Free Essay

The Government and the Cloud

In:

Submitted By dcolon03
Words 2612
Pages 11
-------------------------------------------------
The Government and “The Cloud”

DéAna Colón
Project-Based Information Systems, 90.480.032, TP5

Table of Contents

Table of Contents 2 Introduction 3 US Privacy Rights 3 Loss of Companies’ Products/Services 4 Government’s Cloud-Data Security 6 Negative Impact on International Relations 7 Loopholes 8 Conclusion 9 Sources 10

Figure 1: Cisco's Projected Revenue Chart 5 Figure 2: Key Stakeholders and Responsibilities for FedRAMP 7

Introduction
With the technological advances made, cloud-based data storage has become a staple in businesses worldwide. Storing data using a web-based content management system offers a limitless amount of off-site storage, allowing companies to save larger amounts of data longer. The United States government currently has the unwarranted authority to read emails or access cloud-based data that has been stored for six months or more. Both positive and negative aspects are realized with this controversy.
On a positive perspective, many feel the government accessing the data could be beneficial. Probing may help the government prevent terrorism in the United States. It may also provide the information needed to better forecast the country’s economic future. A disparaging concern is that companies feel the government is violating privacy rights. In addition, possible data leaks may result in a company’s loss of product or services. Ultimately, it must be decided whether the government should be allowed to access this information. With the evidence presented, I recommend the government should not have access to this data.
US Privacy Rights
Since the beginning, the United States government has established laws to protect its citizens, including rights to privacy. The Fourth Amendment was created to give citizens the right to privacy and unwarranted searches, including personal effects. Over the years, with society and technology rapidly advancing, additional privacy laws have been crafted to continue to protect rights. The Federal Wiretap Act of 1968 was established to protect citizens against unlawful interceptions of conversations using ‘hard’ wiretaps on telephones. In 1986, Ronald Regan signed into effect the Electronic Communications Privacy Act (ECPA), an update to the Federal Wiretap Act of 1968. The ECPA prevents unwarrantedly accessing all computer, digital, and electronic communication. To continue to keep up with technology, Title II was added to the ECPA. It states:
“Stored Communications Act (SCA), protects the privacy of the contents of files stored by service providers and of records held about the subscriber by service providers, such as subscriber name, billing records, or IP addresses. 18 U.S.C. §§ 2701-12.”

With the surfacing of the government’s unwarranted cloud-stored data probing, many companies feel it is in direct violation of the ECPA. According to US District Court Judge Richard J. Leon, the data collection is an “arbitrary invasion”. His ruling is in connection with two people suing the NSA for their telephone data collection. Judge Leon’s was the first ruling against the NSA’s program. He felt the manner in which the data is collected invades on US citizens’ privacy.
Loss of Companies’ Products/Services
In 2013, a former US government employee leaked information proving the government was secretly probing electronic data. This NSA leak drastically effected companies on an international level. One company in particular, Cisco, immediately felt the effects. Cisco reported major profit loss because companies no longer trusted the security of their data in its cloud-based products. Fearing millions more in profit losses, the tech company urged President Obama to correct or diffuse the NSA leak scandal. In addition to Cisco’s drop in product sale and recorded profit loss, Verizon was impacted as well. Germany decided it will not be renewing their contract with Verizon due to the discovery of the NSA leak. Germany fears US intelligent agencies will have access to sensitive communications.
Figure 1: Cisco's Projected Revenue Chart
To further impede on privacy rights, the government continuously submits requests to probe online data and the companies have provided ‘transparency reports’. This data collection is not made known to the subscribers. For years, both Twitter and Google have handed over countless reports of its users’ online data. In one year alone, the government issued 679 data requests from Twitter, and the company satisfied 63% of them. The government’s requests from Google were in the tens of thousands. In 2013, Twitter gave French authorities data to help probe in connection with an investigation into anti-Semitic tweets. This stemmed from a court ruling due to France’s Union of Jewish Students (UEJF) pressed charges against Twitter. Twitter was mandated to release the data to authorities, however, it was not mandated for the users to be notified.
Aside from Twitter and Google, other companies track data and transmit it to/through third parties with the users’ consent. Smart phones collect data and forward it to third parties and government. For example, Motorola’s privacy policy indicates information will be collected and shared with others.
“Motorola may also passively collect information (i.e. without you knowing) from you… The information collected by Motorola is used to a) operate the MOTOBLUR Software and Services, including interaction with third party social networking sites and other third party websites and services…”

