{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T07:23:15Z","timestamp":1777447395667,"version":"3.51.4"},"reference-count":73,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,1]]},"abstract":"<p>Cloud computing is not associated with a specific technology, instead it as an alternative method to deliver technology as a service. This article investigates current cloud computing adoption in the United States (USA) and United Kingdom (UK) hedge fund industry. Hedge fund technologists, prime service consultants, technology service providers, industry application vendors, investors and an independent information security consultant participated were surveyed for this article. The article acknowledges the growth of cloud computing in the hedge fund sector. This research work also highlights that the private cloud definition is vague and requires further classification, elaborating on the variants of private cloud. This is important as the variants of private cloud computing offer varying benefits and risk which the hedge fund sector has proven to be sensitive. Equally, this article argues that some of the current security concerns are over-stated and perhaps reflect a conservative decision making framework rather than a realistic consideration of the options.<\/p>","DOI":"10.4018\/jcit.2019070101","type":"journal-article","created":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T13:03:57Z","timestamp":1556024637000},"page":"1-25","source":"Crossref","is-referenced-by-count":7,"title":["Investigation Into Cloud Computing Adoption Within the Hedge Fund Industry"],"prefix":"10.4018","volume":"21","author":[{"given":"Thomas","family":"Cole","sequence":"first","affiliation":[{"name":"University of Liverpool, Liverpool, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amit Kumar","family":"Bhardwaj","sequence":"additional","affiliation":[{"name":"Thapar University, Dera Bassi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3868-0481","authenticated-orcid":true,"given":"Lalit","family":"Garg","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, University of Malta, Msida, Malta"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Divya Prakash","family":"Shrivastava","sequence":"additional","affiliation":[{"name":"Higher Colleges of Technology, Dubai, United Arab Emirates"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"JCIT.2019070101-0","unstructured":"W3. (2013). Cloud computing accessibility - research and development working group wiki. Retrieved from http:\/\/www.w3.org\/WAI\/RD\/wiki\/Cloud_Computing_Accessibility"},{"key":"JCIT.2019070101-1","doi-asserted-by":"crossref","unstructured":"AlZain, M. A., Soh, B., & Pardede, E. (2013). A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds.Journal of Software, 8(5), 1068\u20131078.","DOI":"10.4304\/jsw.8.5.1068-1078"},{"key":"JCIT.2019070101-2","year":"2011"},{"key":"JCIT.2019070101-3","unstructured":"AIMA. (n.d.). Guide to Sound Practices for Business Continuity Management 2012. Retrieved from http:\/\/www.aima.org\/en\/document-summary\/index.cfm\/docid\/E852F9E8-C63D-48FD-BAE92412222E6FBD"},{"issue":"1","key":"JCIT.2019070101-4","first-page":"223","volume":"3","year":"2012)","journal-title":"Cloud Computing for Increased Business Value."},{"key":"JCIT.2019070101-5","unstructured":"Amin, B. (2013, January 28). Technology takes centre stage as hedge fund compliance and investor reporting increases. Risk.net. Retrieved from http:\/\/www.risk.net\/hedge-funds-review\/feature\/2248769\/technology-takes-centre-stage-hedge-fund-compliance-investor-reporting-increases"},{"key":"JCIT.2019070101-6","unstructured":"AWS. (2013). Amazon Virtual Private Cloud (VPC) \u2013 Secure Private Cloud VPN. Retrieved from http:\/\/aws.amazon.com\/vpc\/"},{"key":"JCIT.2019070101-7","unstructured":"British Informatics Society Ltd. (BCS). (2012). Cloud computing moving IT out of the office. Swindon, GBR: British Informatics Society Ltd."