• Hanifah Abdul Hamid Universiti Sains Islam Malaysia Nilai, Negeri Sembilan, Malaysia
  • Mokhtar Mohd Yusof Universiti Teknikal Malaysia Melaka, Ayer Keroh, Melaka, Malaysia



Cloud computing, readiness, adoption, security


Cloud computing has made a significant transformation of information technology environment as well as the way the business is conducted in any organizations. While its advantages are obvious, its challenges need to be clearly addressed to ensure successful adoption. This article provides an insights of cloud computing adoption in Malaysia at the national level as well as a review of cloud adoption from various fields and domains in Malaysia which led to research direction in the future. Malaysia is being dedicated towards cloud adoption nationally, and keep its good progress to equip itself as a cloud-friendly country. However, security challenges seem to slow down the effort, thus these need to be dealt with properly. 


J. Voas and J. Zhang. 2009. Cloud Computing: New Wine or Just a New Bottle? IT Professional. 11(2): 15-17.

I. S. Dua. 2014. Benefits and Security Concerns of Cloud Computing. Int. J. Sci. Eng. Res. 5(1): 404-411.

S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi. 2011. Cloud Computing—The Business Perspective. Decis. Support Syst. 51(1): 176-189.

S. U. Khan and N. Dakota. 2014. Elements of Cloud Adoption. Cloud Comput. IEEE. 1(1): 71-73.

The Cabinet Office. 2013. Digital Britain 2: Putting Users at the Heart of Government ’ s Digital Services. London.

P. Mell and T. Grance. 2011. The NIST Definition of Cloud Computing. Natl. Inst. Stand. Technol. 53: 50.

MAMPU. The Malaysian Public Sector ICT Strategic Plan 2011-2015. Putrajaya.

Public Sector ICT Study Infrastructure Architecture. 2011. Kuala Lumpur.

L. May-Ann, B. Trudel, J. Galligan, P. Lovelock, D. Rosengrave, and A. Haghbin. 2014. Asia Cloud Computing Association ’ s Cloud Readiness Index 2014.

K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez. 2013. An Analysis of Security Issues for Cloud Computing. J. Internet Serv. Appl. 4(1): 5.

S. H. Albakri, B. Shanmugam, G. N. Samy, N. B. Idris, and A. Ahmed. 2014. Cloud Computing Adoption Challenges. Adv. Sci. Lett. 20(2): 546-548.

M. A. Aziz, J. Abawajy, and M. Chowdhury. 2014. The Challenges of Cloud Technology Adoption in E-Government. Proc. - 2013 Int. Conf. Adv. Comput. Sci. Appl. Technol. ACSAT 2013. 470-474.

O. Rebollo, D. Mellado, E. Fernández-Medina, and H. Mouratidis. 2015. Empirical Evaluation of a Cloud Computing Information Security Governance Framework. Inf. Softw. Technol. 58(58): 44-57.

W. N. Hussein, R. Sulaiman, and A. K. Hamzah. 2013. E-Business and Cloud Computing Awareness for Malaysian Smes: A Recommendation from Academic and Industry Perspectives. Int. Conf. Res. Innov. Inf. Syst. ICRIIS. 180-185.

A. S. Idris, F. Hanim, and M. Fauzi. 2014. The Readiness Of Cloud Computing : A Case Study In Politeknik Sultan Salahuddin Abdul Aziz Shah , Shah Alam. In Computational Science and Technology (ICCST), 2014 International Conference. 1-5.

F. F. Moghaddam, O. Karimi, and M. Hajivali. 2013. A Survey for Effectiveness and Influence Rate of Cloud Computing Services in Malaysia. 2013 IEEE 11th Malaysia Int. Conf. Commun. MICC 2013. November: 283-286.

E. Yadegaridehkordi, N. A. Iahad, and N. Ahmad. 2014. Task-Technology Fit and User Adoption of Cloud- based Collaborative Learning Technologies. In Computer and Information Sciences (ICCOINS), 2014 International Conferenc. 1-6.

A. S. Hashim and M. Othman. 2014. Cloud Computing Adoption by Universities: Concepts and Review. Int. J. Sci. Res. 3(2): 348-353.

S. F. Abdul Razak. 2009. Cloud Computing in Malaysia Universities. 2009 Innov. Technol. Intell. Syst. Ind. Appl. CITISIA 2009. July: 101-106.

K. A. Ratnam, P. D. D. Dominic, and T. Ramayah. 2014. A Structural Equation Modeling Approach for the Adoption of Cloud Computing to Enhance the Malaysian Healthcare Sector. J. Med. Syst. 38(8): 82.

Z. Suryady, G. R. Sinniah, S. Haseeb, M. T. Siddique, and M. F. M. Ezani. 2014. Rapid Development of Smart Parking System with Cloud-based Platforms. In Information and Communication Technology for The Muslim World (ICT4M), 2014 The 5th International Conference. 1-6.

A. Saedi and N. a Iahad. 2013. An Integrated Theeoretical Framework for Cloud Computing Adoption by Small and Medium Sized. Pacific Asia Conf. Inf. Syst. 481-486.

S. H. Albakri, B. Shanmgam, G. N. Samy, N. B. Idris, and A. Ahmed. 2014. A Case Study for the Cloud Computing Security Threats in a Governmental Organization. In Computer, Communications, and Control Technology (I4CT), 2014 International Conference. 452-457.

A. Saedi and N. A. Iahad. 2013. Future Research on Cloud Computing Adoption by Small and Medium-Sized Enterprises: A Critical Analysis of Relevant Theories. Int. J. Actor-Network Theory Technol. Innov. 5: 1-16.

S. Abolfazli, Z. Sanaei, A. Gani, F. Xia, and W.-M. Lin. 2014. RMCC: Restful Mobile Cloud Computing Framework for Exploiting Adjacent Service-Based Mobile Cloudlets. 2014 IEEE 6th Int. Conf. Cloud Comput. Technol. Sci. 793-798.

Gartner. 2015. Key Challenges in Cloud Computing,†2015. [Online]. Available: [Accessed: 21-Apr-2015].

A.-Z. A. Hamzah. 2015. Google Malaysia service disrupted by hackers. Reuter, 2015. [Online]. Available: [Accessed: 23-Apr-2015].

L. Connolly, M. Lang, and D. Tygar. 2014. Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values. ICT Syst. Secur. Priv. Prot. 428: 417-430.

N. H. M. Alwi and I. S. Fan. 2012. Cultural Views Inclusive in E-Learning Risk Analysis. 2012 IEEE Symp. E-Learning, E-Management E-Services, IS3e 2012. 11-16.

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya. 2014. Cloud-based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges. IEEE Commun. Surv. Tutorials. 16(1): 337-368.

F. Fatemi Moghaddam and O. Karimi. 2013. An Efficient and Intelligent Model to Control Driving Offenses by Using Cloud Computing Concepts Based on Road Transportation Situation in Malaysia. Proc.-2013 IEEE 4th Control Syst. Grad. Res. Colloquium, ICSGRC 2013. 17-20.

R. Reid and J. Van Niekerk. 2014. From Information Security to Cyber Security Cultures Organizations to Societies. Inf. Secur. South Africa (ISSA), IEEE. 1-7.




How to Cite