VORDi*

Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.

2020 ◽  
Vol 34 (2) ◽  
pp. 23-46
Author(s):  
Kimberly Swanson Church ◽  
Pamela J. Schmidt ◽  
Kemi Ajayi

ABSTRACT To engage theory and practice of cloud computing in business, the third annual Journal of Information Systems Conference (JISC) brought together 29 academic researchers and 14 practitioners. This commentary reviews and synthesizes discussions and insights provided by three keynote presentations and panel discussions. In addition to sharing insights from the conference, this commentary identifies major themes, incorporates relevant current literature, and suggests potential research questions expressed by practitioners. The JISC emphasized the impact of the rapid maturing of cloud computing services on accounting information systems (AIS). Several recurring themes emerged throughout the conference: (1) rapid growth and evolution of cloud managed services, (2) security, privacy, and risk in the cloud ecosystem, (3) impact of cloud computing for data analytics, and (4) emerging and disruptive financial technologies and trends for the cloud. Most of the discussion surrounding these themes predominantly focused on the perspectives of cloud assurance and cloud service providers.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Info ◽  
2015 ◽  
Vol 17 (1) ◽  
pp. 54-67 ◽  
Author(s):  
Joseph Kwame Adjei

Purpose – The purpose of this paper is to explain the role of trust in cloud computing services based on empirical evidence from interviewing executives of financial institutions in Ghana. The paper answers the questions: what is the role of trust in cloud computing service acquisition, and what policies promote trusted cloud computing services? Design/methodology/approach – This is an explanatory paper that is based on literature review and empirical data on exploring reasons for cloud computing service acquisitions. A combination of interviews and focus group discussions was used as methods for data collection. Information technology and electronic banking executives of five major commercial banks in Accra, Ghana, between January and July 2013 were interviewed. A total of ten respondents were interviewed, two in each of the selected banks. A purposive sampling technique was used in the selection of informants. This approach allows the selection of qualified informants to ensure extensiveness and diversity of opinion. Findings – Although previous literature proffers various factors as key to cloud computing adoption, uses or provisioning, this study brings trust to the fore as an imperative for cloud computing service acquisition by financial institutions. It also shows that trust increases if users perceive that cloud computing service providers act in honesty and in users’ interest, making trust a fundamental factor that informs financial institutions’ decision to acquire cloud computing services. Research limitations/implications – The research introduces a new dimension about the widely held perceptions of the factors that influence adoption of cloud computing services. Practical implications – Developers of cloud computing solutions that are targeted at corporate users must focus on systems that enhances their trustworthiness, as it is a primary criteria for user buy-in. Similarly, any trust-building effort by cloud computing service providers minimizes users’ concerns and pushes the services providers closer to the trust threshold. Originality/value – The paper outlines the trust factors that are imperative for cloud computing uses by financial institutions. This is one of the pioneering papers that address trust issues in cloud computing from the perspective of financial institutions.


2015 ◽  
pp. 1877-1899
Author(s):  
Haibo Yang ◽  
Sid Huff ◽  
Mary Tate

Change is endemic in modern business competition. In an age of globalization, with the rapid development of Internet technologies, changes occur at a much faster pace, and are also more unpredictable. Being agile in a turbulent environment has been ranked highly by executives in surveys of business issues conducted in past five years. Today nearly all organizations rely on information systems (IS) to operate. Agility in IS is critical in achieving overall agility in business. However, despite the interest from the practitioner community, IS agility (sometimes termed IT agility) in academia has received limited recognition and represents an under-researched area. The recent adoption of cloud computing services has presented a major change in the way IS are delivered, in the hope of creating more agile and responsive IS. However, whether or not cloud computing, as promised by the providers, increases IS agility, is still unclear. This research aims at providing a conceptualization of IS agility based on research to date, and examining how cloud computing might facilitate such agility. Based on a literature review, cloud computing services (IaaS, PaaS, and SaaS) are analyzed against multiple aspects of IS agility. Only IaaS is found to have the potential providing consistent agility, whereas agility at PaaS and SaaS levels is more determined by human/organization factors. Lastly, suggestions for businesses and directions to future research are proposed.