Government’s Cloud-Data Security
Fully aware of how susceptible cloud-based data is to probing, the government has supplementary acts and policies in place to ensure its own data is properly stored and safe from any data mining. Each government agency is responsible for following its agency documentation and security steps. The Privacy Act of 1974 is the first step in ensuring information privatization and security is established. Each agency must: * Determine whether or not the data is covered by the Privacy Act of 1974 * Publish a list of the records which will be cloud-stored * Determine how the Federal agency will grant access to data * Meet all requirements in the Privacy Act when storing, making all stipulations, responsibilities, and expectations contractually clear

Aside from the Privacy Act of 1974, the federal government also established a process specifically for establishing cloud-based data security. The Federal Risk and Authorization Management Program (FedRAMP) encompasses their security controls and data privatization process.
FedRAMP is a security control baseline for approving third party cloud service providers. This rigorous analysis takes a minimum of four months to approve a provider; however, it ensures the government’s information will not be jeopardized in the hands of a third party. Third party approval times depend on the quality of the documentation provided for the approval process. If these security measures were taken for US citizens, there wouldn’t be an ongoing battle with the government’s unwarranted access to information.

Figure 2: Key Stakeholders and Responsibilities for FedRAMP
Negative Impact on International Relations
US citizens were not the only ones affected by the government’s data probing. It was discovered that international data was probed and collected as well. This was considered an invasion of privacy and Europe began to take immediate measures to ensure the security of its data communications. The birth of the European Communication Network emerged. The ECN creation is to avoid data transmissions through the US, thereby eliminating the possibility of unwarranted data probing.
Although Europe insists these measures are taken to ensure data security, the United States believes Europe’s intent to build a European Communication Network gives European companies an advantage over American companies. The US feels the ECN is a breach in international trade laws.
“The main mission of the ECN is to exchange best practices on preparation and implementation of communication plans and other communication practices. It also aims at facilitating DG COMM's assistance to other DGs on technical issues and strives towards a more effective and cost-efficient use of tools (audiovisual, Internet, citizens' help-lines, etc.) and evaluation methods.”

In the wake of the NSA leak, China seizes this as an opportunity to shut down business between the US and Beijing. Instead, China pushes forward its own cloud security software and policies. Beijing gladly accepts China’s software and hardware. To add to the United States’ new technological breakdown overseas, India and China put restrictions and increased rates for US telecommunications operations. Neither country believes in the Unites States’ ability to perform cloud-based data storage without infringing upon their nation’s security.
Loopholes
For years organizations have tried to get the government to update the ECPA. In 2010, a coalition of companies and unions, the “Digital Due Process” Coalition, urged the government to update the ECPA. In 2011, a press conference was held by two senators, Ron Wyden (D-OR) and Mark Kirk (R-IL), on the 25th anniversary of the ECPA, urging privacy law updates. In 2011, Senator Patrick Leahy proposed US SB1011“Electronic Communications Privacy Act Amendments Act of 2011”. This bill would eliminate the 6-month rule, and require search warrants for cloud data. It would also require that customers be notified if their information will be shared due to a search warrant.
Not only does the Obama administration disapprove of US SB1011, it has yet to update privacy laws and continues to use the existing loopholes to their advantage.
Conclusion
With cloud-based data storage now being a staple in businesses worldwide, the United States government should not have access to cloud-based data that has been stored for 6 months or more. It is a blatant invasion of privacy. Furthermore, with its inability to keep up with technology’s rapid evolution, the government capitalizes on loopholes within outdated Acts such as the ECPA and SCA. Besides businesses worldwide no longer believing in the security of their cloud-based data, technical companies are also suffering major financial losses due to data leaks. With this evidence, eliminating the government’s access to cloud-based data would be beneficial to businesses and should be implemented immediately.

