<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Cloud-Based Business Continuity Framework for Universities.</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sofie Muthoni</string-name>
          <email>sofiemuthoni@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Geoffrey Chemwa</string-name>
          <email>chemwex@icsit.jkuat.ac.ke</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>George Okeyo</string-name>
          <email>george.okeyo@dmu.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computing, Jomo Kenyatta University of, Agriculture and Technology</institution>
          ,
          <addr-line>Nairobi</addr-line>
          ,
          <country country="KE">Kenya</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Computer Science and</institution>
          ,
          <addr-line>Informatics</addr-line>
          ,
          <institution>De Montfort University</institution>
          ,
          <addr-line>Leicester</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <abstract>
        <p>- Adopting cloud computing as a strategy for business continuity rather than building expensive secondary backup sites is taking center stage in modern organizations. These organizations leverage the pay-as-you-go and pay-forwhat-you-use models to minimize expensive investments on licenses, storage and infrastructure. However, universities in Kenya, Africa and the developing world still find it difficult to adopt this strategy due to contextual constraints and challenges. The purpose of this paper is to introspect cloud computing for business continuity frameworks from literature, and identify existing challenges that hinder their adoption in Kenyan universities. These challenges include lack of expertise, connectivity challenges, communication costs, legal and regulatory issues, culture, security, optimization, support and maintenance, possible loss of access to data, database location and effective integration with existing systems. A comparative survey of three Kenyan universities' business continuity plans was done to contextualize the study. Finally, a context sensitive business continuity conceptual framework based on cloud computing and the people, process and technology frameworks is proposed.</p>
      </abstract>
      <kwd-group>
        <kwd>cloud computing</kwd>
        <kwd>business continuity</kwd>
        <kwd>framework</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Universities in developing countries face socio-economic
and political challenges that limit their capacity to invest in
expensive information communications technology (ICT)
systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. On the flipside, just like other leading universities
in the world, they have a growing demand for different
information technology (IT) services to support critical
operations like teaching, research, estates management and
finance [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] both during normal and crisis periods. Perhaps,
nothing illustrates the need for proper continuity planning
better than the recent outbreak of Covid-19 which effectively
brought operations of nearly all universities in Kenya to a
standstill. Of the seventy-four (74) universities and constituent
colleges, less than five (5) continued some form of teaching
operations using an assorted array of online tools targeting
oncampus students that were now forced to stay home. Teaching
staff are ill equipped to work on digital platforms with most of
them still using teaching content developed on paper. A few
have digitized their content in form of presentations held on
personal computers. Only two universities (United States
International University (USIU) and Mt. Kenya University)
seemed to transit seamlessly to online teaching due to their
better preparedness in terms of hosting most of their teaching
content on digital platforms. These figures amplify the great
need for Kenyan universities to urgently consider adopting
cloud computing for daily and business continuity (BC)
purposes. The cloud platform offers clear benefits for
educational institutions such as flexibility, agility, scalability,
availability, cost-effective utility computing, elasticity,
extensibility, collaboration flexibility, improved disaster
recovery and back-up capabilities [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Despite these
benefits universities in developing countries are still reluctant
to deploy their business to the cloud because of challenges
such as lack of awareness and support from top management,
difficulties in integration with existing systems, perceived
loss of control, vendor lock-in, security issues, privacy and
business data confidentiality, government telecommunication
infrastructure policies, lack of relevant skills , reliability and
availability issues, and poor internet connectivity, low speed
and high communication costs per megabyte of data [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
This study done on three Kenyan universities revealed that
79% of the respondents appreciates the importance of business
continuity , but still rely on traditional methods of data backup
and archiving paper records. The study also reveals that 40.7%
have replicated their servers for business continuity on safe
sites a strategy which is ideally costly, complex and frequently
does not meet recovery objectives while these are actually the
advantages of using cloud infrastructure to simplify recovery
[6]. Enterprises should invest in cloud computing over buying
resources for an offsite location since cloud computing allows
pay-per use model which significantly reduces operational
cost [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ]. Moreover, in case of a contingency, cloud based
recovery is faster and reliable than traditional recovery
techniques. A search through literature indicates that pitching
BC on cloud computing solutions is not something new.
