scholarly journals Cost Modeling and Risk and Benefit Modeling Approach as a Tools For Decision Making in Adoption Cloud Computing as IT Strategic Business

2014 ◽  
Vol 3 (2) ◽  
pp. 63-68 ◽  
Author(s):  
Rian Rahmanda Putra ◽  
Wanda Kinasih ◽  
Dana Indra Sensuse

Cloud computing is an innovation that allows the use of IT as a utility based on-demand. Since cloud computing is a new technology, its led to a variety of risks that required an assessment model to assess the organization's readiness to adopt cloud computing. Moreover, by using cloud computing services means organizations or outsourcing involves a third party. Before adopting cloud computing technology, organizations need to consider some of the effects that arise as a result of cloud computing, namely in terms of costs, risks and benefits. To assist organizations to consider the migration of existing IT systems to the cloud, it can be used the cost approach valuation models and risk and benefit. This paper discusses two models of cost-based assessment of risk and benefit modeling and modeling that can be used as a tool to assist organizations in making decisions related to the migration of existing IT systems to the cloud. 

2010 ◽  
pp. 1379-1390
Author(s):  
Delyth Samuel ◽  
Danny Samson

Governments provide a wide range of services, and the digital economy provides both threats and opportunities in this sector. The Transport Accident Commission (TAC) is a compulsory, government owned and operated insurance scheme for third-party, no-fault liability insurance for transport accident victims, operated in Victoria, Australia. E-business has now been widely used in all sectors from small business (Loane, McNaughton, & Bell, 2004) to emerging economies (Li & Chang, 2004), and in very different industry sectors (Cagno, Di Giulio, & Trucco, 2004; Golden, Hughes, & Gallagher, 2003). Major steps forward and applications have occurred in retailing (Leonard & Cronan, 2003; Mackay, Altmann, & McMichael, 2003; Starr, 2003). Applications need to be highly customized as the business-to-consumer (B2C) and business-to-business (B2B) environments are very different, and requirements of industries such as retailing and mining, and indeed government, differ substantially (Carter, 2003; He & Lung, 2002; Rotondaro, 2002). Government provides a particularly different environment for e-business applications because government services are often delivered in monopoly circumstances, with no real profit motive behind them. At the height of the technology boom in October 1999, Tony Marxsen joined the TAC as head of IT to develop a new IT outsourcing contract for the organization as the current 5-year contract was due to end in July 2000. He quickly realized that the TAC IT systems were out of date, lacked IT process integration, and were constraining improvement in business processes, and that no significant investments had been made for some time. Renewing or redesigning the outsourcing contract, the basis for which he had been employed, would only be a short-term solution. The problem was that the cost of new infrastructure would be high, and return on technology investment would mainly be realized from redesigned business processes enabled by the new technology. Tony wanted to propose a business transformation, with process changes as well as significant investment in IT infrastructure. Together, these would take the TAC from 1970s technology into the 21st century. The problem was that their (investments in such transformation) payoffs are not easily and quickly achieved. Their value does not come from installing the technology; it comes from changing both operating and management processes—perhaps operating and managing cultures too. (Ross & Beath, 2002, p. 53) Tony knew he would have to win the support of the board and senior management, but he could not immediately give them a concrete business case for the investment. He also knew that any infrastructure investment had to be linked with a major process-improvement initiative from the start to avoid the double investment of building new applications to support old processes, and then undertaking major modifications or even replacement when the need for improvement became obvious to the board and management team. He compared investing in IT infrastructure to rewiring and replumbing your house: as far as visitors are concerned, there’s no visible difference, everything’s behind the walls, but as the owner you get the benefits of things like cheaper electricity and water bills because of efficiencies in the new redesigned systems. The problem is convincing people that they will get these results in the future, but that they need to hand over the money now, when there’s no hard evidence for the benefits they’ll get, just a bunch of assumptions and no guarantees. It’s a big ask for any Board. (Marxsen, personal communication, September 4, 2003) Tony knew that the first hurdle he would have to overcome would be getting the board to agree to give him the opportunity to put together a team to develop a business case for the board’s further consideration.


Author(s):  
Yuyu Chou ◽  
Jan Oetting

The use of Cloud Computing services is an attractive option to improve IT systems to achieve rapidly and elastically provisioned capability, and also to offer economic benefits. However, companies see security as a major concern in migrating to the Cloud. To bring clarity in Cloud security, this paper presents a systematic approach to manage the risks and analyzes the full range of risk in Cloud Computing solutions. Furthermore, as a study case, Google App Engine Platform is assessed based on ISO/IEC 27002 and OWASP Top 10 Risk List in this paper. Knowing the risks of Cloud solutions, companies can execute well-informed decisions on going into the Cloud and build their Cloud solutions in a secure way, relying on a robust e-trust relationship.