Sources
Associated Press Wire Report. “Twitter shares info on government demands for user data”. First Amendment Center. 6-Jul-2012. Web. 17-Jul-2014. <http://www.firstamendmentcenter.org/twitter-shares-info-on-government-demands-for-user-data>
Dinan, Stephen. “Federal judge says NSA phone program violates Fourth Amendment”. The Washington Times. 16-Dec-2013. Web. 5-Jul-2014. <http://www.washingtontimes.com/news/2013/dec/16/federal-judge-says-nsa-phone-program-violates-four/?page=all>
Durden, Tyler. “Cisco CEO Warns Obama To Rein In NSA Or Face Collapse Of Trust In US Technology (And Cisco Sales)”. Zero Hedge. 18-May-2014. Web. 8-Jul-2014. <http://www.zerohedge.com/news/2014-05-18/cisco-ceo-warns-obama-rein-nsa-or-face-collapse-trust-us-technology-and-cisco-sales>
Hughes, Krista. “U.S. knocks plans for European communication network”. Reuters. 4-Apr-2014. Web. 6-Jul-2014. <http://www.reuters.com/article/2014/04/04/us-usa-trade-telecomunications-idUSBREA331W820140404>
Jeschke, Rebecca. “ECPA Anniversary Week Brings Calls for Change”. Electronic Frontier Foundation. 17-Oct-2011. Web. 20-Jul-2014. <https://www.eff.org/deeplinks/2011/10/ecpa-anniversary-week-brings-calls-change>
Kravets, David. “Aging ‘Privacy’ Law Leaves Cloud E-Mail Open to Cops”. Wired. 21-Oct-2011. Web. 7-Jul-2014. <http://www.wired.com/2011/10/ecpa-turns-twenty-five/>
Kravets, David. “Senate Bill Requires Warrant for E-Mail, Cloud Content”. Wired. 17-May-2011. Web 20-Jul-2014. <http://www.wired.com/2011/05/cloud-content-warrants/>
Munchbach, Andrew. “Your smartphone is tracking you, and you said it was okay”. BGR.com. 20-Apr-2011. Web. 17-Jul-2014. <http://bgr.com/2011/04/20/your-smartphone-is-tracking-you-and-you-said-it-was-okay/>
News Wires. “France Twitter releases data to French anti-Semitism probe”. France24.com. 12-Jul-2013. Web. 16-Jul-2014. <http://www.france24.com/en/20130712-twitter-releases-data-french-anti-semitism-probe/#./?&_suid=140553768750508434747235546947>
Ogg, John C. “Verizon Losing German Government Contracts”. 24/7 Wall St. 26-Jun-2014. Web. 2-Jul-2014. <http://247wallst.com/telecom-wireless/2014/06/26/verizon-losing-german-government-contracts/>
Smith, Gerry. “’Snowden Effect’ Threatens U.S. Tech Industry’s Global Ambitions”. The Huffington Post. 24-Jan-2014. Web. 2-Jul-2014. <http://www.huffingtonpost.com/2014/01/24/edward-snowden-tech-industry_n_4596162.html> “EFF Joins With Internet Companies and Advocacy Groups to Reform Privacy Law”. Electronic frontier Foundation. 30-Mar-2010. Web. 20-Jul-2014. <https://www.eff.org/press/archives/2010/03/30>
“Electronic Communications Privacy Act of 1986 (ECPA), 18 U.S.C. § 2510-22. Justice Information Sharing, Office of Justice Programs. 30-Jul-2013. Web. 7-Jul-2014. <https://it.ojp.gov/default.aspx?area=privacy&page=1285>
“External Communication Network”. European Commission. 16-May-2014. Web. 17-Jul-2014. http://ec.europa.eu/ipg/basics/management/committees/ecn/index_en.htm “Fourth Amendment”. United States Courts. n.d. Web. 16-Jul-2014. http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment.aspx “Fourth Amendment: An Overview”. Cornell University Law School. N.d. Web. 6-Jul-2014. <http://www.law.cornell.edu/wex/fourth_amendment> “June 2014 FedRAMP Update”. Cloud.cio.gov. June 2014. Web. 28-Jun-2014. <http://cloud.cio.gov/document/june-2014-fedramp-update>
“Privacy”. Cloud.cio.gov. n.d. Web. 28-Jun-2014. <http://cloud.cio.gov/topics/privacy> “Privacy Act of 1974”. The United States Department of Justice. n.d. Web. 18-Jul-2014. http://www.justice.gov/opcl/privacy-act-1974
”Privacy and Civil Liberties”. Justice Information Sharing, Office of Justice Programs. 30-Jul-2013. Web. 2-Jul-2014. <https://it.ojp.gov/default.aspx?area=privacy&page=1285> “US Congress Senate Bill 1011”. LegiScan. n.d. Web 20-Jul-2014. <http://legiscan.com/US/text/SB1011/id/297636>