However, there are many challenges and or constraints which
face Kenyan universities when planning to implement such
strategies. Existing literature, which identifies and analyses
the challenges for the cloud-based context, mostly consider
security and privacy perspectives [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ]. Limited literature
considers a systematic procedure for assessing and managing
challenges and making users aware of the issues that need
adequate attention before considering the adoption of a cloud
for business continuity strategy. This paper examines the
constraints faced by Kenyan universities before, during and
after cloud adoption for business continuity. The study further
proposes a framework that supports (i) consideration of people
aspect; (ii) systematic process for assessing and managing
process challenges; (iii) technology challenges that will
prepare deployment and support planning for organizational
BC using cloud computing.
      </p>
    </sec>
    <sec id="sec-2">
      <title>II. LITERATURE REVIEW</title>
      <sec id="sec-2-1">
        <title>A. Cloud Business Continuity Framework</title>
        <p>
          Business Continuity Planning (BCP) is the careful laying
down of strategies and protocols designed to ensure that the
business can continue to operate even during a disruptive
event or disaster [9]. The plan ensures that business operations
and services continue before, during, and after disruptive
events. Closely related is Disaster recovery (DR) which
encompasses a set of processes, policies and procedures that
maintain the availability of data and applications in case
critical IT infrastructure like servers and data centers are
disrupted or damaged [
          <xref ref-type="bibr" rid="ref9">10</xref>
          ]. DR focuses on making sure the IT
infrastructure is restored to operation as quickly as possible
after a disaster. Ochara [
          <xref ref-type="bibr" rid="ref10">11</xref>
          ] proposed the fit-viability model
(FVM) as the framework for cloud based business continuity
management (BCM) targeting container terminals in South
Africa. This model captured in Figure 1 was first proposed by
[
          <xref ref-type="bibr" rid="ref11">12</xref>
          ] in 2001 for evaluating organizational adoption of internet
initiatives.
        </p>
        <p>
          Fig 1: Fit-Viability model
Ochara [
          <xref ref-type="bibr" rid="ref10">11</xref>
          ] argues that organizational resilience can be
achieved through cloud based BC planning if the digitized
BCM architecture fits the cloud computing model; and if the
cloud computing model is a viable model that can contribute
to managing complexity in the business organization’s units
which usually have differentiated size, structure and ICT
investment levels. The architecture addresses the gaps on
cloud’s viability and proposes several factors based on the
constructs of: Technology readiness (Robustness, Scalability,
Server Configuration Management, Virtualization),
Economic Viability (Delivery, price, Quality), Organizational
viability (Smart BCM) [
          <xref ref-type="bibr" rid="ref10">11</xref>
          ]. The model however, misses out
on the peoples’ aspect such as management support and
expertise, government policies, legal framework and
integration. Tariq et al [
          <xref ref-type="bibr" rid="ref11">12</xref>
          ]. evaluated factors that influence
cloud adoption in institutions of higher learning and
developed a model with five contexts (Security, Technical,
Organizational Challenges, Environmental and External
Pressure and Advantages). They then connected them with
cloud adoption issues [
          <xref ref-type="bibr" rid="ref12">13</xref>
          ]. This framework too fails to
address cloud adoption for business continuity challenges
such as possible loss of control over data, and integration
challenges with existing systems and infrastructure. In order
to ensure a successful cloud based business continuity
management plan, Hiran et al. [
          <xref ref-type="bibr" rid="ref13">14</xref>
          ] proposes a model with five
key elements: Discovery and Plan, Control and Automation,
Management, Replication, and Networking. The model fails
to address organizational challenges, Service level agreement
(SLA), government policies and regulations and possible loss
of data in case of contract lapse. Al-shammari [
          <xref ref-type="bibr" rid="ref14">15</xref>
          ] introduces
a disaster recovery plan for database services based on
multicloud environment consisting of two components: database
recovery in multi-cloud and maintaining business continuity.