TEM Journal ◽  
2020 ◽  
pp. 915-923 ◽  
Author(s):  
Ekkachat Baikloy ◽  
Prasong Praneetpolgrang ◽  
Nivet Jirawichitchai

The research objectives were: 1) to develop cyber resilient model, 2) to develop the cyber resilient capability maturity model and 3) to develop self-assessment model for cyber resilient capability of cloud computing services which are qualitative and applicative research. Referring to the cybersecurity concept from National Institute of Standards and Technology (NIST) from the in-depth interview, focusgroup discussion was developed with cybersecurity experts and data collection from cloud services providers. It was found that trend of cyber-attacks was violent with smarter method. The authors had synthesized the concept of cyber resilient capability maturity model for cloud computing services including developed application for cloud services providers to evaluate their organization in order to improve the better cybersecurity level in cloud computing services and the cyber resilient capability maturity model in the future.


2011 ◽  
pp. 3878-3889
Author(s):  
Delyth Samuel ◽  
Danny Samson

Governments provide a wide range of services, and the digital economy provides both threats and opportunities in this sector. The Transport Accident Commission (TAC) is a compulsory, government owned and operated insurance scheme for third-party, no-fault liability insurance for transport accident victims, operated in Victoria, Australia. E-business has now been widely used in all sectors from small business (Loane, McNaughton, & Bell, 2004) to emerging economies (Li & Chang, 2004), and in very different industry sectors (Cagno, Di Giulio, & Trucco, 2004; Golden, Hughes, & Gallagher, 2003). Major steps forward and applications have occurred in retailing (Leonard & Cronan, 2003; Mackay, Altmann, & McMichael, 2003; Starr, 2003). Applications need to be highly customized as the business-to-consumer (B2C) and business-to-business (B2B) environments are very different, and requirements of industries such as retailing and mining, and indeed government, differ substantially (Carter, 2003; He & Lung, 2002; Rotondaro, 2002). Government provides a particularly different environment for e-business applications because government services are often delivered in monopoly circumstances, with no real profit motive behind them. At the height of the technology boom in October 1999, Tony Marxsen joined the TAC as head of IT to develop a new IT outsourcing contract for the organization as the current 5-year contract was due to end in July 2000. He quickly realized that the TAC IT systems were out of date, lacked IT process integration, and were constraining improvement in business processes, and that no significant investments had been made for some time. Renewing or redesigning the outsourcing contract, the basis for which he had been employed, would only be a short-term solution. The problem was that the cost of new infrastructure would be high, and return on technology investment would mainly be realized from redesigned business processes enabled by the new technology. Tony wanted to propose a business transformation, with process changes as well as significant investment in IT infrastructure. Together, these would take the TAC from 1970s technology into the 21st century. The problem was that their (investments in such transformation) payoffs are not easily and quickly achieved. Their value does not come from installing the technology; it comes from changing both operating and management processes—perhaps operating and managing cultures too. (Ross & Beath, 2002, p. 53) Tony knew he would have to win the support of the board and senior management, but he could not immediately give them a concrete business case for the investment. He also knew that any infrastructure investment had to be linked with a major process-improvement initiative from the start to avoid the double investment of building new applications to support old processes, and then undertaking major modifications or even replacement when the need for improvement became obvious to the board and management team. He compared investing in IT infrastructure to rewiring and replumbing your house: as far as visitors are concerned, there’s no visible difference, everything’s behind the walls, but as the owner you get the benefits of things like cheaper electricity and water bills because of efficiencies in the new redesigned systems. The problem is convincing people that they will get these results in the future, but that they need to hand over the money now, when there’s no hard evidence for the benefits they’ll get, just a bunch of assumptions and no guarantees. It’s a big ask for any Board. (Marxsen, personal communication, September 4, 2003) Tony knew that the first hurdle he would have to overcome would be getting the board to agree to give him the opportunity to put together a team to develop a business case for the board’s further consideration.


