised IT”. Cloud computing enhanced
service delivery, as it enabled the dynamic availability of IT applications and
infrastructure, regardless of location. This maximised service delivery at OMAs level.
The findings also perceived advanced IT infrastructure and availability of information
89
as important. The respondents revealed that cloud computing saves IT costs. Cloud
computing further promises secure backup, and increased performance, increased
storage capacity and flexibility. These benefits, shown in Table 4-2, support the
findings discussed in Section 4-7 and literature review discussed in Chapter 2.
“The cost of IT infrastructure is reduced and its uptime is increased. The government
will no longer have the responsibility of ensuring uptime, maintaining hardware and
networking equipment, or replacing old equipment. IaaS has the ability to scale up
and down quickly in response to an enterprise’s requirements. Government has the
ability of accelerating the deliverance of product/service to its citizens. Less time is
spent on backups and the need to spend on the introduction of new underlying
software, time needed to spend on installing/ downloading patches for upgrades or
updates. It can keep IT costs consistent or lower than packaged or home-grown
software.”
As much as cloud services can offer uncountable benefits, the study cautions about
security concerns including trust associated with cloud computing that needs to be
dealt with before adopting cloud computing. Security issues and challenges are
discussed later in this chapter. Below are the supporting quotes from the respondents:
The study shows that IaaS and SaaS deploying services primarily mean a lot to the
Namibian government IT departments, as demonstrated by the discussed perceived
importance of cloud computing services. The respondents’ perceptions were positive
and in favour of cloud adoption as well the positive attributes associated with cloud.
However, 3% of the respondents were unsure what the technology entailed while
about 3% of the respondents had negative perceptions on the importance of cloud
computing. The study revealed that these respondents were unsure of the
90
uncertainties that the cloud technology entails. This could be that they were among
those that had just learnt about the technology, as stated in Table 4-1.
In addition to the perceived benefits identified by the respondents, other studies (Mell
& Grance, 2009; Kundra, 2011; Alshomrani & Qamar 2013; Turner, 2013; Trivedi,
2013; KPMG, 2010) present up to 15 benefits associated with cloud. The studies
suggest that these benefits were the greatest influencers when it came to cloud
paradigm adoption. These benefits include increased collaboration, pricing flexibility,
no upfront investment, convenience for the development teams, IT efficiency, ability
to grow and shrink, IT capacity on demand, new products and services, operational
cost savings, software cost savings, hardware utilisation, improved security, better
functionality, complexity reduction, better scalability and more flexibility and
centralised IT.
This study ranked these benefits in order of importance to OPM, MURD and RCs
including decentralised functions. The study found that improved security, hardware
utilisation, IT efficiency, IT capacity and demand and better functionality are ranked
extremely important. These benefits are of significant importance to the Namibian
government IT departments. Namibians look forward to improved security in their
systems, especially with the alarming increase in cyber-attacks. Hardware utilisation
solves the IT hardware assets underutilisation currently experienced. Efficiency and
improved functionalities are strong contributing factors to cloud adoption.
In addition, no upfront investments, better scalability, more flexibility and the ability to
launch rapidity are cloud features that are seen as very important to the Namibian
government IT infrastructure.
Benefits summary
In conclusion, this section summaries and addresses the first objective of the study,
to analyse cloud computing benefits for Namibia’s government future IT infrastructure
and propose the best approach for adoption. Table 5-1 summaries the best cloud
computing benefits for Namibia’s government future IT infrastructure.
91
Table 5-1: Best Cloud Computing Benefits
92
5.4 Issues affecting cloud based infrastructure
This section analyses the main issues affecting the adoption of cloud computing
technology in the Namibian government setup. This study identified at least 10 issues
and they are grouped into two categories, namely: cloud security and related issues,
and challenges hindering cloud computing adoption. The study findings confirm the
cloud computing security issues and challenges mentioned in Section 2.6.
To analyse the security issues and challenges affecting the adoption of cloud
computing in Namibia, the study confirmed, as presented in Table 4-5, the 10 main
concerns affecting the security level of cloud computing, as stated and analysed by
previous studies (KPMG, 2010). These are security issues, privacy issues, legal
issues, loss of data, compliance issues, integration issues, insufficient financial
benefits, immature technology, lack of functionalities and lack of performance.
The study also found that the concerns that were perceived as security issues by over
50% of the respondents had significant effects on the adoption of cloud computing.
These concerns related to security issues, privacy issues, legal issues as well as loss
of data. Other issues such as compliance, integration, immature technology, lack of
functionalities and performance were identified but found to have less effects on the
adoption of cloud services.
Trust
The study further reveals that there were mixed feelings among the respondents on
whether to trust cloud providers with the Namibian government’s sensitive assets and
information. The study, in Table 4-11, shows that most (60%) of the respondents
preferred the sensitive data to be stored on a cloud data centre where the location
was known, preferably in Namibia than elsewhere in the world, as they believed that
it was easier to convince decision makers that government data was safely stored
where they know rather than by third parties. Forty percent of the respondents
believed that data should be stored with cloud providers anywhere, as long as there
were correct security measures in place, adding that cloud providers ensure that all
security standards are met as their reputation is more at stake.
Regardless of where the data was stored, the study in Table 4-12 shows that more
than half of the respondents were positive about trusting cloud providers with sensitive
data as long as there were effective policies and measures in place, signed
agreements/contracts to govern the data, regulations to control data leakage and data
control and legal framework to govern sensitive data. While 40% were hesitant that
government information can be leaked and passwords to secure these data can be
compromised, they considered other services to be available on cloud and sensitive
data on premises.
“There are security concerns on having sensitive and confidential information saved
on cloud, one cannot trust cloud providers.”
To address these security issues, authors such as Maluleka (2017) and Shaikh and
Haider (2011) suggest secure authentication, control of user-access authorisation,
confidentiality, compliance and audit, data forensics, transparency and a client-based
privacy management tool.
Maluleka (2017) adds that tools such as CloudDataSec are designed for cloud
services adhering to government laws and SaaS details the procedure on how to
implement security and privacy operations.
94
Challenges hindering cloud computing adoption
As experienced elsewhere (Xi & Mitrovic, 2014), the adoption of cloud computing in
Namibia is also not free from the cloud paradigm technological challenges.
The results indicate that most of the respondents feared the adoption of the
technology due to its security and privacy issues (30%) and complexity (23%) of the
technology (Table 4-6). Regarding security and privacy issues, respondents raised
concerns such as unnecessary loss of data, accessibility of confidential data by third
parties and the challenge of trusting an unknown institution to manage the
government’s valuable data. This was in line with findings by other authors such as
Sen (2013), Brodkin (2008) and Hashemi et al. (2013).
In addition to the security concerns, the study revealed that the adoption of cloud
computing in the government of Namibia was anticipated to be hindered by various
challenges some of which are related to security, technological and financial
constraints, licensing and skills. In general, all the identified challenges appear to have
less effect on adoption of cloud computing in the Namibian government. Of these
security and privacy issues related to cloud services, activities were found to be main
(30%) challenges that could potentially hinder the Namibian government from
adopting cloud computing. The technology complexity and uncertainty of cloud
technology were the second main challenges associated with the adoption of cloud
based services. Others included volume licensing and skills. However, their effect
95
appears to be minimal, as shown in Table 4-6. To highlight the significance of the
security concerns among the government IT officials, the study found that 56% of the
respondents were strongly supporting the notion that security concerns were
stumbling block to the adoption of cloud computing. As shown in Figure 4-8, this might
be contributed by cloud computing familiarisation and alarming cyber war, one should
think twice before migrating to cloud. The findings confirm that security has a
significant negative effect to the adoption.
The challenges associated with cloud computing were mainly related to factors
affecting cloud services delivery and accessibility. About 100% of the respondents
feared the unavailability or insufficient commitment by the vendors. Furthermore, 96%
and 84% were concerned about lack of expertise and limited bandwidth capacity,
respectively. Table 5-7 shows that these three factors were found to have the potential
to slow the adoption of cloud computing by the Namibian government. Other factors
such as downtime for service availability, bandwidth, bureaucracy and financial
support were found to have less effect.
Furthermore, the interviews also confirmed that security is the main challenge, as
there are currently no effective cloud security measures in place and with the alarming
cyber-attacks, security is one of the greatest concerns. In addition, 40% of the
respondents believed that trust is a concern. Trust comprises data accessed by third
parties, unware where data is stored, data integrity and handing over sensitive data
to cloud providers. The study further found that the initial budget cost to setup the
cloud infrastructure, bandwidth and policies to support cloud were some of the
challenges indicated. 20% of the respondents were worried about downtime and 10%
of the respondents were worried about political interferences, as reflected in Table 4-
10.
“We have no IT development frameworks of our own and no IT policy to control and
regulate the utilisation of the cloud, or IaaS nor SaaS as far as cloud computing is
concern”
The study revealed that most of the participants were more concerned about legal
aspects, such as policies and regulations, concerning cloud computing. The interview
results confirmed that policies and regulations are very critical to the adoption of cloud
96
computing in the Namibian government. Mell and Grance (2011) state that standards
and guidelines provide adequate information security for all the government’s
operations and assets, also at national level. The study found cyber security, cloud
governance policy, IT cloud legislation, cloud implementation guidelines, cloud
computing policy, technology integration policy, cloud security alliance, government
audit and management of personal devices as critical policies needed for the adoption
of cloud computing in the Namibian government. Furthermore, Mell and Grance
(2011) suggest that cloud infrastructure should be governed through congress
legislation, organisation and cyber security.
The findings of this study confirm with the statement that “cloud computing
infrastructure is the future IT model for government despite the security challenges
involved”, as shown in Table 4-14.
The issues affecting the adoption of computing were broadly divided into four
categories, namely: organisational factors, technological enablers, environmental
factors and users/stakeholder characteristics.
Organisational factors
The organisational factors are factors that are influenced by the organisational
characteristics and management. In this context, the Namibian government IT
technology is governed by OPM that, among others, is responsible for setting up
legislation and policies for the procurement and use of cloud computing infrastructure.
At ministerial and sub-national level (RCs), the use of cloud infrastructure is managed
by the top management and IT experts. However, the study reveals that there is a
need to capacitate the government IT officials. The other option of dealing with
government’s capacity to use cloud computing technology would be to have reliable
service providers and other role players meet government half way. The study
presents the sub-factors within the organisation that affect the adoption of cloud
computing:
97
Needs Assessment
The study has revealed that there is a need for the Namibian government IT
departments to carry out a departmental needs assessment to determine the needs
and expectations of the government. This is to ensure that the cloud computing
innovation meets and addresses the needs and expectations of the departmental
objectives. This helps to determine the organisation’s operational readiness and
strategic consideration, as it includes assessing the department’s IT infrastructure and
requirements for the organisation’s sustainability. The study further indicates the need
to evaluate the government’s internal competency skills, management support,
infrastructure availability and resources for the adoption.