--------------------------------------------
[ 1 ]. “Fourth Amendment”. United States Courts. n.d. Web. 16-Jul-2014.
[ 2 ]. ”Privacy and Civil Liberties”. Justice Information Sharing, Office of Justice Programs. 30-Jul-2013. Web. 2-Jul-2014.
[ 3 ]. Dinan, Stephen. “Federal judge says NSA phone program violates Fourth Amendment”. The Washington Times. 16-Dec-2013. Web. 5-Jul-2014.
[ 4 ]. Ogg, John C. “Verizon Losing German Government Contracts”. 24/7 Wall St. 26-Jun-2014. Web. 2-Jul-2014.
[ 5 ]. Durden, Tyler. “Cisco CEO Warns Obama To Rein In NSA Or Face Collapse Of Trust In US Technology (And Cisco Sales)”. Zero Hedge. 18-May-2014. Web. 8-Jul-2014.
[ 6 ]. 14Associated Press Wire Report. “Twitter shares info on government demands for user data”. First Amendment Center. 6-Jul-2012. Web. 17-Jul-2014.
[ 7 ]. News Wires. “France Twitter releases data to French anti-Semitism probe”. France24.com.12-Jul-2013. Web. 16-Jul-2014.
[ 8 ]. 15Munchbach, Andrew. “Your smartphone is tracking you, and you said it was okay”. BGR.com. 20-Apr-2011. Web. 17-Jul-2014.
[ 9 ]. “Privacy”. Cloud.cio.gov. n.d. Web. 28-Jun-2014.
[ 10 ]. “June 2014 FedRAMP Update”. Cloud.cio.gov. June 2014. Web. 28-Jun-2014.
[ 11 ]. Hughes, Krista. “U.S. knocks plans for European communication network”. Reuters. 4-Apr-2014. Web. 6-Jul-2014.
[ 12 ]. “External Communication Network”. European Commission. 16-May-2014. Web. 17-Jul-2014.
[ 13 ]. Hughes, Krista. “U.S. knocks plans for European communication network”. Reuters. 4-Apr-2014. Web. 6-Jul-2014.
[ 14 ]. “EFF Joins With Internet Companies and Advocacy Groups to Reform Privacy Law”. Electronic Frontier Foundation. 30-Mar-2010. Web. 20-Jul-2014.
[ 15 ]. Jeschke, Rebecca. “ECPA Anniversary Week Brings Calls for Change”. Electronic Frontier Foundation. 17-Oct-2011. Web. 20-Jul-2014.
[ 16 ]. “US Congress Senate Bill 1011”. LegiScan. n.d. Web 20-Jul-2014.
[ 17 ]. Kravets, David. “Aging ‘Privacy’ Law Leaves Cloud E-Mail Open to Cops”. Wired. 21-Oct-2011. Web. 7-Jul-2014.

Similar Documents

Premium Essay

“How Can New Cloud Technologies Be Implemented in Government Contracting?”