The framework focuses on minimizing the cost with respect
to Recovery Time Objective (RTO) and Recovery Point
Objective (RPO) at the same time ensure high availability,
reliability and ensure continuity for business before, during
and after the disaster incident. Education institutions should
be encouraged to adopt cloud for technology-based teaching
and learning to improve and overcome their operational and
academic challenges. The Hybrid EduCloud framework is
based on Ethiopian higher education , which is one of the
subSaharan African country. EduCloud has five implementation
strategies: Cloud based learning strategy (awareness seminars,
training with service providers), Evaluate higher education
needs for adoption of cloud (Infrastructure, usage, data for
migration), Experimenting cloud applications, selection of
cloud provider (service delivery and deployment model),
Implementation and maintenance of cloud [
          <xref ref-type="bibr" rid="ref15">16</xref>
          ]. The
EduCloud model focusses on cloud adoption in Universities
in sub Saharan Africa a case of Ethiopia. The model cannot be
used for business continuity purposes since it misses out on
integration. Government policies are not addressed before the
migration to cloud.
        </p>
        <p>
          Google [
          <xref ref-type="bibr" rid="ref16">17</xref>
          ] too has developed cloud computing adoption
framework based on the people, process and technology
model. The framework identifies four themes (Learn, Lead,
Scale, Secure) and the practices in each theme fall into three
phases (tactical, strategic, transformational) through which
cloud adoption maturity can be assessed to come up with the
baseline situation before embarking on the adoption process.
One strong point with Google is its strong foundation on the
people, process and technology aspect which the proposed
framework is also based on. Amazon Web Services (AWS)
[
          <xref ref-type="bibr" rid="ref17">18</xref>
          ] have the AWS Cloud Adoption Framework and
Microsoft [
          <xref ref-type="bibr" rid="ref18">19</xref>
          ] have the cloud adoption framework for Azure.
Although AWS is the market leader and offers over one
hundred and seventy (170) services across compute platforms,
one big challenge is pricing. Organizations find it difficult to
understand the complex metrics tied to the architectural
decisions they make and the cost implications of supporting
them [
          <xref ref-type="bibr" rid="ref19">20</xref>
          ]. On the other hand, many organizations that are
used to Microsoft products find it easier to adopt Azure
because of productivity and workflow solutions like Office
365 and Teams. The framework however, does not discuss
people aspect and how organizations should align themselves
before adopting cloud. The three cloud service providers:
Amazon, Cisco and Microsoft adoption frameworks generally
guide users on how to adopt their cloud services, while the
proposed framework does not limit users to a specific cloud
service provider.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Field survey</title>
        <p>A study on business continuity plans of three universities
(Egerton, Kenyatta and Strathmore) in Kenya was done to
assess existing challenges identified from literature review
and to give a contextual touch to the study. Out of the three
universities selected, two universities are public while one is
private; therefore the findings of the study maybe applicable
to other universities in Kenya. The target population was 120
ICT staff from three selected universities who have
knowledge in cloud computing. Most respondent were
administrators (security/Systems and database) at 43.2%
since they are familiar with data centers, systems
administration and server environments, 29.7% were
managers (IT managers and Security managers), 24.7% were
IT technicians while 2.5% were Director ICT. The sample
size was 92 and respondents were 81. Primary data was
collected using a questionnaire which had both open and
closed ended questions. Once the responses were received,
they were coded and edited for completeness and
consistency. Data was analyzed using Statistical Package for
Social Sciences (SPSS) version 20.0</p>
        <p>
          Based on the factor loading ten factors were picked as the
main challenges and issues. The study revealed that 85.2%
of the respondents feel that the initial, maintenance and
upgrading cost should be clear before cloud adoption with
81.5 agreeing on having management support before cloud
adoption. All universities have some of the services running
on cloud for example emails but majority are skeptical on
running their core enterprise resource planning on the cloud
due to security and privacy which were rated at 88% while
72% were concerned over loss of data and lack of control of
their data. 88% of the respondent felt that there was need to
evaluate the existing infrastructure and expected
infrastructure upgrade once universities move their business
continuity to the cloud. The challenges are also found in the
previous studies done by Al-Shqeerat et al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Universities
should have an understanding on the legal requirement and
implications, third party licenses, understand data privacy
laws, Intellectual property Rights, Service termination/failure
agreements. 76% agree that there is need to have a clear legal
framework during the whole process. 92% agree that the
cloud vendor should focus on the optimization; Manage
workload to maximize performance, Prioritize workload with
advanced scheduling. Another 92% agree that there is need
to understand the SLA between the universities and the cloud
vendor. Based on the research findings, 82% of the
respondents agreed that employees should enhance and
strengthen their expertise through professional training and
certification. These findings agrees with the survey done by
Kumar et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] and Zhang et al. [
          <xref ref-type="bibr" rid="ref7">8</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>C. Conceptual Framework</title>
        <p>
          After the literature review and a field survey of three
Kenyan universities, the paper adopted the people, process,
technology conceptual framework [
          <xref ref-type="bibr" rid="ref20">21</xref>
          ] and focused on ten
challenges that hinder IHL adopting cloud for business
continuity as shown in Fig 2. The people, process and
technology framework was adopted because it underpins the
objectives of the study.