Author(s):  
Haibo Yang ◽  
Sid L. Huff ◽  
Mary Tate

Change is endemic in modern business competition. In an age of globalization, with the rapid development of Internet technologies, changes occur at a much faster pace, and are also more unpredictable. Being agile in a turbulent environment has been ranked highly by executives in surveys of business issues conducted in past five years. Today nearly all organizations rely on information systems (IS) to operate. Agility in IS is critical in achieving overall agility in business. However, despite the interest from the practitioner community, IS agility (sometimes termed IT agility) in academia has received limited recognition and represents an under-researched area. The recent adoption of cloud computing services has presented a major change in the way IS are delivered, in the hope of creating more agile and responsive IS. However, whether or not cloud computing, as promised by the providers, increases IS agility, is still unclear. This research aims at providing a conceptualization of IS agility based on research to date, and examining how cloud computing might facilitate such agility. Based on a literature review, cloud computing services (IaaS, PaaS, and SaaS) are analyzed against multiple aspects of IS agility. Only IaaS is found to have the potential providing consistent agility, whereas agility at PaaS and SaaS levels is more determined by human/organization factors. Lastly, suggestions for businesses and directions to future research are proposed.


Author(s):  
Yulin Yao

Cloud Computing has offered many services to organizations and individuals. The emerging types of services such as analytics, mobile services and emerging software as a service have been offered but there is a lack of analysis on the current status. Core technologies for emerging Cloud services have been identified and presented. This brief opinion paper provides an overview of the current emerging Cloud services and explains the benefits for several disciplines. Four areas have been identified that may bring in more positive impacts for the future direction.


Organizacija ◽  
2017 ◽  
Vol 50 (3) ◽  
pp. 255-272 ◽  
Author(s):  
Kristina Bogataj Habjan ◽  
Andreja Pucihar

Abstract Background and Purpose: Bringing several opportunities for more effective and efficient IT governance and service exploitation, cloud computing is expected to impact the European and global economies significantly. Market data show that despite many advantages and promised benefits the adoption of cloud computing is not as fast and widespread as foreseen. This situation shows the need for further exploration of the potentials of cloud computing and its implementation on the market. The purpose of this research was to identify individual business model factors with the highest impact on cloud computing adoption. In addition, the aim was to identify the differences in opinion regarding the importance of business model factors on cloud computing adoption according to companies’ previous experiences with cloud computing services. Methodology: Based on literature review, prior research results, and interviews with cloud computing providers and users, a research model was developed. Statistical analysis focused on identification of factors’ importance on cloud computing adoption and differences in opinions according to respondents’ previous experiences with cloud computing services. The study was done among 80 companies and five major cloud computing providers in Slovenia. Results: The research results reveal statistically significant differences in opinions on the importance of cloud computing business model factors according to respondents’ previous experiences with cloud computing services. The results can provide orientation for redesign or innovation of existing business models towards the creation of a customer-oriented business model for the more successful exploitation of cloud computing services and business opportunities. For potential users, the findings represent guidelines for the successful adoption of cloud computing services. Conclusions: In our research, the investigated business model factors could be classified into so-called “business model organizational factors”, as they primarily need to be considered by cloud service providers when defining or innovating their business models. For future research, the model should also include the impact of environmental factors, such as Competition, Business Partners, Legislation, Economic Situation, in order to investigate their impact on cloud adoption.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


The proliferation of Cloud Computing has opened new and attractive offerings for consumers. Cloud Service Providers promote and market packages of cloud computing services that cater to diverse opportunities and user applications. While this has obvious advantages, there are certain factors that are a cause for concern. Monitoring the underlying infrastructure that supports the entire fabric of cloud computing is an aspect that requires a great deal of attention. The aspect of monitoring takes on a great deal of significance when performance and robustness of cloud service on offer is taken into consideration. Although research has been conducted into various cloud computing monitoring techniques, there is scope and room yet for an integrated cloud monitoring solution that can fulfill the requirements of cloud administrators to ensure optimal performance of the underlying infrastructure of a cloud computing network. In this paper, we propose a unified monitoring model that is essentially a composite framework involving hardware and network layers. Studies conducted during our experiments suggest that our unified cloud monitoring approach can significantly aid in reducing overall carbon emissions while helping meeting compliance and audit norms by ensuring that the underlying cloud infrastructure is monitored closely


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Sign in / Sign up

Export Citation Format

Share Document