},{"key":"JCIT.2019070101-8","unstructured":"Beckman, M. (2012). Using the Cloud for Business Continuity. System iNEWS, (387), 9-12."},{"key":"JCIT.2019070101-9","unstructured":"Butler, B. (2012). Are community cloud services the next hot thing? Network World. Retrieved from http:\/\/www.networkworld.com\/news\/2012\/030112-are-community-cloud-services-the-256869.html"},{"key":"JCIT.2019070101-10","unstructured":"Castro, D. (2013). 2013 cloud computing costs. ITIF.org. Retrieved from http:\/\/www2.itif.org\/2013-cloud-computing-costs.pdf"},{"key":"JCIT.2019070101-11","unstructured":"Cloud Industry Forum (CIF). (2013). About Us. Retrieved from http:\/\/www.cloudindustryforum.org\/about-us"},{"key":"JCIT.2019070101-12","unstructured":"Ciphercloud. (2013). Data Encryption for the Cloud. Retrieved from http:\/\/www.ciphercloud.com\/cloud-encryption.aspx"},{"key":"JCIT.2019070101-13","unstructured":"Cisco. (2016). Cisco Global Cloud Index: Forecast and Methodology, 2016\u20132021 [White Paper]. Retrieved from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/global-cloud-index-gci\/white-paper-c11-738085.html#_Toc503317522"},{"key":"JCIT.2019070101-14","unstructured":"CITI. (2011). Managing your hedge fund IT spend to achieve differentiation. Retrieved from http:\/\/www.firstderivatives.com\/downloads\/Managing_Your_Hedge_Fund_IT_Spend_to_Achieve_Differentiation.pdf"},{"key":"JCIT.2019070101-15","unstructured":"Cloud Security Alliance (CSA). (2012). Cloud Maturity Study Reveals the Top 10 Issues Eroding Cloud Confidence. Retrieved from https:\/\/cloudsecurityalliance.org\/media\/news\/cloud-maturity-study-reveals-top-issues\/"},{"key":"JCIT.2019070101-16","unstructured":"Cloud Security Alliance (CSA). (2013). About Us. Retrieved from https:\/\/cloudsecurityalliance.org\/about\/"},{"key":"JCIT.2019070101-17","unstructured":"Cloud Security Alliance (CSA). (2013). Cloud Controls Matrix (CCM): Cloud Security Alliance. Retrieved from https:\/\/cloudsecurityalliance.org\/research\/ccm\/"},{"key":"JCIT.2019070101-18","unstructured":"Cloud Security Alliance (CSA). (2013). The Notorious Nine Cloud Computing Top Threats in 2013. Retrieved from https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/top_threats\/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf"},{"key":"JCIT.2019070101-19","unstructured":"Curtis, S. (2013). Google boosts cloud security with automatic encryption. Google - News on Maps, Chrome, Android and Street View"},{"key":"JCIT.2019070101-20","unstructured":"Dawson, C. (2009). Projects in Computing and Information Systems: A Student's Guide (2nd ed.). Canada: Pearson."},{"key":"JCIT.2019070101-21","unstructured":"Deloitte. (2013). 2013 Hedge Fund Outlook. Some gains, more pain. Retrieved from http:\/\/www.deloitte.com\/assets\/Dcom-CaymanIslands\/Local%20Assets\/Documents\/2013_Hedge_Fund_Outlook.pdf"},{"key":"JCIT.2019070101-22","unstructured":"Deloitte. (n.d.). Cloud computing Market overview and perspective. Retrieved from https:\/\/www.deloitte.com\/assets\/Dcom-Global\/LocalAssets\/Documents\/TMT\/cloud_-_market_overview_and_perspective.pdf"},{"key":"JCIT.2019070101-23","unstructured":"Desisto, R. (2013). The Right Definition of SaaS Will Reduce Its Business Value Uncertainties. Gartner. Retrieved from http:\/\/my.gartner.com\/portal\/server.pt?open=512&objID=260&mode=2&PageID=3460702&resId=2573218&ref=QuickSearch&sthkw=SaaS+enables+enterprises+or+consumers+to+access+application+functionality"},{"key":"JCIT.2019070101-24","first-page":"20","article-title":"Cloud supports business as usual","year":"2013","journal-title":"M"},{"key":"JCIT.2019070101-25","year":"2013","journal-title":"Eze Castle Integration Introduces Eze App Cloud for Application Vendors"},{"key":"JCIT.2019070101-26","unstructured":"ECI. (2013). Hedge Fund Private Cloud Services. Retrieved from http:\/\/www.eci.com\/services\/"},{"key":"JCIT.2019070101-27","article-title":"Eze castle integration market survey finds eight out of ten hedge funds and investment firms are adopting cloud computing solutions.","year":"2012","journal-title":"Business Wire."