Going Cloud for Agility: Beyond Financial, System, and Control Motives

2015 ◽  
Vol 12 (1) ◽  
pp. 153-167 ◽  
Author(s):  
Hui Du ◽  
Yu Cong

ABSTRACT Using a unique dataset obtained from cloud computing providers' websites, we study cloud computing from the cloud users' perspective. While cloud computing providers promise various benefits for companies to “go cloud,” whether user companies are motivated by the potential benefits is a different matter. Although existing IT outsourcing literature and the latest cloud computing research suggest financial, system, and control as three main motives for companies to go cloud, MIS literature and business strategy studies point out the agility of quick system deployment as another significant consideration. We examine these four categories of motives, along with more detailed key motives developed in each category. Our results indicate that companies are motivated by multifold benefits in all four aspects of agility, financial, system, and control. However, despite various benefits promised by cloud computing providers, from the cloud computing users' perspective, the agility of quick system deployment and saving on costs appear to be the two primary motives. Data Availability: Data are publicly available from the sources identified in the paper.

2020 ◽  
Vol 34 (4) ◽  
pp. 1-31
Author(s):  
Rajiv D. Banker ◽  
Xiaorong Li ◽  
Steven A. Maex ◽  
Wenyun Shi

SYNOPSIS Over the last decade, many firms have shifted from in-house managed information systems to cloud computing arrangements. Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system. Ex ante, it is unclear whether cloud computing allows for increased audit efficiency through reliance on service organization control reports or introduces additional complexity and risk to the audit. Leveraging a 2015 accounting standards update from the Financial Accounting Standards Board to identify material cloud users, we find that these firms pay an audit fee premium of approximately 5 percent compared to nonusers. This premium attenuates when hiring an audit office with more cloud users in its portfolio, suggesting that cloud audit experience can reduce auditors' costs when conducting such audits. We also explore how audit lag and subsequent restatements vary cross-sectionally with cloud use. JEL Classifications: M41; M48. Data Availability: Data are available from the public sources cited in the text.


Author(s):  
L. Aruna

Today Cloud computing is altering the way industries and enterprises do their businesses in that with passion scalable and virtualized assets are provided as a service over the Internet. This new model creates a brand new chance for enterprises. In this paper, some of the essential features of effective methodologies for cloud computing in the modern enterprise are briefly discussed with regard to the end-users, enterprises that use the cloud as a platform, and cloud providers themselves. Cloud Computing is capable as one of the main enablers for the all new manufacturing industry, it can transform the usual manufacturing business model, help it to align product innovation with business strategy, and create intelligent factory networks that support successful collaboration. Cloud computing has been in some of the major key areas of manufacturing industries such as IT, pay-as-you-go business models, productions calling up and down per require, and elasticity in deploying and customizing solutions. Clients can use cloud services according to their requirements. Cloud users can request services ranging from product design, manufacturing, testing, management, and all others tags of a product life cycle. Cloud Managed service provider (CMSP) is a company that distantly manages a customer's IT communications and/or end-user systems, typically on a proactive basis and under a subscription model.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
Oleksandra Maslii ◽  
Andrii Maksymenko ◽  
Svitlana Onyshchenko

Place of monitoring and control of risks of financial stability of the state in the system of ensuring financial security of the state was substantiated. Methods of identifying threats to Ukraine's financial security through the current and strategic analysis of financial system development indicators were considered. Tendencies of economic development of Ukraine in the context of revealing sources of threats to financial stability of the state were analyzed. Dynamic analysis of the actual values of the financial security indicators of Ukraine as a whole and its separate components had been carried out. Threats to Ukraine's financial security were identified based on comparative and trend analysis. Reasons for the critical state of debt, banking and monetary security in the financial structure and the preconditions for the emergence of systemic threats had been investigated. Systematization of risks and threats to Ukraine's financial security by its components had been carried out. Influence of systemic threats in the financial sphere on the economic security of the state was generalized. International experience of monitoring financial stability of the state was analyzed. Additional risks to the national financial system are associated with the globalization and digitization of the state financial system that are not taken into account by valid methodological recommendations for calculating the level of economic security of Ukraine were highlighted.


2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


Author(s):  
Lee-Huang Chen ◽  
Kyunam Kim ◽  
Ellande Tang ◽  
Kevin Li ◽  
Richard House ◽  
...  