        </p>
        <p>Fig 2: Conceptual Framework</p>
        <p>
          Universities willing to adopt the proposed framework to
change from their current state to a successful cloud-Based
BCM, need to ensure first of all that the employees (people)
appreciate, buy in and have the knowledge of the new
technology and they should be available during the migration
process. Once the people aspect has been met, they can
proceed to the process aspect. To implement the processes,
universities should identify the steps by reengineering their
current business processes to align with cloud-based BCM.
Universities should ensure that existing SLAs’ with third
parties and other regulations approvals are done before
adoption. Proper internet and cost analysis should be done at
Adoption of new technology in Sub Saharan Africa
contextual, cultural, economic, and infrastructural factors
hinder adoption. Furthermore, access to technology is not
readily available to a majority of the population [
          <xref ref-type="bibr" rid="ref21">22</xref>
          ]. Many
students come from geographically disparate locations where
internet speeds are low. Despite cloud computing popularity,
enterprises are still reluctant to host sensitive user data in the
cloud due to security, trust of data and privacy challenges
which were found to be the leading determinant in cloud
this stage as well. Finally the new technology is introduced
.Technology should fit in the universities’ need and users
should be sensitized on data security changes and
infrastructure changes as they relate to their jobs.
        </p>
        <p>The conceptual framework can be interpreted as captured
in Table 1:</p>
        <p>Explanation
Trainings and certification,
sensitization, availability, hiring.
user
Steering team,
commitment ,culture
Controlled
Integration,
deployment
documentation</p>
        <p>management
Interfaces, Functional</p>
        <p>Cloud computing</p>
        <p>Models, switch over
Regular Monitoring of the usage,
Modification and Maintenance,
Monitoring and Reviewing of
framework, SLA between institution
and cloud service provider, SLA
between Institution and third party
licenses, support and maintenance
Initial cost, Lease period/operational
expenditure, running costs, License
costs, Pay-per-usage/ on demand
service
Reliability, backup service provider,
cost.</p>
        <p>Intellectual property Rights, Service
termination/failure agreements, data
protection laws, legal framework,
government policies, data disposal at
end of contract.</p>
        <p>Where the cloud providers store their
clients’ data, how the cloud providers
isolate their clients’ data from others,
and how the cloud providers are
committed to investigating
inappropriate or illegal activities.</p>
        <p>Firewall, replication tools, emergency
power backup, VPN, switches,
configuration of desktop and web
based applications.</p>
        <p>
          Manage workload to maximize
performance, Prioritize workload with
advanced scheduling to attain SLAs,
Move workload to appropriate
infrastructure and ensure Provision and
de-provision of resources.
adoption decisions [
          <xref ref-type="bibr" rid="ref21">22</xref>
          ]. Lack of control over user data, vendor
lock-in, regulatory compliance and SLA with cloud service
provider were the three most rated concerns [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. A study done
by Wyche et al. [
          <xref ref-type="bibr" rid="ref19">20</xref>
          ] in Nairobi Kenya highlights constraints
that influence use of technology as: poor infrastructure
settings: limited bandwidth, high access cost, different
perceptions of responsiveness and threats to physical and
virtual security. Tariq et al. [
          <xref ref-type="bibr" rid="ref12">13</xref>
          ] Did a study on factors
participants considered as most influential in cloud adoption
in higher education institutes in Punjab. Challenges such as
insufficient skilled staff, staff trainings, organization culture,
integrity, integration with other systems, operation costs,
regulatory, government support were highly rated.