},{"key":"JCIT.2019070101-28","unstructured":"EzeCastle. (2013). A guide to establishing a hedge fund. Retrieved from http:\/\/www.eci.com\/pdf\/A%20Guide%20to%20Establishing%20a%20Hedge%20Fund.pdf"},{"key":"JCIT.2019070101-29","unstructured":"FCA. (2013). FCA Handbook. Retrieved from http:\/\/media.fshandbook.info\/content\/FCA\/COBS\/11\/8.pdf"},{"key":"JCIT.2019070101-30","unstructured":"FCA. (2013). FCA Handbook - Information Security. Retrieved from http:\/\/media.fshandbook.info\/content\/FCA\/SYSC\/13\/7.pdf"},{"key":"JCIT.2019070101-31","unstructured":"FINCEN. (n.d.). USA Patriot Act. Retrieved from http:\/\/www.fincen.gov\/statutes_regs\/patriot\/"},{"key":"JCIT.2019070101-32","unstructured":"Framingham, M. (2011). IDC forecasts public IT cloud services spending will approach $100 Billion in 2016, Generating 41% of growth in Five Key IT categories. Retrieved from http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS23684912"},{"key":"JCIT.2019070101-33","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330685"},{"key":"JCIT.2019070101-34"},{"key":"JCIT.2019070101-35","unstructured":"Gross, J. (2013). Compliance technology now a necessity for hedge funds. Forbes. Retrieved from http:\/\/www.forbes.com\/sites\/judygross\/2013\/07\/08\/compliance-technology-now-a-necessity-for-hedge-funds\/"},{"key":"JCIT.2019070101-36","unstructured":"Harsh, P., Dudouet, F., Cascella, R.G., J\u00e9gou, Y. & Morin, C. (2012). Using open standards for interoperability - issues, solutions, and challenges facing cloud computing."},{"key":"JCIT.2019070101-37","unstructured":"Hedge Fund Intelligence. (2013). Global hedge fund assets top $2.2 trillion as the big firms dominate. Retrieved from http:\/\/www.hedgefundintelligence.com\/Article\/3207562\/Global-hedge-fund-assets-top-22-trillion-as-the-big-firms-dominate.html"},{"key":"JCIT.2019070101-38","unstructured":"Hedgefund Marketing. (2016). Hedge funds have their heads in the cloud. Retrieved from http:\/\/www.hedgefundmarketing.org\/hedge-funds-have-their-heads-in-the-cloud\/"},{"key":"JCIT.2019070101-39","unstructured":"Heiser, J. & Bona, A. (2013). Cloud Contracts Need Security Service Levels to Better Manage Risk."},{"key":"JCIT.2019070101-40","unstructured":"Hill, S. & Wright, R. (2013). The cloud takes shape - Global cloud survey: the implementation challenge - the-cloud-takes-shapev3. Retrieved from http:\/\/www.kpmg.com\/Global\/en\/IssuesAndInsights\/ArticlesPublications\/cloud-service-providers-survey\/Documents\/the-cloud-takes-shapev3.pdf"},{"key":"JCIT.2019070101-41","unstructured":"Intel. (2012). What\u2019s holding back the cloud. Retrieved from http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/reports\/whats-holding-back-the-cloud-peer-research-report2.pdf"},{"key":"JCIT.2019070101-42","unstructured":"Jones, S. (2013, April). Dog days for hedge funds forced to cut fees. Financial Times. Retrieved from http:\/\/www.ft.com\/cms\/s\/0\/a99b59f8-ae8a-11e2-8316-00144feabdc0.html#axzz2Zl7PFMWj"},{"key":"JCIT.2019070101-43","unstructured":"Keidan, M. & Kelly, J. (2016). Hedge in the cloud: funds outsourcing computing power step into unknown. Reuters. Retrieved from