Browsing by Author "Mohamed, Elfadil A."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Cloud computing trends: A literature review(Richtmann Publishing Ltd, 2020-01) Taleb, Nasser; Mohamed, Elfadil A.This study is a literature review on cloud computing cloud computing trends as one the fastest growing technologies in the computer industry and their benefits and opportunities for all types of organizations. In addition, it addresses the challenges and problems that contribute to increasing the number of customers willing to adopt and use the technology. A mixed research study approach was adopted for the study, that is, by collecting and analyzing both quantitative and qualitative information within the same literature review and summarizing the findings of previous (related) studies. Results highlights the current and future trends of cloud computing and exposes readers to the challenges and problems associated with cloud computing. The reviewed literature showed that the technology is promising and is expected to grow in the future. Researchers have proposed many techniques to address the problems and challenges of cloud computing, such as security and privacy risks, through mobile cloud computing and cloud-computing governance. © 2020 Nasser Taleb and Elfadil A. Mohamed. This is an open access article licensed under the Creative Commons Attribution-NonCommercial 4.0 International LicenseItem Designing a generic information systems audit framework to improve the quality of audit in higher education(Science Publications, 2019) Mohamed, Elfadil A.; Elshareif, Elgilani; Mohamed, Omer Ishag EldaiThere are some similarities between Financial Statement Audit (FSA) and Information Systems Audit (ISA). FSA is an examination of the reliability and integrity of financial statement records, whereas ISA is a review and evaluation of the controls, risks and system development within an information systems infrastructure to ensure that the safeguards protect against abuse, protect assets, maintain data integrity and operate effectively to achieve the organization's objectives. Decision makers need to ensure a reliable collection and evaluation of the evidence of an organization's information systems, practices and operations. Data manipulation can be caused by external or internal threat. Internal manipulation threat is the most dangerous because it is committed by authorized personnel, which makes it very difficult to detect. In particular, the framework introduces an anomaly detection technique, a data mining method, to determine if the suspected transactions arose from internal or external threats. Once the suspected transactions are identified, procedures and monitoring controls will be in place to minimize each threat. The proposed framework is expected to help university and ministry of higher education managers at all levels to make vital decisions based on reliable and accurate information. © 2019 Elfadil A. Mohamed, Elgilani El. Elshareif and Omer Ishag Eldai Mohamed.