        </p>
        <p>III. CONCLUSIONS AND RECOMMENDATIONS
The objective of the paper was to introspect cloud
computing for business continuity frameworks from literature,
and identify existing challenges that hinder their adoption in
Kenyan universities and propose a context sensitive cloud
based business continuity conceptual framework based on
people, process and technology frameworks.</p>
        <p>The findings show that universities in Kenya have made
significant effort in implementing business continuity plans,
however majority are relying on backups while a small
percentage have redundant sites for business continuity. For
universities to migrate to the cloud for their business
continuity plans, there needs to be a proper understanding of
the perceived challenges and how to overcome the challenges
before migrating to the cloud. .</p>
        <p>Based on the research findings, the study recommends the
need for Kenyan universities to strengthen their people related
aspects. Some of these aspects include expertise, training,
certification and management support. People factor will
become more effective in enhancing cloud computing system
for business continuity if the aspects are improved. The study
also recommends the need for universities in Kenya to
strengthen and understand the process related aspects. These
are; Business process reengineering, SLA, Cost, Internet
connectivity and regulatory framework . This will avoid a
deadlock situation during implementation and it will improve
the project success rate. Further, the study recommends the
need for universities in Kenya to strengthen their technology
related aspects. These are: security, infrastructure and
optimization.
Framework &lt;
[Accessed:</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Karim</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Rampersad</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Cloud Computing in Education in Developing Countries</article-title>
          .
          <source>Computer and Information Science</source>
          ,
          <volume>10</volume>
          (
          <issue>2</issue>
          ),
          <fpage>87</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Seke</surname>
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2015</year>
          ),
          <article-title>Higher Education and the Adoption of Cloud Computing Technology in Africa</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Al-Shqeerat</surname>
            ,
            <given-names>K.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammoudeh</surname>
            ,
            <given-names>M.A.A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Abbasi</surname>
            ,
            <given-names>M.I.</given-names>
          </string-name>
          ,
          <year>2016</year>
          .
          <article-title>Design and Analysis of an Effective Secure Cloud System</article-title>
          at Qassim University.
          <source>International Journal of Computer Science and Information Security</source>
          ,
          <volume>14</volume>
          (
          <issue>8</issue>
          ), p.
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samalia</surname>
            ,
            <given-names>H. V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Verma</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Exploring suitability of cloud computing for small and medium-sized enterprises in India</article-title>
          .
          <source>Journal of Small Business and Enterprise Development.</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Kajiyama</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennex</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Addo</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions</article-title>
          . Information &amp; Computer Security.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Saquib</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyagi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bokare</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dongawe</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dwivedi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Dwivedi</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2013</year>
          ),
          <article-title>“ A new approach to disaster recovery as a service over cloud for database system”</article-title>
          ,
          <source>In 15th International Conference on Advanced Computing Technologies (ICACT)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Xuan</given-names>
            <surname>Zhang</surname>
          </string-name>
          , Nattapong Wuwong,
          <string-name>
            <given-names>Hao</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and Xuejie</given-names>
            <surname>Zhang</surname>
          </string-name>
          . “
          <article-title>Information security risk management framework for the cloud computing environments</article-title>
          .”
          <source>In Paper presented at the 10th IEEE International Conference on Computer and Information Technology (CIT)</source>
          , Cork, Ireland, 29 June-1
          <source>July</source>
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harper</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahindru</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ramasamy</surname>
            ,
            <given-names>H.V.</given-names>
          </string-name>
          (
          <year>2016</year>
          ), “
          <article-title>Disaster Recovery for Cloud-Hosted Enterprise Applications”</article-title>
          ,
          <source>In IEEE 9th International Conference on Cloud Computing (CLOUD)</source>
          , pp.