https:\/\/www.reuters.com\/article\/uk-hedgefunds-technology-cloud-idUSKBN13D1WD"},{"key":"JCIT.2019070101-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2016.10.003"},{"key":"JCIT.2019070101-45","unstructured":"Kumar, K. (2015). Cloud computing to make hedge funds operations more efficient. HedgeThink. Retrieved from https:\/\/www.hedgethink.com\/cloud-computing-to-make-hedge-funds-operations-more-efficient\/"},{"key":"JCIT.2019070101-46","unstructured":"Kundra, V. (2011). Federal Cloud Computing Strategy - federal-cloud-computing-strategy. Retrieved from http:\/\/www.dhs.gov\/sites\/default\/files\/publications\/digital-strategy\/federal-cloud-computing-strategy.pdf"},{"key":"JCIT.2019070101-47","unstructured":"Lheureux, B., Plummer, D., Wynne, N., Caffery, B., & Buckner, J. & Beazley, I. (2012). A CIO primer on cloud services brokerage. Gartner. Retrieved from http:\/\/my.gartner.com\/portal\/server.pt?open=512&objID=260&mode=2&PageID=3460702&docCode=245329&ref=docDisplay"},{"key":"JCIT.2019070101-48","unstructured":"London Stock Exchange (LSE). (n.d.). Exchange Hosting. Retrieved from http:\/\/www.londonstockexchange.com\/products-and-services\/connectivity\/hosting\/hosting.htm"},{"key":"JCIT.2019070101-49","unstructured":"Mckendrick, J. (2011). Cloud computing's vendor lock-in problem: Why the industry is taking a step backward. Forbes. Retrieved from http:\/\/www.forbes.com\/sites\/joemckendrick\/2011\/11\/20\/cloud-computings-vendor-lock-in-problem-why-the-industry-is-taking-a-step-backwards\/"},{"key":"JCIT.2019070101-50","unstructured":"Mckendrick, J. (2013). 5 benefits of cloud computing you aren't likely to see in a sales brochure. Forbes. Retrieved from http:\/\/www.forbes.com\/sites\/joemckendrick\/2013\/07\/21\/5-benefits-of-cloud-computing-you-arent-likely-to-see-in-a-sales-brochure\/"},{"key":"JCIT.2019070101-51","unstructured":"Mell, P. & Grance, T. (2011). NIST SP 800-145, The NIST Definition of Cloud Computing - SP800-145. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"JCIT.2019070101-52","unstructured":"Mergenthaler, K. (n.d.). Man vs. Machine: An Analysis of Fundamental and Quantitative Strategies. JP Morgan. Retrieved from http:\/\/www.jpmorgan.com\/tss\/General\/Analysis_of_Fundamental_and_Quantitative_Strategies\/1159326765818"},{"key":"JCIT.2019070101-53","unstructured":"Mukhopadhyay, D., Sonawane, G., Gupta, P.S., Bhavsar, S. & Mittal, V. (2013). Enhanced security for cloud storage using file encryption."},{"key":"JCIT.2019070101-54","unstructured":"Openstack. (2013). OpenStack open source cloud computing software. Retrieved from http:\/\/www.openstack.org\/"},{"key":"JCIT.2019070101-55","unstructured":"Petri, G., & Haynes, T. & Koehler-Kruner, H. (2013). Cool vendors in the european cloud computing market. Gartner. Retrieved from http:\/\/my.gartner.com\/portal\/server.pt?open=512&objID=260&mode=2&PageID=3460702&resId=2452816&ref=QuickSearch&sthkw=cool+vendors+in+the+european+cloud"},{"key":"JCIT.2019070101-56","unstructured":"PriceWaterhouseCoopers (PWC). (2012). NY-13-0296 FSV From good to growth HEDGEFUNDS - PWC hedge fund growth investors-owners. Retrieved from http:\/\/www.pwc.com\/en_US\/us\/financial-services\/publications\/viewpoints\/assets\/pwc-hedge-fund-growth-investors-owners.pdf"},{"key":"JCIT.2019070101-57","unstructured":"RightScale. (2013). Manage your cloud resources with RightScale. Retrieved from http:\/\/www.rightscale.com\/products\/"},{"key":"JCIT.2019070101-58","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.imu.2016.01.002","article-title":"Discovery of medical Big Data analytics: Improving the prediction of traumatic brain injury survival rates by data mining Patient Informatics Processing Software Hybrid Hadoop