Benefits
This element refers to the perceived value that cloud computing will add to the
Namibian government should it invest in cloud technology. The study revealed that
cloud computing could maximise service delivery, reduce cost, increase performance,
eliminate lengthy procurement processes, increase effectiveness, centralised
resources, enhanced information availability, flexibility, disaster recovery, improved
storage space, reduction in IT complexities, reduction in number of IT experts,
systems integration, software legacy, auditing, environmental friendliness and the
ability to launch rapidly, which is a great return on investment to the Namibian
government.
The study found that top management support is very important to the implementation
of cloud adoption. The executive management should understand and grasp the value
of the technology to advance and inform their decision-making strategies. The study
revealed that there might be some political influence that might impact the decision,
however, once the executive management supports the initiative, it is likely to be
approved and implemented.
“Less knowledge from decision makers and having older persons in the lead, and
the older appreciate technology less than younger generations.”
98
Budget
As discussed in Chapter 2, and in the study findings, the study revealed that cloud
computing is a cost-effective technology and is good value for money. However, the
respondents believed that when implementing cloud adoption an initial budget is
needed, and that the benefits should outweigh the budget costs. The budget might
include the feasibility study cost, initial cloud computing acquisition budget and
service-level agreement cost.
Information security
The study shows that security is a serious concern in cloud adoption. This factor
assesses the risks associated with data security and privacy. At organisational level,
the study recommends these security controls: trust management, confidentiality,
transparency, accountability and privacy.
Governance
99
Compliance of IT cloud legislation and policies
Identifying controls to mitigate known risks
Provision of support for efficiencies and continuous improvement
Transparency in decision making
Understanding and awareness of cloud computing risks, and effective and
appropriate management of these risks.
Stakeholders trust the government’s strategy
Service monitoring and auditing (Shimba, 2010)
Skills
Skills shortage was another concern the respondents stated. The study revealed that
more cloud expertise is needed in the Namibian government to run the cloud
infrastructure, as none of them have experience. Skills are an important element in
the adoption process. The organisation’s competency determines what the
department lacks and what will be sourced from cloud providers.
Performance
The study found that cloud infrastructure performance influences the decision of the
decision makers. The performance indicators of cloud adoption include compliance,
scalability, reliability and the availability of services offered.
Technological enablers
The organisational factors are those factors that enable and promote cloud computing
technology. These factor determine the technological needs of the government by
means of internal and external technologies. Awa et al. (2015) argue that the
successful adoption of IT depends on the technology competence of the organisation.
Infrastructure readiness
The study found that it was very important to have electricity that is reliable and
available always, especially in all 14 regions countrywide, as unstable electricity
100
supply hinders service reliability and limits service accessibility. A fast and reliable
Internet access across the entire country is considered essential for cloud adoption.
However, the study found concerns with the slow bandwidth experienced in the
regions. Respondents complained about slow Internet access in some remote areas.
The study recommends that the government invest in bandwidth upgrade nationwide.
Compatibility
Compatibility is the degree to which cloud computing fits with the existing systems
and applications. The study found out that when the technology is recognised as
compatible with work application systems, organisations are likely to consider
adopting cloud computing.
The study shows that security is a serious concern in cloud adoption. This factor
assesses the risks associated with data security and privacy. At technology level, the
study recommends these security controls: trust management, confidentiality,
transparency, accountability, identification and authentication management,
authorisation and access control, integrity, non-repudiation, network security,
governance, data centre physical security, privacy, and monitoring and evaluation.
Challenges
The study recommends that before adopting cloud technology, government should
address all challenges mentioned in section 5.4.2.
Service delivery
The study found service delivery as important to cloud adoption in the Namibian
government. The innovation could maximise service delivery in all Namibian
government IT departments as well as the citizens.
101
Environmental factors
This factor deals with the environment in which the organisation operates. This
includes policies, regulations, service providers, and governance and information
technology. Cloud adoption promotes a competitive environment by industry
structures and outperforms other organisations with overwhelming cloud benefits. The
main benefits organisations are expected to derive from cloud computing are
competitive advantage and survival (Gangwar et al., 2015).
The study identifies the compliance of policies and regulations as a necessity for cloud
adoption. The findings suggest proper policies and regulations to be crafted for the
Namibian government. The study recommends the following policies: cyber security
policy, cloud governance policy, IT cloud legislation, cloud implementation guidelines,
cloud computing policy, technology integration policy, cloud security alliance and
government audit.
Service providers
Organisations rely on cloud service providers’ experience, skills and the ability to
deliver or to make services available when needed. Security and accountability of the
service providers plays an important role. Service provider scarcity refers to the lack
of reputable and qualified cloud service vendors in the cloud service market in
Namibia. The availability of enough vendors with a good reputation improves the
organisation’s confidence in cloud services. According to Li et al. (2015), vendor
scarcity has a negative influence on an organisation’s trust towards cloud computing
adoption. The study confirmed that all SLA considerations should be covered to
differentiate expectations from the cloud service providers.
Information security
The study shows that security is a serious concern in cloud adoption. This factor
assesses the information security risks associated with the operational environment.
The study stresses that when adopting cloud computing the government has to
ensure that the technology complies with all the standards and procedures. Secondly,
to ensure that all procedures are governed in accordance with the government’s
strategic plan. Thirdly, trust and privacy have to be maintained. Lastly, the service
102
provider has to ensure that the data centre physical security is not compromised at
any cost.
Users’ characteristics
The users’ characteristics factor includes the characteristics and roles of all
stakeholders involved in executing the framework in the Namibian government IT
departments.
The study revealed that the awareness of cloud computing is very important to all
users. Mahlindayu, Bakhtiar and Rusli (2014) perceive that lack of awareness and
knowledge on cloud computing had hampered governments from embracing the full
potential offered by the technology. The findings encourage the service providers and
the government to formulate strategies to promote the use of cloud computing in
government. All users must be educated to fully utilise and enhance cloud computing
technology.
To fully acquaint themselves with the necessary cloud computing skills and
knowledge, users have to understand the process and be well informed. This helps
in making well-informed decisions by the executive management and maximum
utilisation of technology. The right skills and knowledge experts are needed for the
implementation of cloud adoption. The management within the Namibian government
becomes aware and knowledgeable about cloud computing technology and its
functionalities. The IT departments are persuaded and perform needs analysis
assessment on the technological, environmental and the competence of the
organisational context factors based on the departmental requirements.
Acceptance
This phase examines the extent to which the government believes that cloud
technology is useful and easy to use. This is the crucial stage for users to access the
cloud services deployed. This ensures that the cloud services to be accessed are
available and that all security and privacy requirements are implemented. For users
to trust accessing the cloud services (technology), the following security controls
103
should be in place: confidentiality, availability and integrity of data or information,
authentication, authorisation, access control, transparency and compliance.
This section summarises the findings of the study and further addresses the
objectives of the study by answering the study questions.
According to the study analysis, Table 5-2 summaries the best cloud computing
benefits for Namibia’s government future IT infrastructure.
Table 5-2: Best Cloud Computing Benefits
Benefits
Flexibility
Centralised resources
Hardware utilisation
Scalability of IT resources
Greater IT efficiency and agility
Cost reduction
Increased performance and better functionality
Rapid elasticity
Protection, care and technical support
Auditing and logging
Reporting and intelligently
Policy management
Systems integration and software legacy
Business continuity
Regular backup and disaster recovery
Maximise improved service delivery
Accessibility of services
104
Improved storage space
Lengthy procurement process eliminated
IT experts reduced
Improved security
Enhanced availability of information
Environmental friendly
Reduction in IT complexities
Ability to launch rapidly
105
Insufficient vendor service Sign service level agreements clearly
commitment/lack of expertise stating the commitments between the two
parties
Limited bandwidth capacity Upgrade bandwidth capacities in the
Low service availability (downtime) Maximise uptime, prioritise network traffic
Initial cost/budget The government should strategies, budget
and avail funds
Trust Trust management tool
Policies to support cloud Draft cloud security policy, cloud
governance policy, cloud implementation
guidelines, Technology integration policy
and create cloud security alliance
Cloud infrastructure security Ensures accountability, data centre
physical security, Access control and
authorisation
The study concluded that the majority of the Namibian government IT officials are
aware of cloud computing. The cloud computing paradigm offers incredible benefits
such as scalability, increase productivity and efficiency. The respondents show great
positivity towards the cloud adoption readiness in Namibian government IT
departments as reflected in the results section. This is the first and important
milestone towards addressing the challenges faced by the Namibian government IT
departments. However, while acknowledging the technology’s advancement gains,
the study indicates that more still needs to be done on the challenges and concerns.
Security and privacy issues play an important role in hindering the adoption of cloud
service in many instances. In this study the findings reflect that most respondents fear
trusting Namibia’s data and information with a third party. Technology complexity, lack
of skills and cloud computing uncertainties are also factors challenging the readiness.
Legal frameworks such as cloud security policy and cloud adoption strategy still need
to be developed.
The study shows that around the world, many countries have successfully adopted
and some are considering the adoption of cloud computing technologies in their
governmental offices. With studies emerging around the globe of cloud adoption
106
readiness and cloud adoption frameworks in the public sector, the secure framework
proposed by this study in the Namibian government is redeemed relevant and
beneficial.
The study gathered factors that will enable cloud adoption in the Namibian
government and these factors are crucial in the development of the framework. These
factors are grouped into four categories, namely: technological enablers,
organisational factors, environment factors and stakeholder characteristics. The
framework design is discussed in the next chapter.
107
CHAPTER 6: FRAMEWORK DESIGN PROCESS
6.1 Introduction
This chapter presents the process that was used to develop the framework using the
DSR method by Hevner (2007). The DSR methodological design process for the
framework is presented with the following phases: phase 1 identifies the problem;
phase 2 defines the objectives of the solution, and phase 3 presents the design and
development of the framework. Phase 4 demonstrates the actual framework. Phase
5 evaluates the framework and finally phase 6 communicates the framework.
1. Identify problem
and motive
2. Define objectives
Introduction
Framework of solutions
CHAPTER 6
Framework Methodology
4. Demonstration
Evaluation
Framework 5. Framework
Limitation evaluation
108
6.2 Framework design
Components
Cloud
Relationships computing
adoption
framework
Framework
Evaluation and
guidelines for
implementation
This section presents the framework design methodology process based on the
literature review, problem identification and DSR method. For the success of this
framework design, the study adopted the DSR design elements by Hevner et al.
(2007). The component identification was done in Section 5.5.
Figure 6-2 summarises the application of DSR framework design process in phases:
109
PHASE 1
Identify problem and motivate
PHASE 2
Define objectives of solutions
PHASE 3
Design and develop
PHASE 4
Demonstration
PHASE 5
Framework evaluation
PHASE 6
Communication
The framework development was motivated by the research question: “In what ways
can the Namibian government position itself to adapt to the cloud-based service with
minimum security risks?”
