Analysis of Enabling and Inhibiting of Cloud Storage Restriction Policy Implementation in Higher Education: A Systematic Literature Review

Authors

  • Abdul Malik Karim Indonesia
  • Feby Artwodini Muqtadiroh Indonesia
Pages Icon

DOI:

https://doi.org/10.63158/journalisi.v8i1.1444

Keywords:

cloud storage restriction, higher education, systematic literature review, socio-technical systems, data governance

Abstract

This study examines enabling and inhibiting factors affecting the implementation of cloud storage restriction policies (e.g., quotas, retention/archiving, data classification, and exceptions) in higher education institutions. A PRISMA-guided systematic literature review was conducted using Scopus and complementary manual searches in Google Scholar, covering English-language publications from the last ten years. Following de-duplication and staged screening, 30 studies were included for synthesis. Findings were analyzed using the Socio-Technical Systems (STS) framework and mapped across People, Structure, Technology, and Process dimensions to capture the interplay between policy design, implementation practices, and technical enforcement. Results indicate that implementation success is driven by human readiness and governance capacity, especially continuous training and mentoring, clear communication, and leadership support that helps balance cost control with user acceptance and compliance. Technological enablers include adequate infrastructure, platform/service integration, and strong access control and information security mechanisms to ensure consistent enforcement. Key barriers include limited digital and data literacy, resistance to change and concerns about data deletion, uneven IT capacity across units, weak SOPs, siloed coordination, complex bureaucracy, vendor dependence, and budget constraints. The study recommends a holistic approach combining strengthened governance, standardized processes, targeted technology investment, and structured change management.

Downloads

Download data is not yet available.

References

[1] A. Santos, J. Martins, P. Duarte Pestana, R. Goncalves, H. Sao Mamede, and F. Branco, “Factors Affecting Cloud Computing Adoption in the Education Context - Systematic Literature Review,” IEEE Access, vol. 12, no. March, pp. 71641–71674, 2024, doi: 10.1109/ACCESS.2024.3400862.

[2] M. Yang, L. Tan, X. Chen, Y. Luo, Z. Xu, and X. Lan, “Laws and regulations tell how to classify your data: A case study on higher education,” Inf. Process. Manag., vol. 60, no. 3, p. 103240, 2023, doi: 10.1016/j.ipm.2022.103240.

[3] L. Halawi and A. Makwana, “The GDPR and UK GDPR and its impact on US academic institutions,” Issues Inf. Syst., vol. 24, no. 2, pp. 232–241, 2023, doi: 10.48009/2_iis_2023_120.

[4] Thomais Gkrimpizi, V. Peristeras, and I. Magnisalis, “Classification of Barriers to Digital Transformation in Higher Education Institutions: Systematic Literature Review,” Educ. Sci., vol. 13, no. 746, pp. 1–24, 2023.

[5] C. W. Budiyanto, R. Latifah, H. Saputro, A. Prananto, I. Education, and U. S. Maret, “The Barriers and Readiness to Deal With Digital Transformation in Higher Education,” TEM J., vol. 13, no. 1, pp. 334–348, 2024, doi: 10.18421/TEM131.

[6] B. Althani, “Migration challenges of legacy software to the cloud: a socio-technical perspective,” Cogent Bus. Manag., vol. 12, no. 1, p., 2025, doi: 10.1080/23311975.2025.2503421.

[7] D. Moher, A. Liberati, J. Tetzlaff, D. G. Altman, and T. P. Group, “Preferred Reporting Items for Systematic Reviews and Meta-Analyses : The PRISMA Statement,” Int. J. Surg., vol. 6, no. 7, 2010, doi: 10.1371/journal.pmed.1000097.

[8] S. C. Barbara Kitchenham, “Guidelines for performing systematic literature reviews in software engineering,” Ebse Tech. Rep., vol. 5, 2007.

[9] R. Dekker, P. van den Brink, and A. Meijer, “Social media adoption in the police: Barriers and strategies,” Gov. Inf. Q., vol. 37, no. 2, p. 101441, 2020, doi: 10.1016/j.giq.2019.101441.