...AMBA 600 1141 | “How Can New Cloud Technologies be Implemented in Government Contracting?” | | | Stephen Roane | 5/11/2015 | Executive Summary: Recently cloud computing has been a hot topic in the news. The reason is because cloud computing has a lot of potential. Cloud technology could revolutionize the way that businesses operate. Recently the Department of Defense (DOD) granted security approvals to a number of companies that provide cloud technology. This technology could have a significant impact on the way that procurement is done in the Federal Government. Utelizing this new technology could create cost savings, give remote access and create flexibility. Along with these advantages that cloud technology can potentially offer comes some issues. The main issue that cloud technology presents is security threats to the information that the cloud itself will store. On 4 May 2015 the Department of Defense granted new security approvals to 23 cloud providers. The reason why this is important in the Contract/Procurement field is because this will allow contract writing systems to operate via a cloud application. The use of cloud technologies will create cost savings and offer “flexibility and agility to respond to new challenges and opportunities.” (McKendrick, 2013) Cloud systems have their pros and cons. Some of the pros are the flexibility and access, which could be a plus to any federal agency. On the other hand the major con is security. ...

Words: 1064 - Pages: 5

Premium Essay

Cloroxbrita

.................... 5 1. Introduction ............................................................................................................................... 7 1.1 Why is an Australian Government Cloud Computing Strategy required? .......................... 7 1.2 Objective .............................................................................................................................. 9 1.3 Audience .............................................................................................................................. 9 2. What is Cloud Computing? ...................................................................................................... 10 2.1 Types of Cloud Computing................................................................................................. 12 2.2 Cloud Service Capability .................................................................................................... 13 3. Potential Risks and Issues of Cloud Computing ...................................................................... 14 4. Potential Business Benefits of Cloud Computing for Australian Government Agencies ........ 17 5. Potential Opportunities of Cloud Computing for Australian Government Agencies .............. 19 6. Australian Government Cloud Computing Policy ................................................................... 21 6.1 Policy Statement .....................................................................................

Words: 801 - Pages: 4

Premium Essay

Cloud Computing

...IIIT, Hyderabad Cloud Computing for E-Governance A white paper Abstract The worldwide revolution in Internet is changing our lives in terms of the way we work, learn and interact. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. Also, the increasing generalization of technology access by citizen and organizations brings expectations and demands on government. At the same time, governments are also proactive in this domain and are planning new ways of interacting, improving services, optimizing processes and revitalizing democracy by spending amount on IT. It aims to deliver more interactive services to citizens and businesses through E-Governance. For this, cloud computing may lead to significant cost savings. It entails use over the Internet of computing hardware and software infrastructure and applications that are remotely hosted. In this white paper, we describe how this newly emerged paradigm of cloud computing can be helpful for E-Governance. IIIT, Hyderabad January 2010 CLOUD COMPUTING FOR E-GOVERNANCE January 1, 2010 Table of Contents Executive Summary....................................................................................................................................... 3 1. E-Governance Requirements .......................................................................

Words: 4341 - Pages: 18

Premium Essay

Member

...Red Cloud Rising: Cloud Computing in China by Leigh Ann Ragland, Joseph McReynolds, Matthew Southerland, and James Mulvenon Research Report Prepared on Behalf of the U.S.-China Economic and Security Review Commission September 5, 2013 Revised March 22, 2014 After the publication of this report on September 5, 2013, Microsoft brought to the authors’ attention new information about its partnership with Chinese company 21Vianet. The original version of the report inaccurately characterized certain aspects of the Microsoft-21Vianet partnership. A revised discussion of this partnership is provided on pages 32-34. The authors would like to thank Microsoft for their assistance in clarifying the details of 21Vianet’s Windows Azure service. Disclaimer: This research report was prepared at the request of the Commission to support its deliberations. Posting of the Report to the Commission's website is intended to promote greater public understanding of the issues addressed by the Commission in its ongoing assessment of U.S.-China economic relations and their implications for U.S. security, as mandated by Public Law 106-398 and Public Law 108-7. However, it does not necessarily imply an endorsement by the Commission or any individual Commissioner of the views or conclusions expressed in this commissioned research report. i About Defense Group Incorporated Defense Group Inc. (DGI) performs work in the national interest, advancing public safety and national security through innovative...