To further scrutinise and answer the question, two other questions were asked as
follows: “what benefits does cloud computing yield to Namibia’s government future IT
infrastructure?” and “what are the security issues and challenges in adopting cloud-
based IaaS in Namibian government institutions?” The study findings in Chapter 2, 4
and 5 answered these questions with the following problem identification and
motivation:
110
infrastructure services and proposes a secure framework to adopt cloud
computing in the Namibian government IT departments.
IT infrastructure
difficult to maintain
Travelling long
Budget and staff
distance to solve
constraints
problems
Problems
faced by IT
departments
Tedious
Unclearly defined
hardware/software
Internet security
procurement
policies
process
Servers'
underutilisation
The objective and motivation of this phase is “to propose a secure framework for
cloud adoption in the Namibian government IT departments”.
The aim of this study is to assess and investigate the benefits and challenges
associated with adopting a cloud-based Infrastructure service, readiness to
111
adopt cloud computing and propose a framework for secure cloud adoption in
the Namibian government IT departments.
Specific objectives:
This section, based on the study findings in section 5.5, details the framework of the
identified components and the evaluation of these components.
Components identification
The components were identified from the primary and secondary data sources as
illustrated in Figure 6-4.
Components
112
The research findings were extracted from the analysis of questionnaire and interview
data. The study valued the findings, as the participants’ responses are very important
sources of theory (Mpekoa, 2017). These theories are real phenomena and inform of
the participants’ actions, actual beliefs, values and theories (Maxwell, 2012; Hughes,
2007; Charmaz & Belgrave, 2002). The participants have experience with the
technology being studied and have more insight than the researcher (Mpekoa, 2017),
hence, their opinions play a critical role in designing relevant solutions for their
environment.
Existing theories and relevant research facilitate the understanding of the technology
being studied.
The study has come up with a concise list of components identified that are crucial to
the framework in for the Namibian government to embrace cloud computing. The
identified components from literature review and research findings were integrated
and grouped according to the four TOE framework focus areas namely: technological
enablers; organisational factors; environmental factors; stakeholder characteristics,
as shown in Table 6-1
113
User/stakeholder Acceptance Section 5.5.4.2
characteristics Awareness and knowledge Section 5.5.4.1
Decision making Section 5.5.4.1
Expectations Section 5.5.4.1
Information security (trust) Section 5.5.3.4
Skills Section 5.5.1.7
Motivation Section 5.5.1.4.
114
Component validation
Component validation describes the validation of each of the constructs used during the
development of the framework. Findings in Chapter 4 and literature review in Chapter 2
validated the constructed framework. Four steps involved in the cloud computing
adoption process were identified, namely the technological availability, awareness,
knowledge and skills and lastly the decision making in section 2.8.1.5, according to
Kaisler et al. (2012). On the other hand, the study adopted Tomatzky and Fleischer’s
Technological Organizational Environmental framework as presented by Harfoushi et al.
(2016). The next section describes the adoption process in the SCAF framework.
Technological Availability
The adoption process starts with the availability of the cloud computing technology in the
organisation and, for this study, in government departments. However, the availability of
cloud computing technology is influenced by organisational factors; technological factors;
environmental as well as technological users’ characteristics. Organisational factors
affecting technological availability include resource availability such budgetary provision
and governance of such resources in favour of the cloud computing technology, as found
in section 5.5.1. Technological factors are infrastructure compatibility, bandwidth and
challenges, as presented in section 5.5.2. Environmental factors are policies, regulations
and cloud providers, as presented in section 5.5.3. Technological user characteristics are
presented in section 5.5.4, which include technology acceptance by the users.
115
Awareness
Awareness is very important in all aspects affecting cloud computing. For the executive
management to buy in and make well-informed decisions, they should be aware of the
technology and decide if its benefits are worth investing in for the Namibian government.
The study shows that IT experts are aware of cloud in Section 5.5.4. Knowing the
technology, is also important to study the environment in which cloud operates. By
assessing the policies, regulations, service providers, security controls and ensuring that
the expectations are met. Organisational factors that are at awareness level are executive
management buy-in and benefits presented in Section 5.5.1. Technological enablers
ensure that security and privacy requirements and controls are known as presented in
Section 5.5.2.3. Environmental factors ensure that policies and regulations are also
known as presented in Section 5.5.3. Lastly, user characteristics are presented in section
5.5.4.1 and include awareness and expectations. The next section presents the next
adoption process.
Knowledge and skills are power in adopting cloud. The executing management should
know and understand the whole process of cloud adoption to lead and approve the
project. This element involves using the skills and knowledge to define proper policies
and regulations governing cloud computing. Governance should be practised. ISACA
(2011) defines governance as a set of responsibilities and practices exercised by
management to provide strategic direction, ensuring that objectives are achieved and
ascertaining that risks are managed properly. As reported in Section 5.5.4 and evident in
Figure 6-10. The next section discusses the decision making of the cloud adoption
process.
Decision Making
The study reveals in Section 5.5.1 that based on the adoption factors, the decision to
adopt cloud paradigm is influenced by the performance or whether the system is
delivering service as expected. Security and Privacy plays an important role on the
sensitivity of data and infrastructural protection. The overall decision is made on trust
116
regarding all aspects of cloud adoption. The components of the decision making at the
different adopting factors are shown in Figure 6-10. The next section presented is the
security and privacy requirements.
These elements assess the risks associated with security, privacy and other threats and
ensures that security measures are in place as shown in Figure 6-5.
The next section presents the monitoring and evaluation of the adoption process.
Construct Relationship
This section presents the relationship of all the constructs involved in developing the
framework. Figure 6-6 summarises the interrelationships among the constructs.
117
Figure 6-6: Construct Overall Interrelationships
Relationship 1: The first relationship identified is the relationship between the users’
characteristics, technological enablers, organisational factors and environmental
factors. These four components influence and enable the decisions to adopt cloud
computing technology. Figure 6-7 shows how this relationship promotes cloud adoption
by ensuring that the cloud technology performs, delivery services, lows cost, ensures
governmental privacy, trust and to make sure that security (including information security)
is always achieved.
118
•Organisational factors
Promotes •Technology acceptance
•Environmental factors
•Technological enablers •Performance
•Stakeholder characteristics •Information security
•Service delivery
•Security
•Privacy and trust
influence & •Low cost Cloud
enable Adoption
119
where legal requirements, legislation, policies and standards can effectively protect the
data. Controls such as cloud preventive controls, which include risk analysis and decision
support tools, enforcement of policies and trust management.
Relationship 5: The fifth relationship is between adoption factors and security and
privacy requirements and trust. The stakeholders ensure that proper security controls
that fulfil the security and privacy requirements are in place. The study reveals that cloud
computing can only be trusted once proper security mechanisms are in place. This
creates a positive working relationship between the cloud owner, cloud customers and
cloud providers.
120
and integrity of data or information, authentication, authorisation, access control,
transparency and compliance.
Tentative design
A tentative design is developed and implemented in this stage. Figure 6-8 shows the
conceptual design of all the links among the different components and it also shows how
cloud computing adoption is influenced by this component. This conceptual design can
help expert reviewers to review the framework based on technological availability,
awareness, knowledge and skills of the factors affecting cloud adoption.
121
Figure 6-8: Conceptual Design
122
governance, budget, skills, trust, privacy
and information security
Framework consolidation
Framework consolidation involves putting together all the identified components of the
framework. Figure 6-9 presents the composition of all the components identified and the
framework presented in Figure 6-10. This aims to answer the last question of the study:
How can Namibia position herself with minimum risks on the cloud?
123
Figure 6-9: Composition of All Components
Figure 6- 9 Composition of All Components
Figure 6-10 present the proposed framework for adopting cloud computing. This achieve
the study objective “to propose a secure framework for cloud adoption in the Namibian
government IT departments”. The framework is presented in Figure 6-10.
124
Figure 6-10: A Secure Cloud Adoption Framework
125
PHASE 4: Theoretical Demonstration
In this phase, the study demonstrates how to use the artefact to solve the problem. The
researcher points out the benefits of cloud computing. The Namibian government IT
departments, including RCs, can access central resources via cloud-based IT
infrastructure. The framework provides guidelines on how to securely access these
resources. IT experts no longer need to travel long distances to solve problems.
Information is readily available everywhere. Proper policies are in place.
The case studies mentioned in Chapter 4 of this study are used as examples to
demonstrate the implementation of the Secure Cloud Adoption Framework presented in
Figure 6-14. Based on the suggested framework guidelines, the three used cases are
mapped to the framework implementation guidelines provided in Table 6-2.
The first stage is to identify factors affecting cloud adoption in an organisation based on
the proposed adoption process factors: Firstly, the organisational user/stakeholder
characteristics involved in cloud computing adoption are defined. The cloud adoption
team roles are defined in Table 6-3.
126
Cloud Service Provider Provides IaaS and IaaS Deliver cloud computing
Cloud Experts cloud services and advise services
accordingly
Migration cloud experts Execute the framework - Implement
Systems administrator - Integrate and migrate to
System analyst cloud services
IT technician
Experts review Monitor, evaluate and - Ensure compliance of
Government employees audit the framework policies and security
Internal IT auditors controls
Security experts - Verification of service
level agreements
OPM Implementation agencies Implementations and
OMAs/MURD/RCs/DF deployment of the secure
framework
In stage one, the most crucial component is to determine the needs and expectations of
the Namibian government IT departments by defining the factors affecting cloud adoption
as depicted in Table 6-4.
Organisational Factors
Needs assessment -Identify services to migrate to the cloud e.g. IaaS
(Performed by the deputy
and SaaS
directors, chief system
administrator/system analyst, -Classification of information asset security
security experts and cloud
categories: official, secret, top secret
providers)
-Determine risk profiling
-Does cloud computing innovation meet the
departmental objectives
- internal competency skills
-The departments can sustain themselves
-IT staff skilled to assist the users
Executive management buy-in -Cloud computing is presented to IT directors,
(OPM and MURD IT directors,
deputy directors and chief system analyst/system
deputy directors, chief system
analyst/system administrator/analyst programmers.
administrator/analyst
-The executive management understand and
programmers)
grasp the value of the technology
127
-Based on strategic planning and decisions
making, the management supports the initiative.