Hive.","volume":"1","author":"J. A.Rodger","year":"2015","journal-title":"Informatics in Medicine Unlocked"},{"key":"JCIT.2019070101-59","unstructured":"Schmerken, I. 7\/1\/2013, 2013-last update, Majority of Investors Send Operational Due Diligence Teams to Hedge Funds. Retrieved from http:\/\/www.wallstreetandtech.com\/regulatory-compliance\/majority-of-investors-send-operational-d\/240157628"},{"key":"JCIT.2019070101-60","unstructured":"Sloane, K. (2014). Cloud computing: The growing competitive advantage for hedge funds. ECI. Retrieved from https:\/\/www.eci.com\/blog\/15694-cloud-computing-the-growing-competitive-advantage-for-hedge-funds.html"},{"key":"JCIT.2019070101-61","doi-asserted-by":"crossref","unstructured":"Strachman, D. A. (2012). The fundamentals of hedge fund management (2nd ed.). Hoboken, NJ: Wiley.","DOI":"10.1002\/9781119204947"},{"key":"JCIT.2019070101-62","doi-asserted-by":"publisher","DOI":"10.28945\/1414"},{"key":"JCIT.2019070101-63","unstructured":"Sulivan, P. & Thompson, E. (2013). Magic Quadrant for CRM Service Providers, Worldwide. Gartner. Retrieved from http:\/\/my.gartner.com\/portal\/server.pt?open=512&objID=260&mode=2&PageID=3460702&resId=2592020&ref=QuickSearch&sthkw=CRM+SaaS"},{"key":"JCIT.2019070101-64","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408789"},{"issue":"181","key":"JCIT.2019070101-65","first-page":"11","article-title":"Cloud Computing\u2019s Cost Savings Drive Acceptance.","volume":"174","author":"H.Tilbury","year":"2009","journal-title":"American Banker"},{"key":"JCIT.2019070101-66","unstructured":"Tozer-Pennington. V. (2011). Operational infrastructure at hedge funds comes under closer scrutiny. Risk.net. Retrieved from http:\/\/www.risk.net\/operational-risk-and-regulation\/feature\/1931777\/hedge-funds-operational-infrastructure-scrutiny"},{"key":"JCIT.2019070101-67","unstructured":"Ubide, A. (2006). Demystifying Hedge. IMF. Retrieved from http:\/\/www.imf.org\/external\/pubs\/ft\/fandd\/2006\/06\/basics.htm"},{"issue":"1","key":"JCIT.2019070101-68","first-page":"40","article-title":"Mobile computing and cloud maturity - Introducing machine learning for ERP configuration automation.","volume":"17","year":"2013","journal-title":"Informa\u00e7\u00f5es Econ\u00f4micas"},{"key":"JCIT.2019070101-69","unstructured":"Varia, J. (2013). The total cost of (non) ownership of web application in cloud. Amazon Web Services. Retrieved from http:\/\/media.amazonwebservices.com\/AWS_TCO_Web_Applications.pdf"},{"key":"JCIT.2019070101-70","unstructured":"VMWARE. (2011). VMware Business Agility and the True Economics of Cloud Computing White Paper. Retrieved from https:\/\/www.vmware.com\/files\/pdf\/accelerate\/VMware_Business_Agility_and_the_True_Economics_of_Cloud_Computing_White_Paper.pdf"},{"key":"JCIT.2019070101-71","unstructured":"Yuvraj, S.G. & Vijay, S.R. (2013). Rebalancing the IT Equation with Cloud Computing to drive Business Agility. International Journal of Innovative Technology and Exploring Engineering, (3), 123."},{"key":"JCIT.2019070101-72","unstructured":"Ziman, I. (2012). Towards a Hedge Fund Infrastructure Blueprint. IPEDR. Retrieved from http:\/\/www.ipedr.com\/vol55\/015-ICEBM2012-K00043.pdf"}],"container-title":["Journal of Cases on Information Technology"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=227675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T17:59:24Z","timestamp":1651859964000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JCIT.2019070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":73,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jcit.2019070101","relation":{},"ISSN":["1548-7717","1548-7725"],"issn-type":[{"value":"1548-7717","type":"print"},{"value":"1548-7725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}