Words: 25160 - Pages: 101

Free Essay

Public Policy and Technology

...technology to help realize his key agenda items. Government policymakers and business leaders also need to consider foundational technology and public policy issues, such as privacy, identity, architecture and the impact of Web 2.0. E-Governments is the future of any nation and as soon as Government moves towards Internet, the internal operations will be faster. More and More Governments are moving towards cloud computing and Web 2.0 service to implement public policy today. The biggest challenge in this is data security and maintaining the integrity of the data. This is one of the most difficult and important task to do. This is the biggest challenge for the governments all over the world. The last time that research houses published a special report on how technology would affect public policy and vice versa in the U.S. was during the aftermath of the 2000 presidential election. That report led to other special reports on the relationship of technology and public policy in other parts of the world. In those reports, we were optimistic about the prospects of technology's enablement of the public policy, including streamlining government in much the same way that IT has helped to improve efficiency in the private sector, and the prospects for the public's involvement in rule making and legislation. Our predictions at the time were pessimistic about the prospects for e-government citizen-facing portals, freedom from government surveillance through the Internet, and the ability...

Words: 1589 - Pages: 7

Premium Essay

Is Data Stored in the Cloud Free from Prying Eyes?

...data stored in the cloud free from prying eyes? Cloud storage is an internet service that provides storage to computer users. Those who use corporate or private e-mail servers do not store their communications in the cloud environment. Important legal rulings highlight the differences between the two ways for storing e-mail. This an internet service that provides storage to computers users who are online social networking websites were you can upload pictures and store messages in your inbox and profile and those who utilize web based email store their sent and received e-mail messages in the e-mail provider’s cloud environment. That is a very good question well I am sure people store data in different locations because you wouldn’t know when your pc or laptop would crush so for some this might be the reason. For other’s am sure it might be in order to hide something that they are doing behind some ones back and this does not mean they are free because at any time someone else might be able to find the information. I think the idea of computer use is being manipulated by some government systems. People should be careful. Due to the increase in technology most companies store their data in web sites and in the data cloud. Those who have the skill and knowledge store their information in private email servers and do not store their information in the cloud. When you store information in the cloud the law enforcement agencies consider e-mail stored in the cloud to be the company that...

Words: 672 - Pages: 3

Premium Essay

Case 2 E-Government

...Case 2 E-Government Increasing Productivity and Efficiency with Could and Mobile Technologies Question 1. Why are government agencies increasingly interested in using cloud and mobile technologies to accomplish their missions? Government agencies have found they could deliver the information and service by IT solutions. When using the IT in a more efficient and coordinated way, government agencies could accomplish more on tighter budgets. Using cloud computing, the federal government not only reduced the costs, but also created its large data centers. Overall, cloud and mobile technologies help a lot to improve productivity and efficiency. Question 2. Why is security even more important for government agencies than businesses in the private sector? Actually, the government should defend the country and with it, its citizens and corporations. The government agencies may have access to information and data including businesses in the private sector, even individuals in order to protect the national security. The national security is related to everyone in the country. If the country is not safe, the citizens could not live easily either. As the importance of the national security, the government agencies’ servers are usually targets for terrorists and unfriendly foreign governments. So creating a secure system and developing policies and procedures to protect the nation’s IT infrastructure from cyber threats are challenging, however, also very necessary. To some extent, the...

Words: 568 - Pages: 3

Premium Essay

The Effects of Cloud Computing on Enterprises N Terms of Cost and Security

...Concept of cloud computing was started in 2000s. Once this was introduced it has created a new business model and platform for many online business and technologies. To store any kind of data local servers will be used. But in today’s world with internet, the practice of using servers and networks on internet for storing, processing and managing any kind of data online is the concept of cloud computing (Margaret Rouse, 2015). Through this, both its platform and type of applications can be described, cloud computing provides its services in several layers to its users. By using this technology and internet applications can be run based on large data centers and servers. Cloud computing has gone through number of several phases including grid and utility computing (Margaret Rouse, 2015). Many enterprises have already started to implement cloud computing by knowing the potential of this technology. In 2012 according to IDG reports, (IDG ENTERPRISE MARKETING, 2016) the usage of cloud computing was 12% and by 2014 the number increased to 69% with the humongous change. The main reasons for many of enterprises to adopt to this technology was its cost and the flexibility to run any application faster than by the traditional method. Few features in could computing and its business functions like data analytics, data and storage management content management, conferencing solutions and collaborations. By 2015, 24% of enterprises used cloud computing for standardizing their IT budgets...