          <fpage>432</fpage>
          -
          <lpage>439</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dey</surname>
          </string-name>
          ,
          <article-title>"Business Continuity Planning (BCP) methodology - Essential for every business," 2011 IEEE GCC Conference and Exhibition (GCC)</article-title>
          ,
          <year>Dubai</year>
          ,
          <year>2011</year>
          , pp.
          <fpage>229</fpage>
          -
          <lpage>232</lpage>
          , doi: 10.1109/IEEEGCC.
          <year>2011</year>
          .
          <volume>5752503</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Ochara</surname>
            ,
            <given-names>N. M.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Assimilation of Cloud Computing in Business Continuity Management for Container Terminal Operations in South Africa</article-title>
          . Available at SSRN 3560745.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Tjan</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Finally, a way to put your Internet portfolio in order</article-title>
          .
          <source>Harvard business review</source>
          ,
          <volume>79</volume>
          (
          <issue>2</issue>
          ),
          <fpage>76</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Tariq</surname>
            ,
            <given-names>M.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tayyaba</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rasheed</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Ashraf</surname>
            ,
            <given-names>M.W.</given-names>
          </string-name>
          (
          <year>2017</year>
          ), “
          <article-title>Factors influencing the Cloud Computing adoption in Higher Education Institutions of Punjab, Pakistan”</article-title>
          .
          <source>In International Conference on Communication, Computing and Digital Systems (CCODE) IEEE</source>
          , pp.
          <fpage>179</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Hiran</surname>
            ,
            <given-names>K. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henten</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shrivas</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Doshi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2018</year>
          ,
          <article-title>August)</article-title>
          .
          <article-title>Hybrid educloud model in higher education: The case of Sub-Saharan Africa, Ethiopia</article-title>
          . In
          <source>2018 IEEE 7th International Conference on Adaptive Science &amp; Technology (ICAST)</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Al-shammari</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Alwan</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          <article-title>A Conceptual Framework for Disaster Recovery and Business Continuity of Database Services in Multi-Cloud.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Sabi</surname>
            ,
            <given-names>H. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uzoka</surname>
            ,
            <given-names>F. M. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Langmia</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Njeh</surname>
            ,
            <given-names>F. N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tsuma</surname>
            ,
            <given-names>C. K.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa</article-title>
          .
          <source>Information Systems Frontiers</source>
          ,
          <volume>20</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1381</fpage>
          -
          <lpage>1404</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Google</surname>
          </string-name>
          (
          <year>2020</year>
          ),
          <article-title>The Google Cloud Adoption Framework</article-title>
          . &lt; https://cloud.google.com/adoption-framework
          <source>&gt; [Accessed</source>
          <volume>10</volume>
          /6/2020]
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Amazon</surname>
          </string-name>
          (
          <year>2020</year>
          ), AWS Cloud Adoption https://aws.amazon.com/professional-services/CAF/&gt; 10/6/2020]
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Microsoft</surname>
          </string-name>
          (
          <year>2020</year>
          ),
          <article-title>Microsoft Cloud Adoption Framework for Azure https</article-title>
          ://docs.microsoft.com/en-us/azure/cloud-adoption-framework/ [Accessed: 10/6/2020]
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Wyche</surname>
            ,
            <given-names>S. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smyth</surname>
            ,
            <given-names>T. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chetty</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aoki</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Grinter</surname>
            ,
            <given-names>R. E.</given-names>
          </string-name>
          (
          <year>2010</year>
          , April).
          <article-title>Deliberate interactions: characterizing technology use in Nairobi, Kenya</article-title>
          .
          <source>In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          (pp.
          <fpage>2593</fpage>
          -
          <lpage>2602</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Prodan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prodan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Purcarea</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          (
          <year>2015</year>
          ),
          <article-title>Three new dimensions to people, process, technology improvement model</article-title>
          .
          <source>In New contributions in information systems and technologies</source>
          , Springer, Cham, pp.
          <fpage>481</fpage>
          -
          <lpage>490</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Seifu</surname>
            ,
            <given-names>S. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dahiru</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bass</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Allison</surname>
            ,
            <given-names>I. K.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Cloud‐computing: Adoption issues for Ethiopian public and private enterprises</article-title>
          .
          <source>The Electronic Journal of Information Systems in Developing Countries</source>
          ,
          <volume>78</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>