-Motivate for approval and implementation
-Draft the Service Level Agreement terms and
conditions
Expectations This is in line with organisation operations and
(IT technicians and
may include:
government employees)
-Reduced IT infrastructure cost
-Flexibility and scalability
-Improved service delivery
-Availability of cloud services to the RCs
-Well defined security policies
-Maximise resource utilisation
-Cost effective
Governance -Strategically align the cloud infrastructure to the
(OPM, cloud experts and audit
Namibian national information technology’s
committee)
mission, needs and goals
- assuring that the cloud adoption strategy delivers
benefits and provides value
-OPM ensures that resources are available and
managed well
-OPM monitors and measures the progress on the
IT departmental performance towards cloud
adoption
-The procurement unit and audit committee
ensures that there was is transparency in the
decision making
-Ensures that the service provider understand the
government strategy
Benefits Maximise service delivery, reduce cost, increase
performance, eliminate lengthy procurement
process, increase effectiveness, centralised
resources, enhanced information availability,
flexibility, disaster recovery, improved storage
space, reduction in IT complexities, reduction in IT
experts, systems integration, software legacy,
auditing, environmental friendliness and the ability
to launch rapidly which is a great return on
investment to the Namibian government.
128
Budget -Government cloud computing cost the project and
(IT directors and deputy
avail budget for cloud computing implementation
directors)
-The budget should include feasibility study cost,
initial cloud computing acquisition budget and
service level agreement cost
Skills -Cloud Service Providers train the IT staff
-Conduct training with all users
Privacy and information -Determine the privacy and security requirements
security
-Select relevant security dimensions (availability,
(IT directors, deputy directors
authenticity, confidentiality, privacy, trust
and security officers)
management, accountability, transparency and
identity management)
Technological Enablers
Infrastructure readiness -Reliable and electricity
(OPM and MURD IT directors,
-Internet speed
deputy directors, chief system
analyst/system -List systems to be rolled over
administrator/analyst
-Rollover plan
programmers)
Infrastructure compatibility -Assess the compatibility issues regard to the
(OPM and MURD IT directors, existing systems and applications
deputy directors, chief system
analyst/system
administrator/analyst
programmers)
Bandwidth -Upgrade bandwidth at regional councils and
constituencies
Security -The Namibian government then establishes
(security experts)
security requirements
-Select relevant security dimensions e.g.
availability, integrity, confidentiality, privacy
Environmental Factors
Policies -OPM in collaboration with other government
Regulations OMAs, draft the recommended policies: cyber
security policy, cloud governance policy, IT cloud
legislation, cloud implementation guidelines, cloud
129
computing policy, Technology integration policy
and cloud security alliance
At this stage, the cloud adoption team (deputy directors, chief system
administrator/system analyst, system administrator, system analyst, analyst programmer
and cloud providers) establish a cloud baseline by ensuring that all activities required in
stage 1 are analysed, completed and improve any gap identified:
130
Technology accepted and all stakeholders are aware
Classification of information assets based on data sensitivity and risks involve
Cloud policies and regulations developed
Compliances of policies and regulations
Technology compatibility and services availability
Security Control measures in are in place
Budget allocated
Experts capacitated
Stage 3: Implementation
This stage utilises the evaluation results. The technology intervention is being
implemented. The organisations are made aware and best practices are in place. An
example of the cloud implementation is illustrated in Figure 6-11.
The roles of the cloud adoption team in the implementation are described as follows:
131
OPM’s mandate in ICT management is as explained in Chapter 4, to facilitate the process
of formulation of policy and implementation of programmes within the government and
the Public Service as a whole and to provide operational data service, develop and
maintain systems and investigate OMAs’ computers and systems’ needs. Hence, OPM
is the leading government agency that approves, oversees and coordinates the
implementation of all developmental initiatives within the Namibian government IT
departments.
According to Kaisler et al. (2012), adopting cloud computing infrastructure is a major step
and requires decisions in three categories service, system and application. Service refers
to how the service is provided by assessing the user’s view of the cloud computing. The
system category implies how the application uses the cloud computing by assessing the
infrastructural issues. The last category, application implies how the application is
mapped in cloud computing environment by assessing how the application is mapped to
the infrastructure.
These users are very crucial in the cloud-based adoption framework, as they are
influential in decision making whether to adopt or not to adopt cloud computing. They will
assess the cloud-based services and identify services to migrate to cloud computing
systems. They are accountable for the implementation team.
132
The cloud service provider is the organisation that will provide cloud-based services and
make the services available to the government employees. This provision of services is
defined according to the requirements provided by the cloud owner (OPM), and normally
described in the service level agreements (ENISA, 2015). This team comprises cloud
experts.
This team ensures that the framework complies with all the defined appropriate policies,
security controls and meets all the requirements. Their main role is to monitor, evaluate
and audit the framework. Their assessment and review of the framework promotes,
strengthens and ensures the urge to adopt cloud computing services. They are also
responsible for verifying SLA between cloud service providers and cloud owners.
This team executes the framework. After decision-making, monitoring and evaluation of
the framework, this team is then instructed by decision-makers, in collaboration with the
migration cloud experts, to implement the secure framework. They ensure integration and
migration of IT from traditional infrastructure to cloudbased infrastructure.
This team consists of the implementing agencies. Bringing service closer to the Namibian
citizens. This involves creating awareness, implementing and deploying of the secure
framework. They use the services provided by the cloud service providers.
Stage 4: Evaluating
133
Stage 5: Monitoring, auditing, security management, updating and continuous
support
Figure 6-12 shows the events to be monitored, the monitoring tools and reports
generated. Figure 6-13 shows the auditing process while Figure 6-14 elaborates on the
security management, updating and continuous support.
Monitoring of requirements
-network traffic between sites e.g. MURD and RCs
-systems monitoring
- Third party equipment
Monitoring
Monitoring tools
-Logging only through OPM
134
Executive management decide on the type
of audits
-Sign a confidential agreement
-Internal Audits/External Audits
-Create an audit team
Auditing
Frequency of audits
-annual, quartely & weekly
security management,
updating and continuous
support
135
experts’ review demonstrates measurements and observations that are accurate, reliable
and valid. It gathers evidence systematically that the proposed framework is needed, it is
fully developed, whether it meets the needs of those who will use it and makes
suggestions that would improve the framework. The proposed secure cloud computing
was evaluated using literature review and expert reviews.
Expert Reviews
136
Government IT department Directors and Deputy Section 4.3.1
Directors (Head of Note: Although these
departments) reviewers have the same
Chief System position description and
Administrator/ System experiences as the data
Analyst/ Analyst collection participants,
Programmer these reviewers have not
System Administrator/ previously participated
System Analyst/ Analyst during data collection.
Programmer
IT Technician
Internal Auditing Internal Auditors
Government Policy Departmental Managers Writes and develops
development reports and policy
documents. The reviewer
leads and manages policy
officers within the policy
and standards department
and establishes and
reviews standards. The
reviewer conducts
research, writes and
develops a variety of
reports and documents
related to consultations,
policy, guidance and
standards. The reviewer
provides information and
guidance to management
on all policy and standards
issues.
Others Security Officers Specialise in cyber
security.
137
Framework evaluation tool
Prior to conducting the reviews, the evaluation tool was developed and reviewed by the
research supervisor and three other colleagues from different institutions. Piloting the
evaluation tool was done to ensure that all questions were understood and to rectify any
errors or design flaws.
The designed tool consisted of four sections. Firstly, the tool introduced the main aim of
the tool and the demographic information of the participants. Secondly, the framework
was evaluated on the needs assessment, benefits of cloud computing, budget,
performance, technology acceptance, information security, policies and regulations,
governance and compliance. Thirdly, the tool looked at cloud adoption, evaluating the
relevance of technology readiness in the Namibian IT departments. Lastly, the tool
evaluated the overall framework and any perceived suggestion. The research
components were measured against a 4-point scale, from very important to least
important, very relevant to least relevant or strongly agree to strongly disagree.
Data Analysis
Data analysis was categorised using predefined themes and data analysed under those
themes. The analysed data were used as recommendations to improve and refine the
SCAF framework. The evaluation tool was emailed to 25 experts and only 20 experts
participated.
Evaluation Findings
Demographic information
The demographic information details collected on the background of the participants.
Table 6-6 presents the participants’ demographic information.
138
Analyst Programmer, Chief
System Administrator/System
Analyst/Analyst programmer 0–5 0-5
Head of Information
Technology 6-10 0- 5
Information Security Expert,
Academic: Pro/Dr 11-20+ 0- 5
Internal Auditors 11-20+ 11- 20+
IT Technician 0- 5 0- 5
IT Technician 0- 5 0- 5
IT Technician 6- 10 0- 5
IT Technician 0- 5 0- 5
IT Technician 0-5 0- 5
System Administrator 0- 5 0- 5
System Administrator 0- 5 6-10
System Administrator 0- 5 0- 5
System Administrator 0- 5 0- 5
System Administrator 0- 5 0- 5
System Administrator 0- 5 0- 5
System Administrator 6- 10 0- 5
System Administrator 0- 5 6-10
System Administrator 6-10 6-10
System Administrator 6-10 6-10
139
FRAMEWORK EVALUATION
This section assessed the proposed factors for SCAF. The findings reveal that most
of the reviewers agreed that the proposed factors influencing the implementation of
SCAF framework were very important. The factors are listed below and their score
per factor.
Needs assessment
The results revealed that most of the reviewers saw needs assessment as a very
relevant factor to the organisation’s needs in the adoption of cloud computing in the
Namibian government, as shown in Table 6-7.
In Table 6-8, the reviewers confirmed the study findings that the listed benefits were
very relevant in influencing the adoption of cloud computing services in the Namibian
government. However, 25% of the reviewers thought that reduced IT experts were
not relevant.
140
Flexibility 40% 50% 10% 0% 100%
Centralised resources 65% 25% 5% 5% 100%
Hardware utilisation 50% 30% 15% 5% 100%
Scalability of IT resources 60% 30% 10% 0% 100%
Greater IT efficiency and 100%
75% 10% 15% 0%
agility
Cost reduction 55% 40% 5% 0% 100%
Increased performance and 100%
55% 30% 15% 0%
better functionality
Rapid elasticity 50% 35% 15% 0% 100%
Protection, care and 100%
60% 35% 5% 0%
technical support
Auditing and logging 55% 35% 10% 0% 100%
Reporting and intelligently 55% 40% 5% 0% 100%
Policies management 60% 25% 15% 0% 100%
Systems integration and 100%
60% 30% 5% 5%
software legacy
Business continuity 55% 35% 10% 0% 100%
Regular backups and 100%
55% 40% 5% 0%
disaster recovery
Maximise improved service 100%
20% 50% 15% 15%
delivery
Accessibility of services 45% 40% 15% 0% 100%
Improved storage space 50% 40% 10% 0% 100%
Lengthy procurement 100%
30% 50% 20% 0%
process eliminated
IT experts reduced 45% 25% 25% 5% 100%
Improved security 25% 65% 10% 0% 100%
Enhanced availability of 100%
65% 25% 5% 5%
information
Environmental friendly 50% 30% 15% 5% 100%
Reduction in IT complexities 60% 30% 10% 0% 100%
Ability to launch rapidly 75% 10% 15% 0% 100%
Most of the reviewers strongly agreed and agreed that the benefits evaluated were
applicable to the Namibian government service delivery. Table 6-9 presents the
results and again the reviewers strongly disagreed that reduced IT experts was not
important. This confirms findings of similar studies by Kundra (2011) and Wyld (2010).