Words: 1234 - Pages: 5

Premium Essay

Computing Trends - Research Skills

...Research Proposal 3 1.1. Rationale and Context 3 1.2. Aims 4 1.3. Research Question 5 1.4. Proposed Research Method 5 1.5. Ethical and Access Issues 6 1.6. Potential Value of Research 7 2. Initial Literature Review 8 References 14 Research Skills 1. Research Proposal 2.1. Rationale and Context Cambridge City Government is an institution that is currently facing problems with the management of its information transfer over the internet. This is seen in the need to align data, particularly revenue streams, incomes and expenditures. In fact, the situation is worsened by an increasing city population, as well as amenities complexities that are placing a strain on the available internet facilities that serve the institution. As such, the proposed research study intends to analyse the role that cloud computing could play in solving the information transfer problems that face the government. The research results will act as the blueprint for the city administrators to develop and implement networking management approaches that will address its needs. I assume that if cloud computing is determined to be advantageous for the government, then its implementation will make it easier for the institution to meet its information management needs. This proposal describes the approach to research that will be adopted for the proposed study. Kenrick et al. (2010, pp. 293-294) argue that the cognitively driven constructs and context of any research would aid it in accepting...

Words: 3423 - Pages: 14

Premium Essay

Cloud Computing

...Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn (1). The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 (2). The key conclusion of this paper is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. This paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The security assessment is based on three use-case scenarios: 1) SME migration to cloud computing services, 2) the impact of cloud computing on service resilience, 3) cloud computing in e-Government (e.g., eHealth). The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive...

Words: 756 - Pages: 4

Premium Essay

Cloud Computing

...Introduction Cloud computing has the potential to change the face of the Information Technology (IT) industry. Industry experts maintain that the cloud will eventually become a primary component of computing activities conducted over the Internet. Presently, major corporations like Google, Amazon, Microsoft, and IBM have embraced this trend and are using the technology to enhance IT supported services. As the number of benefits and potential uses of the technology grows, the funding earmarked for assessments and implementation of cloud services will likely multiply. Cloud computing consists of immense benefits that allows end users to utilize services that include infrastructure, applications, data storage capacity. Last year, the Brookings Institution released a study that endorses the benefits of cloud computing to the government. The writer of the study, Darrell West, who is the vice president and director of government studies at Brookings, stated in the paper, “that agencies that have moved to the cloud generally enjoyed 25percent to 50 percent savings on their IT cost. For the federal government as a whole, this translates into billions in cost savings, depending on the scope of the transition” (West, 2011). Cloud computing consist of a network of servers that run services that are operated as shared platforms. The characteristics of cloud computing include on-demand services, pay-per-use services, broadband network access, multi-tenancy, rapid elasticity and scalability...

Words: 2173 - Pages: 9

Free Essay

Wfl: Strategic It Implications

...Law that have developed over the years teach us that the speed of technology will double, while the price will be cut by one-half, every 18 months. This rapid pace has forced companies to re-evaluate their IT infrastructure and their related business processes much more often and to look for ways to do things better, faster and cheaper. Reducing costs while increasing revenues is vital in business today and Government agencies are no exception to this rule. With the Federal deficit out of control the Government has been forced to limit budgets for its agencies and to put in place accountability measures. The company I will analyze in this paper is a Federal agency called the Western Federal Lands Highway Division (WFL), a child agency of the Federal Highway Administration. I will look at a number of technologies with the potential of reducing business costs while increasing productivity, and which may result in a flattening of the organization hierarchy. Forefront in all this is Telecommuting and its related technologies such as Teleconferencing, VPN, VoIP, and Cloud Computing. We will also analyze Enterprise applications and web services as another possible option to tie the functional areas of WFL together and determine whether it is cost effective to implement such a system. Background of WFL The purpose of WFL is to build Federal roads. According to their website, The Western Federal Lands Highway Division (WFL) operates as...