[10] R. Hope Adams and I. I. Ivanov, “Using Socio-Technical System Methodology to Analyze Emerging Information Technology Implementation in the Higher Education Settings,” Int. J. e-Education, e-Business, e-Management e-Learning, vol. 5, no. 1, pp. 31–39, 2015, doi: 10.17706/ijeeee.2015.5.1.31-39.

[11] D. Pillen and M. Eckard, “The impact of the shift to cloud computing on digital recordkeeping practices at the University of Michigan Bentley historical library,” Arch. Sci., no. 0123456789, 2022, doi: 10.1007/s10502-022-09395-2.

[12] S. Mahmood, M. Chadhar, and S. Firmin, “Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective,” Appl. Sci., vol. 14, no. 24, 2024, doi: 10.3390/app142411610.

[13] C. K. Jim and H. C. Chang, “The current state of data governance in higher education,” Proc. Assoc. Inf. Sci. Technol., vol. 55, no. 1, pp. 198–206, 2018, doi: 10.1002/pra2.2018.14505501022.

[14] C. K. Wong and R. Parthasarathy, “University student data privacy, security and policy management,” Eur. Chem. Bull., vol. 12, no. 5, pp. 3398–3402, 2023, doi: 10.48047/ecb/2023.12.si5a.0227.

[15] B. Ghodoosi, T. West, Q. Li, G. Torrisi-Steele, and S. Dey, “A systematic literature review of data literacy education,” J. Bus. Financ. Librariansh., vol. 28, no. 2, pp. 112–127, 2023, doi: 10.1080/08963568.2023.2171552.

[16] N. Wang, H. Liang, S. Ge, Y. Xue, and J. Ma, “Enablers and inhibitors of cloud computing assimilation: an empirical study,” Internet Res., vol. 29, no. 6, pp. 1344–1369, 2019, doi: 10.1108/INTR-03-2018-0126.

[17] E. Santos, M. Carvalho, and S. Martins, “Sustainable Enablers of Knowledge Management Strategies in a Higher Education Institution,” Sustain. , vol. 16, no. 12, 2024, doi: 10.3390/su16125078.

[18] A. I. Regla and P. S. Marquez, “Workplace document management system employing cloud computing and social technology,” in Comput. Sci. Technol.: 6th ICCST 2019, Kota Kinabalu, Malaysia, Aug. 29–30, 2019, Singapore: Springer, 2020, pp. 415–424, doi: 10.1007/978-981-15-0058-9_40.

[19] D. Kolevski and K. Michael, “Cloud computing data breaches: A socio-technical review of literature,” in Proc. 2015 Int. Conf. Green Comput. Internet Things (ICGCIoT), Oct. 2015, pp. 1486–1495.

[20] P. Reid, “Categories for barriers to adoption of instructional technologies,” Educ. Inf. Technol., vol. 19, no. 2, pp. 383–407, 2014, doi: 10.1007/s10639-012-9222-z.

[21] A. N. Tashkandi and I. M. Al-Jabri, “Cloud computing adoption by higher education institutions in Saudi Arabia: An exploratory study,” Cluster Comput., vol. 18, no. 4, pp. 1527–1537, 2015, doi: 10.1007/s10586-015-0490-4.

[22] B. M. R. Wilson, B. Khazaei, and L. Hirsch, “Enablers and Barriers of Cloud Adoption among Small and Medium Enterprises in Tamil Nadu,” Proc. - 2015 IEEE Int. Conf. Cloud Comput. Emerg. Mark. CCEM 2015, pp. 140–145, 2016, doi: 10.1109/CCEM.2015.21.

[23] J. Fernandes, C. Machado, and L. Amaral, “Towards a readiness model derived from critical success factors, for the general data protection regulation implementation in higher education institutions,” Strateg. Manag., vol. 28, no. 1, pp. 4–19, 2023, doi: 10.5937/straman2200033f.

[24] I. S. Bianchi and R. D. Sousa, “IT Governance mechanisms in higher education,” Procedia - Procedia Comput. Sci., vol. 100, pp. 941–946, 2016, doi: 10.1016/j.procs.2016.09.253.

[25] J. Mcleod, “Using the cloud for records storage : issues of trust,” Arch. Sci., vol. 17, no. 4, pp. 349–370, 2017, doi: 10.1007/s10502-017-9280-5.

[26] T. Fiebig et al., Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom, vol. 2023, no. 2. 2023. doi: 10.56553/popets-2023-0044.