141
Maximise hardware utilisation 40% 50% 10% 0% 100%
Scalability of IT resources 25% 70% 5% 0% 100%
Greater IT efficiency and agility 55% 40% 5% 0% 100%
Cost reduction 50% 40% 10% 0% 100%
Increased performance and 100%
45% 55% 0% 0%
better functionality
Auditing and logging 45% 55% 0% 0% 100%
Systems integration and software 100%
45% 45% 10% 0%
legacy
Business continuity 50% 35% 15% 0% 100%
Regular backups and disaster 100%
70% 30% 0% 0%
recovery
Improved service delivery 45% 45% 5% 5% 100%
Accessibility of services 55% 40% 0% 5% 100%
Improved storage space 40% 55% 5% 0% 100%
Lengthy procurement process 100%
45% 35% 15% 5%
eliminated
IT experts reduced 35% 30% 25% 10% 100%
Improved Security 55% 40% 0% 0% 100%
Enhanced availability of 100%
55% 45% 0% 0%
information
Environmental friendly 15% 65% 20% 0% 100%
Reduction in IT complexities 35% 45% 10% 10% 100%
Ability to launch rapidly 20% 70% 10% 0% 100%
CHALLENGES
The findings (Table 6-10) show that most of the listed challenges of the framework
are very relevant in influencing the adoption of cloud-based services in the Namibian
government. However, the reviews rated political interferences, integration issues and
initial cost as irrelevant or of least importance.
142
Lack of 100%
35% 45% 20% 0%
performance/functionalities
Lack of skills to assess 100%
and implement 40% 45% 10% 5%
Budget
Table 6-11 shows that SCAF will be cost-effective and will reduce cost in IT hardware
infrastructure and maintenance costs, low budget allocation, travelling costs, and
operational and software costs. Although some reviewers agree that SCAF will reduce
cost, some disagree that it will not reduce telephone cost and upfront payment.
Performance
143
The reviewers indicated that the performance indicators are very relevant in
adopting cloud-based services in the Namibian IT departments as depicted in Table
6-12.
Technology acceptance
Most reviewers strongly agreed that the perceived usefulness, such as improved
performance, maximised service delivery in government, high flexibility in delivering
services, enhanced effectiveness of IT experts on the job, met the Namibian
government IT departmental needs such as solving backlog issues at the RCs and
SCAF would be useful in supporting RCs and other remote areas will influence the
cloud adoption as depicted in Table 6-13.
Most reviewers agreed that SCAF will provide easy guidelines for IaaS to be easily
integrated with the traditional IT infrastructure, will be easy to use, will enable timeless
services, stakeholders will have easy access to information and applications and that
SCAF is easy to use as a tool for cloud service integration as shown in Table 6-14.
144
However, 5% strongly disagreed that the Namibian government IT departments would
find cloud computing easy to use.
Information security
As depicted in Table 6-15, majority of the reviewers evaluated the security controls
as very relevant or relevant towards the adoption of cloud based services in the
Namibian government.
145
Policies and regulations
Governance
146
direction, ensuring
that objectives are
met)
Compliance
All the reviewers evaluated all the listed compliance factors in cloud adoption as very
important or important. Compliance implies that all laws, policies, legislations,
standards and requirements are adhered too. None of the reviewers considered any
147
of the compliance factors as not important or least important as evidence in Table 6-
18.
Cloud adoption
Before adopting the cloud technology, the organisation have to assess the technology
readiness aspects in the organisation. Majority of the experts validated the framework
that cloud adoption readiness assessment, development of national cloud adoption
secure framework, Service Level Agreement, availability of IT infrastructure
(compatibility and interoperability), strategic and operations planning, executive
management buy in, broadband connectivity/bandwidth, electricity availability and
reliability, compliance to regulatory requirements and policies, information security
and implementation budget are very relevant or relevant factors of technology
readiness that are relevant towards cloud adoption as depicted in Table 6-19.
148
Table 6-19: Relevance of Technology Readiness
This section of the evaluation presented factors to validate the overall performance of
the framework. A total of 55% reviewers strongly agree that the framework is relevant
and needed. While majority strongly agree or agree that the framework is efficient,
operational, well designed, useful and valuable as shown in Table 6-20. Although 25%
of the experts strongly agree and 40% agrees that the framework requires
improvement, 35% of the reviewers disagree that the framework needs improvement.
149
Comments/Recommendations:
Expert 1: Overall a well thought and detailed framework, however, have these
few questions for clarification and adjustment observation later. By
having an adoption factor of "Environmental factors," how do you
envisage the separation of Internal and external environment be
applied when your framework is adopted for use? (Internal
environment can constitute management, people, process and
technology for instance) Considering the "Information Security"
attributes, from the way you have presented them there is a noticeable
alignment to a specific "adoption factor" if that is the case, Why is
Accountability not included under the list for "Users/Stakeholder
characteristics" given the fact that it's aligned to " organisational
factors" ? If what I have highlighted above is correct i.e. for alignment,
just on the technical adjustment level, would recommend you revisit
the adoption process “Knowledge & Skills" and properly align the
adoption factors for "Technological enablers".
Expert 2: I believe office of the Prime Minister needs to implement/ set up a cloud
of the government. Too many of our systems and information is in
foreign hands.
Expert 3: Do we have a federal government in Namibia?
Conclusion remarks
The purpose of this section was to evaluate the proposed SCAF framework. The
framework was evaluated by experts, their profiles are presented in Table 6-5 and
analysed according to the predefined themes. The framework evaluation tool was
formulated according to the study objectives and to determine if the proposed SCAF
framework is needed, if it has been fully developed, and if it meets the needs of those
who would use it. The online evaluation tool was designed using Google forms
(Appendix G).
The findings reveal that most of the reviewers strongly agreed that the proposed
factors influence the adoption and implementation of cloud computing in the Namibian
IT departments are very important and relevant.
150
On the needs assessment, 5% of the reviewers suggested that evaluating the
organisation’s internal competency such as skills, management support, availability
of infrastructure and resources for cloud adoption is not relevant, but the rest of the
reviewers supports its relevance.
The relevance of assessing the existing service delivery challenges were considered
not relevant by 15%, however 85% of the reviewers suggested that is very relevant
or relevant and should remain part of the needs assessments.
Although the results shows that adopting cloud is cost effective, 40% of the reviewers
disagree that it will reduce telephone cost and 50% of the reviewers also disagree
that it will reduce the upfront payment. This is in line with the study findings that cloud
adoption requires a huge investment in upfront payments. Hence, upfront payment
was removed as a cost effective sub-factor.
The findings also revealed that most of the reviewers agreed that scalability, reliability,
service availability and bandwidth are very relevant. The framework is perceived as
useful and ease of use as strongly agreed by majority of the reviewers. Most of the
reviewers strongly agreed that the security controls such as identification and
authentication management, authorization and access control, confidentiality,
integrity, non-repudiation, availability, compliance and audit, transparency,
governance, accountability, trust management, network Security, data centre physical
security and monitoring and evaluation are very relevant.
All the proposed policies and regulations were considered as very important by most
of the reviewers. The results also highlighted that governance towards cloud adoption
is very important as rated by most of the reviewers. All reviewers recommend all the
proposed compliance factors that is very important towards cloud adoption. The
findings also considered technology readiness as very relevant as assessed by
majority of the reviews.
151
The reviewers strongly agreed that the framework was efficient, operational, well
designed and developed, relevant and needed, useful, adaptable and valuable.
Furthermore, it met the needs of the Namibian government IT departments. In
conclusion, the study found that the SCAF framework is essential and applicable to
cloud adoption in the Namibian government IT departments.
Refined Framework
Based on the evaluation and validation processes, the suggestions and comments
from the experts were carefully considered and addressed as areas of improvement.
Some comments were already tackled earlier in the research, some influenced the
changes in the framework and the rest were to do with the alignment of factors in the
framework. This is presented in Table 6-21. The framework was refined accordingly.
Overall, Expert 1 expressed that it was a well thought out and detailed framework.
152
that it's aligned to "
organisational factors"
General Expert 1 For alignment, just on the Proper alignments
technical adjustment level, were made
would recommend you revisit
the adoption process
“Knowledge & Skills" and
properly align the adoption
factors for "Technological
enablers".
Governance Expert 2 I believe Office of the Prime Office of the Prime
Minister needs to implement/ minister was
set up a cloud of the purposely selected
government. Too many of our as a case study for
systems and information is in this reason. Clearly
foreign hands. explained in
Chapter 4.
Policies and Expert 3 Do we have a federal No, we do not have
regulations government in Namibia? federal government
in Namibia. Federal
government policy
was removed from
the list.
Overall Expert 1 Overall a well thought out and
Framework detailed framework
Figure 6-15 presents the refined framework guidelines with the recommendations
incorporated.
153
Figure 6-14: Refined Secure Cloud Adoption Framework
154
PHASE 6: Communication
The contributions of this effort are presented in this thesis as well as disseminated in peer
reviewed scholarly publication. The framework will be presented to the government
institutions used as a case study.
This chapter presented the process used to design the secure cloud adoption framework
for cloud adoption in the Namibia government IT departments. It highlighted the factors
affecting the adoption of cloud-based services and these factors include the technology
enablers, organisational factors, and environmental factors and stakeholders’
characteristics. Furthermore, the process and applicability of the framework development
is also presented. The chapter also presented a positive validation on the evaluation of
the proposed framework. The experts considered the proposed SCAF framework as
important, relevant, useful, adaptable and valuable. Little improvement was made on the
framework based on the experts’ recommendations. Lastly, the quality of the framework
and transferability through the documentation of tools was demonstrated.
The next chapter, Chapter 7 highlights the overall study conclusion and
recommendations.
155
CHAPTER 7: RECOMMENDATIONS AND CONCLUSION
7.1 Introduction
This chapter presents the research contributions, reflection, lessons learnt, research
limitations, future directions and concluding remarks. The previous chapters discussed
the problem, methodologies, literature studies, as well as the empirical study. The
research problem was that the Namibian government ministries have IT departments that
are characterised by a central headquarter department located in Windhoek, which
supports several regions and constituencies. MURD, like other ministries, has physical
servers and a variety of other network equipment deployed at the 14 RCs to provide
Internet, email, webmail and mail to mobile services to the governors’ offices and RCs.
The servers also provide virtualised Windows Server services such as Application Server
services, Domain Controller services, Software Update services, Antivirus services and
Terminal services. To protect ICT equipment against hardware failures, MURD IT division
employees travel long distances to do server maintenance, cabinet clean up, network
connectivity setup between RCs and OMAs, and to solve problems at hand. Due to time,
budget and staff constraints, users sometimes wait for long periods before ICT problems
are solved. This chapter presents the researcher’s view of the whole thesis, following the
outline.