Words: 3150 - Pages: 13

Free Essay

Red Cloud

...Red Cloud Red Cloud was a warrior and a statesman. He was famous for his success in confrontations with the United States government this marked him as one of the most important Lakota leaders of the nineteenth century. His mother was an Oglala and his father, who died in Red Cloud's youth, was a Brulé Red Cloud, he was raised in the household of his maternal uncle, Chief Smoke. Red Cloud was born near the forks of the Platte River, Nebraska. He spent his early life at war against neighboring tribes. In 1841 he killed a neighboring clans chief which divided that tribe for 50 years. By doing this he obtained enormous respect within the Lakota nation for his leadership in territorial wars against neighboring tribes. In 1866, Red Cloud orchestrated the most successful war against the US ever fought by an Indian nation. The army was station along Bozeman Trail, which ran through the heart of Lakota territory. This area was filled with gold caravans of miners and settlers began to cross the Lakota's land, Red Cloud was haunted by the vision of Minnesota's expulsion of the Eastern Lakota in 1862 and 1863. For this he launched a series of assaults on the forts. On December of 1866, he won his most noticeable battle which was the crushing defeat of Lieutenant Colonel William Fetterman's column of eighty men just outside Fort Phil Kearny, Wyoming. The garrisons feared further attacks through the winter. Red Cloud's strategies were so successful that by the end of 1868 the United States...

Words: 490 - Pages: 2

Premium Essay

Mr, Student

...Executive Summary Following this introduction, background section describes the idea about mobile cloud computing, and also mentions recent development. Methodology section describes how we analyze the ethical issues based on mobile cloud computing. Objectives and aims section reports the social impact and ethical concern; however, we focus on five main fields. These fields are business, government, medical, education and cloud gaming with social influence and ethical issues. Following objectives and aims section, we report more details about these different fields. For example, in business field, some precautionary measures have already secured the enterprises and businesses by future cloud computing; in government field, national bar associations have released set of laws to allow attorneys’ use of mobile cloud computing; in medical field, form kinds of ethical values in its services, especially in the field of healthcare; in education field, some uploading resource of university  is whether lack of academic confidence or not; in entertainment field, due to cloud game, emotion between family and friends are sickness. In addition, we report and answer three questions based on different five fields respectively. Mobile Cloud Computing Introduction Mobile cloud computing is a combination of cloud computing and mobile technology to provide mobile devices unlimited computing resources, large amount of data storage capacity and lifting of heavy-duty tasks(Bateman & Wood,...

Words: 1073 - Pages: 5

Free Essay

Is535 Course Project

...Law that have developed over the years teach us that the speed of technology will double, while the price will be cut by one-half, every 18 months. This rapid pace has forced companies to re-evaluate their IT infrastructure and their related business processes much more often and to look for ways to do things better, faster and cheaper. Reducing costs while increasing revenues is vital in business today and Government agencies are no exception to this rule. With Federal deficit out of control the Government has been forced to limit budgets for its agencies and to put in place accountability measures. The Company we will analyze in this paper is a Federal agency called the Western Federal Lands Highway Division (WFL), a child agency of the Federal Highway Administration. We will look at a number of technologies with the potential of reducing business costs while increasing productivity, and which may result in a flattening of the organization hierarchy. Forefront in all this is Telecommuting and its related technologies such as Teleconferencing, VPN, VoIP, and Cloud Computing. We will also analyze Enterprise applications and web services as another possible option to tie the functional areas of WFL together and determine whether it is cost effective to implement such a system. The purpose of WFL is to build Federal roads. According to their website, The Western Federal Lands Highway Division (WFL) operates as part of the Federal Lands Highway Program, serving the needs...

Words: 3198 - Pages: 13