[27] W. M. Al-Rahmi, N. Yahaya, M. M. Alamri, N. A. Aljarboa, Y. Bin Kamin, and F. A. Moafa, “A model of factors affecting cyber bullying behaviors among university students,” IEEE Access, vol. 7, pp. 2978–2985, 2019, doi: 10.1109/ACCESS.2018.2881292.

[28] H. Aydin, “A Study of Cloud Computing Adoption in Universities as a Guideline to Cloud Migration,” SAGE Open, vol. 11, no. 3, 2021, doi: 10.1177/21582440211030280.

[29] M. B. Ali, T. Wood-Harper, and M. Mohamad, “Benefits and challenges of cloud computing adoption and usage in higher education: A systematic literature review,” Int. J. Enterp. Inf. Syst., vol. 14, no. 4, pp. 64–77, 2018, doi: 10.4018/IJEIS.2018100105.

[30] V. K. and C. V. Brown, “Designing data governance,” Commun. ACM, vol. 53, no. 1, 2015, doi: 10.1145/1629175.1629210.

[31] V. M. P. D. dos S. Bruno Miguel Vital Bernardoa, Henrique S~ao Mamedeb, Jo~ao Manuel Pereira Barrosoa, “Data governance & quality management—Innovation and breakthroughs across different field,” J. Innov. Knowl., vol. 9, 2024, doi: 10.1016/j.jik.2024.100598.

[32] Y. Bounagui, A. Mezrioui, and H. Hafiddi, “Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models,” Comput. Stand. Interfaces, vol. 62, pp. 98–118, 2019, doi: 10.1016/j.csi.2018.09.001.

[33] F. Cai, N. Zhu, J. He, P. Mu, W. Li, and Y. Yu, “Survey of access control models and technologies for cloud computing,” Cluster Comput., vol. 22, suppl. 3, pp. 6111–6122, 2019, doi: 10.1007/s10586-018-1850-7.

[34] S. Ahmad, S. Mehfuz, F. Mebarek-Oudina, and J. Beg, “RSM analysis based cloud access security broker: A systematic literature review,” Cluster Comput., vol. 25, no. 5, pp. 3733–3763, 2022, doi: 10.1007/s10586-022-03598-z.

[35] A. Kankanhalli, H. H. Teo, B. C. Y. Tan, and K. K. Wei, “An integrative study of information systems security effectiveness,” Int. J. Inf. Manage., vol. 23, no. 2, pp. 139–154, 2003, doi: 10.1016/S0268-4012(02)00105-6.

[36] T. Herath and H. R. Rao, “Protection motivation and deterrence: A framework for security policy compliance in organisations,” Eur. J. Inf. Syst., vol. 18, no. 2, pp. 106–125, 2009, doi: 10.1057/ejis.2009.6.

[37] D. Yimam and E. B. Fernandez, “A survey of compliance issues in cloud computing,” J. Internet Serv. Appl., vol. 7, no. 1, 2016, doi: 10.1186/s13174-016-0046-8.

[38] A. Q. Khan, M. Matskin, R. Prodan, C. Bussler, D. Roman, and A. Soylu, “Cost modelling and optimisation for cloud : a graph ‑ based approach,” J. Cloud Comput., vol. 13, no. 1, 2024, doi: 10.1186/s13677-024-00709-6.

[39] J. Opara-Martins, R. Sahandi, and F. Tian, “Critical analysis of vendor lock-in and its impact on cloud computing migration: A business perspective,” J. Cloud Comput., vol. 5, no. 1, Art. no. 4, 2016, doi: 10.1186/s13677-016-0054-z.

[40] M. J. Page et al., “The PRISMA 2020 statement: An updated guideline for reporting systematic reviews,” BMJ, vol. 372, 2021, doi: 10.1136/bmj.n71.

Downloads

Published

2026-02-17

Issue

Section

Articles

How to Cite

[1]
A. M. Karim and F. A. Muqtadiroh, “Analysis of Enabling and Inhibiting of Cloud Storage Restriction Policy Implementation in Higher Education: A Systematic Literature Review”, journalisi, vol. 8, no. 1, pp. 355–378, Feb. 2026, doi: 10.63158/journalisi.v8i1.1444.

Most read articles by the same author(s)