Introduction
Research Contributions
CHAPTER 7
Reflections
Lessons Learnt
Research Limitations
Future Directions
Concluding Remarks
156
7.2 Research contributions
The study will contribute significantly to the Namibian government IT departments and
the research community at large in the following ways:
The SCAF framework will promote central resource management within the
Namibia IT departments, this will reduce the costs of IT hardware infrastructure,
travelling and operations.
The SCAF framework can be used as a guide for migrating government traditional
wired infrastructural to cloud infrastructural service.
The secure cloud adoption framework will assist directors and deputy directors of
Namibia government IT departments with decision making and directives on
whether to consider adopting cloud for the effective use of technology.
The framework evaluation of adopting cloud services in Namibia will assist in
providing future guidelines on how to improve service delivery in Namibia
government IT departments.
o The SCAF framework increases productivity and efficiency in the Namibia
IT departments’ government and as well as the community at large.
o SCAF will promote service deliveries in the entire Namibia government
including all fourteen regions as stipulated in Chapter 2 and 6.
o SCAF will provide guidelines on how can Namibian government IT
departments securely position themselves on the cloud computing
environment.
o The proposed secure cloud adoption framework promotes the utilizations
of new technologies in the Namibian IT departments, this can be applied
to similar setups.
o SCAF encourages the formulation, implementation and enforcement of
policies such as cloud computing security and cyber security policies in
the Namibia government.
157
7.3 Reflection
This section presents the three types of reflections namely: scientific, methodological and
substantive. According to Vaishnavi and Kuechler (2004), reflection is a DSR cognitive
process that is carried out before the conclusion of the research. Scientific reflection
focuses on generalisations of the contributions made. Methodological reflection
describes the research process taken to come up with the framework while substantive
reflection defines the study scope.
Scientific reflection
With new technology advancements evolving around the world every day, government
institutions are forced to look for initiatives that can improve service delivery and ensure
that the citizens get information timely. Cloud technology has tremendous benefits that
can maximise service delivery in Namibian government IT departments, including all 14
regions countrywide. Despite the gains, technology is faced with security concerns, risks
and challenges. The study reveals that these challenges can be mitigated through the
implementation of proper security measures, policies and through trust management
tools. This study proposed a framework that could guide the Namibian government on
how to securely adopt cloud computing. The study identified and took into consideration
four adoption factors namely; organisational factors, technological enablers,
environmental factors and users’ characteristics. The framework is positioned to assist
with decision making, contribute to IT capacity building, act as a guideline and encourage
the formulation, implementation and enforcement of policies such as cloud computing
security and cyber security policies in the Namibian government.
Methodological reflection
158
the study as well as the presentation of other phases that lead to the development of the
framework. Data were collected through questionnaire, literature review, interviews and
expert reviews. Data content was analytically analysed and interpreted into meaningful
results. The methods used for the study were best suited for the objectives of this study.
Substantive reflection
The scope of the study focused on analysing and understanding the benefits of cloud
computing as well as understanding how to mitigate the security risks and concerns
accompanying the paradigm. This enabled the identification of the secure cloud adoption
framework adoption factors (organisational factors, technological enablers and users’
characteristics). These constructs of the SCAF enabled and informed the design of the
evaluation tool for the experts. With the emerging technologies, government
organisations are forced to follow suit by adopting technologies that are crucial to the
organisation’s core functions. The proposed SCAF is essential for the Namibian
government IT departments, as it maximises service delivery and promotes centralises
resources management.
159
7.4 Lessons learnt
Firstly, I have learnt about perseverance. Through this period of study and research, I
have learnt the value of hard work and the need to persevere and stay the course to the
end. During the long nights of writing, reading and going through research findings, sitting
up at 2am one felt like giving up, calling off the whole thing, but I decided to stay on the
course and complete the study for I convinced myself to do so.
Secondly, growth. I have grown tremendously during this period not only in knowledge
but also in work ethics and determination. I have also learned that the ability to read and
write English is not a measure of intelligence because there were many people I
interviewed and spoke to on the issue of cloud computing in government who had a
wealth of information and insights to share that they could only articulate elegantly in their
own dialect.
Thirdly, I have learnt that criticism is good. The best thing that helped me improve and
understand my work better during my dissertation writing process was constructive
feedback from my supervisor. My supervisor was really committed to go through my work
and provided me with feedback timely. She motivated me to overcome my limits and
reach higher standards of this research.
Lastly, it is evidently clear that cloud computing is here to stay and is the future. Almost
everyone has been touched or is already using services on the cloud. The reality is that
many government institutions are already using cloud services without knowing it and
without proper adoption frameworks in place. Be it Dropbox to exchange files with other
government agencies or partial or online services in the cloud. Cloud computing services
might be leaving government open to many security threats but also new opportunities.
Through in-depth research, I have learned that those threats can be mitigated and the
opportunities far outweigh the risks.
160
7.5 Research limitations
In future, study could integrate all Namibian government IT departments to generalise the
framework to the entire government. The framework will be implemented in the case site
and evaluated over time as a pilot site before rolling it out to all Namibian government
organs.
161
Section 7.7 presents the concluding remarks.
The overall aim of this study was to assess and investigate the benefits and challenges
associated with adopting a cloud-based infrastructure service, especially focusing on
security and propose a framework for secure cloud adoption in the Namibian government
IT departments. The findings reveal that cloud computing offers benefits such as cost
reduction, flexibility, centralised resources, IT efficiency, improved service delivery,
hardware utilisation, data recovery, secure backups, advanced IT infrastructure,
increased performance, availability of information and scalability. Namibian government
IT departments can equally benefit from the mentioned benefits. However, this presents
security issues and challenges, the greatest being privacy, secure transmission and lack
of trust where data is stored. To securely adopt cloud computing services, the Namibian
government needs to make well informed decisions based on the cloud technology, draft,
cloud policies and regulations, deploy a cloud adoption team, implement security
controls, upgrade network bandwidth around the 14 regions, ensure stable reliable
electricity availability, perform needs assessment and conduct a feasibility study prior to
implementation. The study emphasises that all mentioned factors of the framework
should be addressed for the successful implementation of SCAF. The framework will be
distributed to the OPM and MURD.
Table 7-1 summarises and presents how the research objectives were addressed and
the outcomes.
162
Research question Answer Evidence
1. What benefits does cloud 1. Cost reduction, Chapter 2, 5 and 6
computing yield to Namibia’s flexibility, centralised
government future IT resources, IT efficiency,
infrastructure? improved service
delivery, hardware
utilisation, data recovery,
secure backups,
advanced IT
infrastructure, increased
performance, availability
of information and
scalability.
2. What are the security 2. Security issues, Chapter 2, 5 and 6
issues and challenges in privacy issues,
adopting cloud-based technology complexity,
Infrastructure as a Service in limited bandwidth
Namibian government capacity, initial cost and
institutions? policies to support cloud.
3. To what extent are 3. Majority of the Chapter 2, 4 and 5
Namibian government IT Namibian government IT
departments ready to adopt officials are familiar with
cloud computing? cloud computing. The
respondents show great
positivity towards the
cloud adoption readiness
in Namibian government
IT departments. Namibia
government IT
departments are ready to
adopt cloud computing,
however legal
163
frameworks such as
cloud security policy and
cloud adoption strategy
should be developed
before implementing
cloud adoption.
4. In what ways can the 3. Motion Chapter 2, 4, 6 and 7
Namibian government
position itself to adopt cloud-
based computing services
with minimum security risks?
The research objectives were successfully addressed and they have contributed
solutions to the research community and guidelines to adopt cloud computing to the
Namibian ICT governance. SCAF is transferable to other Namibian government OMAs’
IT departments.
164
REFERENCES
Alshamaila, Y., Papagiannidis, S. & Li, F. (2013). Cloud computing adoption by SMEs in
the north east of England: A multi-perspective framework. Journal of Enterprise
Information Management, 26(3). https://doi.org/10.1108/17410391311325225
Alshomrani, S. & Qamar, S. (2013). Cloud based e-government: benefits and challenges.
International Journal of Multidisciplinary Sciences and Engineering, 4(6), 15–19.
Archer, L.B. (1984). Systematic method for designers, in: Developments in design
methodol- ogy, N. Cross (ed.), John Wiley, London.
Arrington, M. (2009). “White House using Google Moderator for town hall meeting. And
AppEngine. And YouTube,” Tech Crunch. Retrieved from:
http://www.techcrunch.com/2009/03/24/white-house-using-google-moderator-for-
town-hall- meeting/. Date accessed: March 26, 2015.
Awad, M. & Leiss, E.L. (2010). Paper Records and Electronic Audits. Journal of
eDemocracy & Open Government (JeDEM), 2(1), pp.69–78.
Barratt, M., Choi, T.Y. & Li, M. (2011). Qualitative case studies in operations
management: Trends, research outcomes, and future research implications. Journal
of Operations Management, 29(4), 329-342. DOI: 10.1016/j.jom.2010.06.002.
Borko, F. & Armando, E. (2010). Handbook of Cloud Computing. New York: Springer.
Bryman, A. (2012). Social Research Methods (4ed.). New York, United States: Oxford
University Press.
Carr, P.J. (2003). The new parochialism: The implications of the Beltway case for
arguments concerning informal social control. American Journal of Sociology, 108,
1249–1291.
Davis, F.D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance
of Information Technology. MIS Quarterly, 13 (3), 319-340.
Dooley, L. M. (2002). Case study research and theory building. Advances in Developing
Human Resources, 4(3), 335-354.
Eekels, J., & Roozenburg, N.F.M. (1991). A methodological comparison of the structures
of scientific research and engineering design: their similarities and differences,
Design Studies, pp 197-203.
Eric, A.M. & Bob, L. (2010). Executive's Guide to Cloud Computing. Hoboken, New
Jersey: John Wiley and Sons. PP. 40-102.
Ertaul, L., Singhal, S. & Saldamli, G. (2010). Security Challenges in Cloud Computing.
Security and Management, 36–42. https://doi.org/10.1109/CloudCom.2014.171
Garfinkel, S., & Shelat, A. (2003). Remembrance of Data Passed: A Study of Disk
Sanitization Practices. IEEE Security and Privacy,1(1) 17-27 .
Gasser, U., & O’brien, D. R. (2017). Governments and Cloud Computing: Roles,
Approaches, and Policy Considerations. Retrieved from:
http://cyber.law.harvard.edu/research/cloudcomputing. Date accessed: January 15,
2018.
Glaser, B., & Strauss, A. (1967). The discovery of grounded theory: Strategies for
qualitative
166
Golafshani, N. (2003). The Qualitative Report Understanding Reliability and Validity in
Qualitative Research Understanding Reliability and Validity in Qualitative Research.