This paper presents the design, analysis and testing of a fully actuated modular spherical tensegrity robot for co-robotic and space exploration applications. Robots built from tensegrity structures (composed of pure tensile and compression elements) have many potential benefits including high robustness through redundancy, many degrees of freedom in movement and flexible design. However to fully take advantage of these properties a significant fraction of the tensile elements should be active, leading to a potential increase in complexity, messy cable and power routing systems and increased design difficulty. Here we describe an elegant solution to a fully actuated tensegrity robot: The TT-3 (version 3) tensegrity robot, developed at UC Berkeley, in collaboration with NASA Ames, is a lightweight, low cost, modular, and rapidly prototyped spherical tensegrity robot. This robot is based on a ball-shaped six-bar tensegrity structure and features a unique modular rod-centered distributed actuation and control architecture. This paper presents the novel mechanism design, architecture and simulations of TT-3, the first untethered, fully actuated cable-driven six-bar tensegrity spherical robot ever built and tested for mobility. Furthermore, this paper discusses the controls and preliminary testing performed to observe the system’s behavior and performance.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Candauda Arachchige Saliya ◽  
Suesh Kumar Pandey

Purpose This paper aims to investigate how and to what extent the Fijian sustainable banking regulations or guidelines are designed, communicated, implemented and monitored within the financial system in Fiji. A scorecard is introduced for this purpose to assess the effectiveness of Fiji’s financial battle against climate change (FBACC). Design/methodology/approach This study uses a mixed-method methodology. Data were collected mainly from a survey and supplemented by interviews, observations and documents. The scorecard was developed by building on existing two theoretical frameworks, namely, the Sustainable Banking Assessment and Climate Change Governance Index, to make them more appropriate and practically applicable to less developed financial systems in emerging economies such as Fiji. This FBACC scorecard consists of four perspectives, eight critical factors and 24 criteria. Findings The results show that the overall FBACC score averages 40.75%, and all the perspectives scored below 50%, the benchmark. Only the CF “policy” scored 54.25% because of a high positive response of 82.3% for the “political leadership” criterion. The relative contributions of each perspective in constructing the overall score are distributed as 28%, 25%, 24% and 23% among planning, action, accountability and control, respectively. Research limitations/implications These results were complemented by the information shared during the interviews and confirmed that the existing political initiatives need to be effectively communicated and/or implemented in the financial system by the regulatory agencies. Practical implications This FBACC scorecard can be applied to other underdeveloped systems in emerging countries to assess the effectiveness of the sustainable banking regulations and/or guidelines in those countries in relation to the FBACC. It can also be applied to individual firms to assess their contribution to the FBACC. Originality/value To the authors’ best knowledge, this might be the first study in Fiji that considers the impact of climate-related financial risk on the Fijian financial system.


2018 ◽  
Vol 8 (2) ◽  
pp. 47-65 ◽  
Author(s):  
Ubaidullah Alias Kashif ◽  
Zulfiqar Ali Memon ◽  
Shafaq Siddiqui ◽  
Abdul Rasheed Balouch ◽  
Rakhi Batra

This article describes how the enormous potential benefits provided by the cloud services, made enterprises to show huge interest in adopting cloud computing. As the service provider has control over the entire data of an organization stored onto the cloud, a malicious activity, whether internal or external can tamper with the data and computation. This causes enterprises to lack trust in adopting services due to privacy, security and trust issues. Despite of having such issues, the consumer has no root level access right to secure and check the integrity of procured resources. To establish a trust between the consumer and the provider, it is desirable to let the consumer to check the procured platform hosted at provider side for safety and security. This article proposes an architectural design of a trusted platform for the IaaS cloud computing by the means of which the consumer can check the integrity of a guest platform. TCG's TPM is deployed and used on the consumer side as the core component of the proposed architecture and it is distributed between the service provider and the consumer.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


10.29007/848q ◽  
2019 ◽  
Author(s):  
Mohammed O. Alannsary ◽  
Yasser M. Hausawi

Cloud computing is a relatively mature and robust technology that has promised its users with several proven advantages, such as cost reduction, immediate scalability, and resource sharing. The Cloud is built based on providing resources as services, such as providing Infrastructure, Platform, and Software as a Service. Such approach enables Cloud users to access these services based on their demand. In the government sector of Saudi Arabia, adoption and utilization of the Cloud is minimal. Despite being adopted officially, the Cloud has not been yet implemented properly. In our work we introduce how the government sector in Saudi Arabia can adopt and implement a Cloud Solution through utilizing its services and while considering issues related to its security.


Sign in / Sign up

Export Citation Format

Share Document