A Cloud-Based Approach for Cross-Management of Disaster Plans

Author(s):  
Samia Chehbi Gamoura

With the democratization of Data management through Big Data and Cloud Computing, and the proliferation of business lines into complex networks, industries are ever more subject to disasters than ever. It is practically impossible to forecast their happening and degree of damages. Consequently, companies try to collaborate in integrating risk management in their information systems against downtimes. This chapter addresses this problem by outlining and discussing insights from the extensive literature review to produce a generic approach for cross-management. A set of prerequisites of disaster planning is also provided with comparative analysis and arguments. The proposed approach is focused on risk assessment methodology based on Fuzzy Cognitive Map. The method is able to aggregate all assessment variables of the whole stakeholders involved in the business network. The key findings of this study aim to assist enterprises in improving risk readiness capability and disaster recovery. Finally, we indicate the open challenges for further researches and an outlook on our future research.

Author(s):  
Samia Chehbi Gamoura

With the democratization of Data management through Big Data and Cloud Computing, and the proliferation of business lines into complex networks, industries are ever more subject to disasters than ever. It is practically impossible to forecast their happening and degree of damages. Consequently, companies try to collaborate in integrating risk management in their information systems against downtimes. This chapter addresses this problem by outlining and discussing insights from the extensive literature review to produce a generic approach for cross-management. A set of prerequisites of disaster planning is also provided with comparative analysis and arguments. The proposed approach is focused on risk assessment methodology based on Fuzzy Cognitive Map. The method is able to aggregate all assessment variables of the whole stakeholders involved in the business network. The key findings of this study aim to assist enterprises in improving risk readiness capability and disaster recovery. Finally, we indicate the open challenges for further researches and an outlook on our future research.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


2016 ◽  
Vol 4 (1) ◽  
pp. 129 ◽  
Author(s):  
Narasimha Rao Vajjhala ◽  
Ervin Ramollari

Big Data has been listed as one of the current and future research frontiers by Gartner. Large-sized companies are already investing on and leveraging big data. Small-sized and medium-sized enterprises (SMEs) can also leverage big data to gain a strategic competitive advantage but are often limited by the lack of adequate financial resources to invest on the technology and manpower. Several big data challenges still exist especially in computer architecture that is CPU-heavy but I/O poor. Cloud computing eliminates the need to maintain expensive computing hardware and software. Cloud computing resources and techniques can be leveraged to address the traditional problems associated with fault tolerance and low performance causing bottlenecks to using big data. SMEs can take advantage of cloud computing techniques to avail the advantages of big data without significant investments in technology and manpower. This paper explores the current trends in the area of big data using cloud resources and how SMEs can take advantage of these technological trends. The results of this study will benefit SMEs in identifying and exploring possible opportunities and also understanding the challenges in leveraging big data.


Author(s):  
Rajganesh Nagarajan ◽  
Ramkumar Thirunavukarasu

In this chapter, the authors consider different categories of data, which are processed by the big data analytics tools. The challenges with respect to the big data processing are identified and a solution with the help of cloud computing is highlighted. Since the emergence of cloud computing is highly advocated because of its pay-per-use concept, the data processing tools can be effectively deployed within cloud computing and certainly reduce the investment cost. In addition, this chapter talks about the big data platforms, tools, and applications with data visualization concept. Finally, the applications of data analytics are discussed for future research.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


Author(s):  
Naif Radi Aljohani ◽  
Rabeeh Ayaz Abbasi ◽  
Fahad Mohammed Bawakid ◽  
Farrukh Saleem ◽  
Zahid Ullah ◽  
...  

In the present era of Big Data, with continuously increasing amounts of user-generated content, it is becoming a challenge to understand the relation between the content that is available on the Web and the users who are generating that content. Researchers have come up with many ways to understand today's Web better. One of the recently introduced concepts is a Web observatory (WO). This article provides a deep understanding about web observatories. It discusses the status of existing WO systems. The article investigates and gathers the common practices of WOs. This research has implications for researchers and communities in the adoption of the WO concept. The article highlights the challenges of WOs, such as data crawling, privacy and security. It also provides future research and development directions. The article provides a comparative analysis of existing WOs. It discusses the architecture of WOs. It presents components of a WO in a coherent manner and finally provides insights into challenges and limitations of WOs.


2021 ◽  
Author(s):  
Isabella Aitkenhead ◽  
Yuriy Kuleshov ◽  
Jessica Bhardwaj ◽  
Zhi-Weng Chua ◽  
Chayn Sun ◽  
...  

Abstract. Climate change is increasing the frequency and intensity of natural hazards, causing adverse impacts on vulnerable communities. Pacific Small Island Developing States (SIDS) are of particular concern, requiring resilient disaster risk management consisting of two key elements: proactivity and suitability. User-centred Integrated Early Warning Systems (I-EWSs) can inform resilient risk management. However, an EWS is only effectively integrated when all components are functioning adequately. In Pacific SIDS, the risk knowledge component of an I-EWS is underexplored. Risk knowledge is improved through efficient risk assessment. A case study assessing drought risk in PNG provinces was conducted to demonstrate the development and validate the application of a tailored risk assessment methodology. Hazard, vulnerability, and exposure indicators appropriate for monitoring drought in PNG provinces were selected. Risk indices for past years (2014–2020) were calculated and mapped in Geographic Information Systems (GIS). Risk assessment results were validated with a literature investigation of sources presenting information on previous droughts in PNG. The risk assessment indicated a strong drought event in 2015–2016, and a moderate event in 2019–2020. The literature corroborated this, confirming the validity of the risk assessment methodology. The methodology and results can be used to inform improved disaster risk management in PNG, by advising decision-makers of their risk and policymakers on which provinces are of priority for resource allocation. The methodology can also be used to enhance the risk knowledge component of a user-centred I-EWS and guide the implementation of such a system for drought in PNG and other Pacific SIDS.


Author(s):  
S Ashaari ◽  
SHERZOD TURAEV ◽  
A Okhunov

Over the quarter century, it is gratifying to note that the significance of regulated or controlledgrammars (i.e. grammars with regulated rewriting) has been recognized by many parties where it has beenused widely in a great variety of scientific disciplines ranging from Linguistics through DNA Computing upto the Informatics and recently come to Big Data Analytics. Therefore, literally we can find hundreds ofstudies of well-known of various types of controlled grammars and their investigation have amount to athrilling trend within formal language theory. Given the extensive literature on issues related to controlledgrammars, this research focused on arithmetically controlled grammars and tree controlled grammars,which are practically important. Thereby, in this paper, we briefly recapitulate the background of formallanguage theory and highlight the key results of multiset grammars, valence grammars and tree controlledgrammars. In this paper, a new controlled grammar that can be generated using both control mechanismstogether is proposed for future research.


Sign in / Sign up

Export Citation Format

Share Document