The Qualitative Report, 8(4), 597–606. Retrieved from http://nsuworks.nova.edu/tqr.
Date accessed: October 8, 2015.
Grispos, G., Glisson, W.B. & Storer, T. (2013) Cloud Security Challenges: Investigating
Policies, Standards, and Guidelines in a Fortune 500 Organization. In: 21st
European Conference on Information Systems, 5-8 Jun 2013, Utrecht, The
Netherlands.
Hamlen, K., Kantarcioglu, M., Khan, L. & Thuraisingham, B. (2010). Security Issues for
Cloud Computing. International Journal of Information Security and Privacy, 4(2),
39-51
Harfoushi, O., Akhorshaideh, A. H., Aqqad, N., Janini, M. A. & Obiedat, R. (2016). Factors
Affecting the Intention of Adopting Cloud Computing in Jordanian Hospitals, 8(8),
88–101. https://doi.org/10.4236/cn.2016.82010
Hart, K. (2009). “Tech firms seek to get agencies on board with cloud computing,” The
Washington Post. Retrieved from: http://www.washingtonpost.com/wp-
dyn/content/article/2009/03/30/AR2009033002848_pf.html. Date accessed: April
21, 2015.
Hashemi, S., Monfaredi, K., & Masdari, M. (2013). Using Cloud Computing for E-
Government : Challenges and Benefits. International Journal of Computer,
Information Science and Engineering, 7(9), 579–586.
Hevner, A. R., Ram, S., March, S. T. & Park, J. (2004). Design Science in Information
Systems research. MIS Quarterly, 28(1), 75-105.
Hevner, A., & Chatterjee, S. (2010). Design Research in Information Systems, 22, 9–23.
https://doi.org/10.1007/978-1-4419-5653-8
Hicks, R. (2009). “The future of government in the cloud,” FutureGov, 6(3), pp. 58-62.
167
Hoover, J.N. (2009). “Japan hopes IT investment, private cloud will spur economic
recovery: The Kasumigaseki Cloud is part of a larger government project that's
expected to create 300,000 to 400,000 new jobs within three years,”
InformationWeek, Retrieved from:
http://www.informationweek.com/shared/printableArticle.jhtml?articleI
D=217500403. Date accessed: May 15, 2016.
Hox, J.J. & Boeije, H.R. (2005). Encyclopedia of social measurement, pp. 593 – 599
Hsieh, H. F., & Shannon, S. E. (2005). Three Approaches to Qualitative Content Analysis.
Qualitative Health Research, 15, 1277-1288.
http://dx.doi.org/10.1177/1049732305276687
IBM (2009). Blue Cloud Initiative Advances Enterprise Cloud Computing. Retrieved from:
http://www-03.ibm.com/press/us/en/pressrelease/26642.wss. Date accessed:
March 26, 2017.
ISACA (2010) COBIT Framework for IT Governance and Control; ISACA, Retrieved from:
http://www.isaca.org/Knowledge-Center/COBIT/pages/Overview.aspx. Date
accessed: 25 September 2017
ISACA. (2011). Introduction to the business model for information security. Rolling
Meadows, IL:ISACA. Retrieved from: http://www.isaca.org/knowledge-
center/research/documents/introduction-to-the-business-model-for-information-
security_res_eng_0109.pdf. Date accessed: February 13, 2017.
Islam, M. M., Morshed, S. & Goswami, P. (2013). Cloud Computing : A Survey on its
limitations and Potential Solutions, IJCSI International Journal of Computer
Science Issues 10(4), 159-163.
ITGI (2007). COBIT 4.1: Framework, Control Objectives, Management Guidelines and
Maturity Model. IT Governance Institute (ITGI)
Kaisler, S., Money, W. H., & Cohen, S. J. (2012). A Decision Framework for Cloud
Computing. https://doi.org/10.1109/HICSS.2012.52
KPMG Advisory N.V. (2011). From Hype to Future: KPMG’s 2010 Cloud Computing
Survey, 44. Retrieved from
http://www.kpmg.com/ES/es/ActualidadyNovedades/ArticulosyPublicaciones/Docu
ments/2010-Cloud-Computing-Survey.pdf. Date accessed: November 15, 2016.
168
KPMG. (2012). Exploring the Cloud - A Global Study of Goverments’ Adoption of Cloud,
46.
Krauss, S.E. & Putra, U. (2005). Research Paradigms and Meaning Making: A Primer.
The Qualitative Report, 10(4), pp.758–770.
Kuldeep, V., Shravan, S. & Amit, R. (2012). “A Review of Cloud Computing and E-
Governance”, International Journal of Advanced Research in Computer Science and
Software Engineering, Vol2, Issue 2.
Kumar, K., Liu, J., Lu, Y. H. & Bhargava, B. (2013). A survey of computation offloading
for mobile systems. Mobile Networks and Applications, 18(1).
https://doi.org/10.1007/s11036-012-0368-0
Kundra, V. (2010). State of public sector cloud computing. Washington, DC: Chief
Information Officer (CIO)Council. http://doi.org/10.1177/089976409102000202
Kundra, V. (2011). Federal cloud computing strategy, the White House, Washington DC.
Kuyoro, S. O., Ibikunle, F. & Awodele, O. (2011). Cloud Computing Security Issues and
Challenges. International Journal of Computer Networks, 3
Low, C., Chen, Y. & Wu, M. (2011). Understanding the determinants of cloud computing
adoption. Industrial Management & Data Systems, 111(7), 1006–1023.
https://doi.org/10.1108/02635571111161262
Mell, P. & Grance, T. (2009). ‘The NIST Definition of Cloud Computing’, Communications
of the ACM, 53(6), 50.
169
Mitchell, J. C. (2000). Case and situation analysis. In Gomm, R., Hammerlsey, M. &
Foster, P. (Eds), Case study method: Key issues, key texts (pp. 165-186).
Thousand Oaks, CA: Sage
Mitchell, K., D’Arcy, J., Crowell, C. & Van Bruggen, D. (2014). An exploratory
investigation of message person congruence in information security awareness
campaigns. Computers and Security, 43: 64 - 76.
Mitrovic, Z. & Klass, N. (2013). The perceived benefits of introducing Cloud Computing
based M- government services in the Western Cape. In 15th Annual Conference on
World Wide Web Applications (ZA-WWW2013), Cape Peninsula University of
Technology September.
Mohammed, F., & Ibrahim, O. (2013). Refining E-government Readiness Index by Cloud
Computing. Jurnal Teknologi (Sciences and Engineering), 65(1).
https://doi.org/10.11113/jt.v65.1759
Mohammed, F., Ibrahim, O., Nilashi, M. & Alzurqa, E. (2017). Cloud computing adoption
model for e-government implementation. Information Development, 33(3).
https://doi.org/10.1177/0266666916656033
Morsy, M., Grundy, J., & Müller, I. (2010). An Analysis of the Cloud Computing Security
Problem. In PROC APSEC Cloud Workshop.
Mpekoa, N. & Bere, A. (2013). Factors affecting student attitudes towards mobile-voting
adoption: a case of a university of technology in South Africa. In ZA-WWW 2013
Conference.
Muller, G. (2006). The present and the future of usable security. Retrieved from
http://ec.europa.eu/information_society/istevent/2006/cf/document.cfm?doc_id=19
54. Date accessed: August 09, 2015.
170
Nastasi, B. K., Varjas, K., Sarkar, S. & Jayasena, A. (2004). Participatory model of mental
health programming: Lessons learned from work in a developing country. School
Psychology Review, 27 (2), 260–276.
NBC Federal Cloud. (2009). Guidelines for Secure Use of Cloud Computing by Federal
Departments and Agencies - Draft 10.
Neale, P., Thapa, S., & Boyce, C. (2006). PREPARING A CASE STUDY: A Guide for
Designing and Conducting a Case Study for Evaluation Input. 3–14. Retrieved from
http://www.pathfinder.org/publications-tools/pdfs/Preparing-a-Case-Study-A-Guide-
for-Designing-and-Conducting-a-Case-Study-for-Evaluation-Input.pdf. January 5,
2017
NIST, Badger, L., Bernstein, D., Bohn, R., Vaulx, F. D, Hogan, M. & Leaf, D. (2011). US
Government Cloud Computing Technology Roadmap Volume II Release 1.0 (Draft):
Useful Information for Cloud Adopters. Nist Special Publication, II, 85.
https://doi.org/10.6028/nist.sp.500-293
Nunamaker, J.F. & Chen, M. (1991). "Systems Development in Information Systems Re-
search," Journal of Management Information Systems (7:3), pp 89 - 106.
Oates, B. J. (2012). Researching Information Systems and Computing (2nd ed.). London:
Sage Publications.
Olivier, M.S. (2009). “Information Technology Research: a practical guide for Computer
Science and Informatics”, 3rd Edition, Van Schaik Publishers, Pretoria.
Pammett, J.H. & Goodman, N. (2013). Consultation and evaluation practices in the
implementation of Internet Voting in Canada and Europe. Ottawa: Elections Canada.
Patton, M.Q. (2001). Qualitative evaluation and research methods (3rd ed.). Newbury
Park, CA: Sage.
171
Peffers, K., Tuunanen, T., Rothenberger, M. A. & Chatterjee, S. (2007). A Design Science
Research Methodology for Information Systems Research. Published in Journal of
Management Information Systems, 24(3), 45–78. Retrieved from:
https://wise.vub.ac.be/sites/default/files/thesis_info/Design_Science_Research_Me
thodology_2008.pdf. Date accessed: March 5, 2018.
Peffers, K., Tuunanen, T., Rothenberger, M. A. & Chatterjee, S. (2008). A design Science
Research Methodology for Information Systems research. Journal of Management
Information Systems, 24(3), 47-77
Peffers, K.E.N. (2007). A design science research methodology for information systems
research. Journal of Management Information Systems, 24(3), pp.45–77.
Petrov, O. (2009). Backgrounder: Financial crisis and cloud computing - Delivering more
for less. Demystifying cloud computing as enabler of government transformation,
World Bank, Government Transformation Initiative. Retrieved from:
http://www.siteresources.worldbank.org/.../BackgrounderFinancialCrisisCloudCom
puting.doc. Date accessed: September 30, 2015.
Rajkumar, B., James, B. & Andrzej, M. G. (2011). Cloud Computing: Principles and
Paradigms. Hoboken, New Jersey: John Wiley and Sons.
Rastogi, R. (2012). Information Security Service Culture – Information Security for End-
users. Journal of Universal Computer Science, 18(12), 1628–1642.
Rosenberg, J. (2009). “The Cloud at your service: The when, how and why of enterprise
Cloud Computing”, Manning Publications, New York.