Author(s):  
Yuyu Chou ◽  
Jan Oetting

The use of Cloud Computing services is an attractive option to improve IT systems to achieve rapidly and elastically provisioned capability, and also to offer economic benefits. However, companies see security as a major concern in migrating to the Cloud. To bring clarity in Cloud security, this paper presents a systematic approach to manage the risks and analyzes the full range of risk in Cloud Computing solutions. Furthermore, as a study case, Google App Engine Platform is assessed based on ISO/IEC 27002 and OWASP Top 10 Risk List in this paper. Knowing the risks of Cloud solutions, companies can execute well-informed decisions on going into the Cloud and build their Cloud solutions in a secure way, relying on a robust e-trust relationship.


2015 ◽  
Vol 9 (1and2) ◽  
Author(s):  
Akshay Mehta ◽  
Dr. Sanjay Kumar Dubey

Cloud Computing has emerged very fast in the IT industry. It is based on virtualization technology and provides internet based computing which provides resource pooling, services sharing and on demand access. Its evolution has reduced must of the cost of enterprises as well as of the other industries working with a huge data. With cloud computing emerging at a much faster rate, the situation may soon be changed. But, despite the fact that it provides a number of facilities to the service providers, it has quite a number of issues related to it. The most important issue related to cloud is its security. From the consumer’s perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor of cloud computing services. Security is the reason that hinders many enterprises to enter into cloud. So this paper gives a detail of the security risks related to cloud and the possible measures which the enterprises need to ensure before entering Cloud Computing.


Author(s):  
Vaikunth Pai T. ◽  
P.S. Aithal

Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing noncore activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. This model enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Even though organizations get many benefits of cloud computing services, many organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security, being the major issues which hinder the growth of cloud computing service model due to the provision of handling confidential data by the third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. In this paper, we have discussed the security issues, the challenges and the opportunities in the adoption and management of cloud computing services model in an organization.


2014 ◽  
Author(s):  
Seyhan Yazar ◽  
George EC Gooden ◽  
David A Mackey ◽  
Alex Hewitt

A major bottleneck in biological discovery is now emerging at the computational level. Cloud computing offers a dynamic means whereby small and medium-sized laboratories can rapidly adjust their computational capacity. We benchmarked two established cloud computing services, Amazon Web Services Elastic MapReduce (EMR) on Amazon EC2 instances and Google Compute Engine (GCE), using publicly available genomic datasets (E.coli CC102 strain and a Han Chinese male genome) and a standard bioinformatic pipeline on a Hadoop-based platform. Wall-clock time for complete assembly differed by 52.9% (95%CI: 27.5-78.2) for E.coli and 53.5% (95%CI: 34.4-72.6) for human genome, with GCE being more efficient than EMR. The cost of running this experiment on EMR and GCE differed significantly, with the costs on EMR being 257.3% (95%CI: 211.5-303.1) and 173.9% (95%CI: 134.6-213.1) more expensive for E.coli and human assemblies respectively. Thus, GCE was found to outperform EMR both in terms of cost and wall-clock time. Our findings confirm that cloud computing is an efficient and potentially cost-effective alternative for analysis of large genomic datasets. In addition to releasing our cost-effectiveness comparison, we present available ready-to-use scripts for establishing Hadoop instances with Ganglia monitoring on EC2 or GCE.


Author(s):  
Mohammad Nabil Almunawar ◽  
Hasan Jawwad Almunawar

We are witnessing the business prospects of cloud computing becoming apparent as many cloud computing services have been made available online. Previously, outsourcing of computing resources employs a third party to set up, develop, and maintain the infrastructure within or outside the business organization. However, nowadays many business organizations all over the world see that outsourcing their computing resources through cloud computing is a highly viable option as it saves a business organization from the complicated setup and maintenance costs of computer infrastructure. There are three generally known types cloud computing, namely public cloud, private cloud, and hybrid cloud. There also three generally service models namely software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). This chapter highlights the development of cloud computing technology, benefits and issues of outsourcing an organization's computing resources through cloud computing.


Author(s):  
Mohammad Nabil Almunawar ◽  
Hasan Jawwad Almunawar

We are witnessing the business prospects of cloud computing becoming apparent as many cloud computing services have been made available online. Previously, outsourcing of computing resources employs a third party to set up, develop and maintain the infrastructure within or outside the business organization. However, nowadays many business organizations all over the world see that outsourcing their computing resources through cloud computing is a highly viable option as it saves a business organization from the complicated setup and maintenance costs of computer infrastructure. There are three generally known types cloud computing, namely, public cloud, private cloud and hybrid cloud. There also three generally service models namely software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). This paper highlights the development of cloud computing technology, benefits and issues of outsourcing an organization's computing resources through cloud computing.


Sign in / Sign up

Export Citation Format

Share Document