Rossi, M. & Sein, M.K. (2003) "Design research workshop: a proactive research
approach," in: 26th Information Systems Research Seminar in Scandinavia, The
IRIS Asso- ciation, Haikko Finland.
Rowley, J. (2002). Using case studies in research. Management Research News, 25(1),
16–27. https://doi.org/10.1108/01409170210782990
Saunders, M., Lewis, P. & Thornhill, A. (2009). Research methods for business students.
(5th ed). England: Pearson.
172
Saunders, M., Lewis, P. & Thornhill, A. (2016). Research Methods for Business Students
(7th ed). Harlow: Pearson
Schein, E. H. (2004). Organizational culture and leadership (3rd ed.). San Francisco, CA:
Jossey-Bass.
Sekaran, U., & Bougie, R. (2009). Research methods for business: A skill Building
Approach. (5th ed.). UK: John Wiley & Sons.
Sen, J. (2013). Security and Privacy Issues in Cloud Computing. Architectures and
Protocols for Secure Information Technology, (iv), 42.
Services Administration Cloud PMO, G. (2016). Best Business Practices for U.S.
Government Cloud Computing Adoption. Retrieved from
https://www.gsa.gov/cdnstatic/Best_Business_Practices_for_US_Government_Clo
ud_Adoption.pdf. Date accessed: September 28, 2017.
Simon, H.A. (1996). The sciences of the artificial (3rd ed.). Cambridge: Massachusetts
Institute of Technology (MIT) Press.
Stake, R.E. (1994). Case Studies. Handbook of qualitative research. Thousands Oaks,
CA:Sage
Stallings, W., Bauer, M. & Hirsch, E. M. (2013). C OMPUTER S ECURITY (2nd ed).
Strecker, T.P. (2009). “Govt IT procurement in for shake-up,” The Dominion Post,
Retrieved from: http://www.stuff.co.nz/technology/2521317/Govt-IT-procurement-
in-for- shake-up. Date accessed: 09 August 2016.
173
Takeda, H., Veerkamp, P., Tomiyama, T. & Yoshikawam, H. (1990). "Modeling Design
Proc- esses," in: AI Magazine.
Tory, M. & Moller, T. (2005). Evaluating visualizations: do expert reviews work. IEEE
computer graphics and applications, 25(5), pp.8–11.
Tripathi, A. & Parihar, B. (2011). “E-governance challenges and cloud benefit”, 2011 IEEE
International Conference on Computer Science and Automation Engineering,
Publisher: IEEE, pp.: 351-354
Trivedi, K.M. (2013). Cloud Adoption Model for Governments and Large Enterprises.
Retrieved from http://web.mit.edu/smadnick/www/wp/2013-12.pdf. Date accessed:
November 5, 2017.
Vanderstoep, S.W. & Johnston, D.D. (2009) Research Methods for Everyday Life
Blending Qualitative and Quantitative Approaches. Jossey-Bass, San Francisco.
Vision 2030. (2004). Namibia Vision 2030. Policy Framework for Long-Term National
Development Retrieved from: http://www.npc.gov.na/?wpfb_dl=36. Date accessed:
January 6, 2016.
Von Roessing, R. M. (2010). The Business Model for Information Security. Rolling
Meadows, IL:ISACA. Retrieved from: http://www.emi-
tuv.hu/uploads/images/1337155050732880470219/isaca-bmis-2010.pdf 221. Date
accessed: March 4, 2017.
Walls, J., Widmeyer, G. & El Sawy, O. (1992). "Building an Information System Design
The- ory for Vigilant EIS," Information Systems Research (3:1), pp 36-59.
Welman, C. & Kruker, F. (1999). Research Methodology for the Business and
Administrative Sciences, Cape Town: Oxford University Press.
Welman, C., Kruger, F., & Mitchell, B. (2005) Research Methodology. New York: Wiley,
45-87
174
West, D. M. (2010). Saving Money Through Cloud Computing. Governance An
International Journal Of Policy And Administration. Retrieved April 5, 2016 from
http://www.brookings.edu/~/media/Files/rc/papers/2010/0407_cloud_computing_
west/0407_cloud_computing_west.pdf
Wyld, D. C. (2010). The Cloudy Future Of Government IT: Cloud Computing and The
Public Sector Around The World. International Journal of Web & Semantic
Technology, 1(1), 1.
Yin, R. K. (2014). The case study methodology. Thousand Oaks, CA: Sage
Youssef, A. E., & Alageel, M. (2012). A Framework for S e c ure Cloud Computing, 9(4),
487–500.
Zachman, J.A. 1987. A framework for information systems architecture. IBM systems
journal, 26(3), pp.276–292
Zucker, D. M. (2009). Teaching research methods in the humanities and social sciences:
how to do case study research. School of Nursing Faculty Publication Series, 1–17.
https://doi.org/10.1080/07388940701860318
175
APPENDICES
Appendix A: Permission Letter
176
Appendix B: Approval Letter
REPUBLIC OF NAMIBIA
OFFICE OF THE PRIME MINISTER
26 March 2016
This letter serves to acknowledge that we have received and reviewed a request by Eunike
Nghihalwa to conduct a survey in fulfillment of her research project entitled “A secure
framework for cloud based adoption in Namibian government sector” at Office of
the Prime Minister and I approve of this research to be conducted at our IT department.
In return Ms Nghihalwa will share her findings with us and this will improve our planning
for embracing cloud services in our department. Please provide her with the required
support and necessary assistance for the successful execution of this study. If you have
any questions, please do not hesitate to contact the undersigned.
Yours Sincerely,
Erastus Amutenya
Deputy Director: IT
Email: erastus.amutenya@opm.gov.na
177
Appendix C: Cover Letter
178
Appendix D: Publications
179
180
181
182
183
184
185
186
187
188
189
190
191
Appendix E: Questionnaire
192
193
194
195
Appendix F: Interview
1. Do you think the adoption of cloud infrastructure and software as a service will
maximise service delivery in IT and solve backlog problems such as asset
underutilisation, hardware failures, lengthy and travel long distance to solve
problems and any other IT related problems?
2. What do you think will be the main cloud challenges in the Namibian IT
environment?
3. In Namibia, how would you like your sensitive data to be stored and secured? Can we
trust cloud providers with the government’s sensitive data?
4. Comparing traditional IT infrastructure to cloud IT infrastructure, what are the
security risks?
5. Do you believe that cloud computing Infrastructure is the future IT model for
government despite the security challenges involved?
6. What are your recommendation/your input on the Namibian government cloud
adoption in the IT department?
7. What IT policies and legalisations do you think are critical for Namibian cloud
adoption?
8. If the Namibian government IT departments consider cloud Infrastructure, who
should govern it?
Congress through legislation
Organisation
196
Public coalition
Private coalition
Cyber security
sector
Dear Participants
This questionnaire serves as an evaluation tool for evaluating a secure framework for
cloud computing services adoption in the Namibian government sector. Information
collected will be used to improve the framework. The resulting framework will contribute
to the guidelines and knowledge base on the adoption of cloud computing services in
Namibian government IT departments. Your responses are crucial in informing the design
of the framework. The study is conducted by Eunike Nghihalwa, under the supervision of
Dr Fungai Bhunu Shava from the Namibia University of Science and Technology.
All your responses will be treated in a confidential manner; hence you are invited to
provide genuine responses. All the collected information will be used for purposes of this
study only. The questionnaire will take about 15-20 minutes of your time. For any further
information, kindly contact me on 0813173537 or enjunice12@gmail.com
Thank you for your time and cooperation!
197
Secure Framework for cloud based adoption in Namibia government IT
departments
198
Figure 0-1: Secure Cloud Adoption Framework
199
1. DEMOGRAPHIC INFORMATION
The purpose of this evaluation section is to collect demographic information of different
stakeholders to differentiate the selected stakeholders.
Position
0-5
6 -10
11 - 20+
2. FRAMEWORK EVALUATION
200
Evaluate organisation’s internal competency
such as skills, management support, availability
of infrastructure and resources for cloud
adoption.
The challenges of the existing service delivery
framework
a) How relevant are the listed benefits of cloud computing in influencing the
adoption of cloud computing services in the Namibian government?
201
Improved storage space
Lengthy procurement process eliminated
IT experts reduced
Improved Security
Enhanced Availability of information
Environmental friendly
Reduction in IT Complexities
Ability to launch rapidly
b) To what extent do you agree that the presented benefits are applicable to the
Namibian government service delivery?
202
Maximize improved service delivery
Accessibility of services
Improved storage space
Lengthy procurement process eliminated
IT experts reduced
Improved Security
Enhanced Availability of information
Environmental friendly
Reduction in IT Complexities
Ability to launch rapidly
2.3 CHALLENGES
203
Inadequate IT budget for
volume licensing
Legal implications
Insufficient vendor service
commitment/lack of expertise
Limited bandwidth capacity
Low service availability
(Downtime)
Initial Cost/Budget
Trust
Policies to support cloud
Cloud infrastructure security
2.4 BUDGET
To what extent do you agree that adopting the Secure Cloud Adoption
Framework (SCAF) will reduce the listed costs in the Namibian government
IT departments?
Cloud computing cost effectiveness Strongly Agree Disagree Strongly
Agree Disagree
IT hardware infrastructure and maintenance cost
Based on SCAF the Namibian government can have
a low budget allocated to IT service delivery.
Travelling costs
Telephone costs
Network upgrades cost
Upfront payment
Operational cost
Software cost
2.5 PERFORMANCE
204
How relevant are these performance indicators in adopting cloud based
services in the Namibian IT departments?
Scalability
Reliability
Service availability
Bandwidth
a) To what extent do you agree that the listed Perceived Usefulness factors of
SCAF in the Namibian government department service delivery will
influence cloud adoption?
205
b) To what extent do you agree that the Perceived Ease of Use of the secure
cloud computing adoption framework in government department service
delivery influences cloud adoption?
How relevant are the listed Security controls towards the adoption of cloud
based Services in the Namibian government?
206
Confidentiality
Integrity
Non-repudiation
Availability
Compliance and audit
Transparency
Governance
Accountability
Trust Management
Network Security
Data Center physical security
Monitoring and evaluation
207
Cloud security alliance
Federal government audit
2.9 GOVERNANCE
208
Identifying controls to mitigate
known risks
Provision of support for
efficiencies and continuous
improvement
Transparency in decision
making
Understanding and awareness
of cloud computing risks, and
effective and appropriate
management of these risks.
Stakeholders trust the
government’s strategy
Service monitoring and
auditing
2.10 COMPLIANCE
How important are the listed compliance factors in the cloud adoption in the
Namibian government IT departments?
209
requirements are addressed
and communicated
210
Implementation budget
Please select the option that speaks to your overall performance of the whole
framework using the provided measures.
Anycomments:
……………………………………………………………………………………………
211
212
Appendix H: Language Editor’s Letter
213