Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 25 November 2022

Silvia Regina Veronezi Correia and Cristina Dai Prá Martens

The purpose of this article is to identify the critical success factors (CSFs) of information technology (IT) projects using cloud computing. CSFs are variables that can influence…

1976

Abstract

Purpose

The purpose of this article is to identify the critical success factors (CSFs) of information technology (IT) projects using cloud computing. CSFs are variables that can influence the success of projects and therefore need to be identified and managed appropriately.

Design/methodology/approach

This is an exploratory qualitative study with 23 experts in cloud computing projects through semi-structured interviews. The data was analyzed using content analysis.

Findings

The results present a list of CSFs for projects in a cloud computing environment. The study demonstrated that the CSF with greater relevance to cloud projects is the team’s technical capacity, followed by the support of senior management and the team’s soft skills. In addition, results demonstrated that contract item management is a limiting factor for cloud projects.

Research limitations/implications

The sample comprised only Brazilian experts, so it may not represent the same scenario as in other locations. The CSF ratio for cloud computing projects may vary depending on the company’s maturity in projects of this nature.

Practical implications

The CSF relationship can guide managers in properly conducting cloud computing projects, contributing to minimizing the risks and challenges that may interfere with the project.

Social implications

The relationship of the CSFs in cloud computing projects proposed fills a gap in studies specifically related to this context and tries to minimize project managers’ stress.

Originality/value

Contract items for the cloud context are added to the CSF literature in IT projects, which have not been addressed so far.

Details

RAUSP Management Journal, vol. 58 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 10 February 2022

Fei Xie, Jun Yan and Jun Shen

Although proactive fault handling plans are widely spread, many unexpected data center outages still occurred. To rescue the jobs from faulty data centers, the authors propose a…

Abstract

Purpose

Although proactive fault handling plans are widely spread, many unexpected data center outages still occurred. To rescue the jobs from faulty data centers, the authors propose a novel independent job rescheduling strategy for cloud resilience to reschedule the task from the faulty data center to other working-proper cloud data centers, by jointly considering job nature, timeline scenario and overall cloud performance.

Design/methodology/approach

A job parsing system and a priority assignment system are developed to identify the eligible time slots for the jobs and prioritize the jobs, respectively. A dynamic job rescheduling algorithm is proposed.

Findings

The simulation results show that our proposed approach has better cloud resiliency and load balancing performance than the HEFT series approaches.

Originality/value

This paper contributes to the cloud resilience by developing a novel job prioritizing, task rescheduling and timeline allocation method when facing faults.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6359

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 7 September 2023

Chioma Okoro

Technological change drives transformation in most sectors of the economy. Industry 4.0 technologies have been applied at different stages of a building’s lifecycle. However…

Abstract

Purpose

Technological change drives transformation in most sectors of the economy. Industry 4.0 technologies have been applied at different stages of a building’s lifecycle. However, limited studies exist on their application in real estate facilities management (REFM). This study aims to assess the existing knowledge on the topic to suggest further research directions.

Design/methodology/approach

Scopus-indexed literature from 2013 to 2023 was examined and visualised using VOSviewer software to output quantitative (descriptive) results. Content analysis was used to complement the quantitative findings.

Findings

Findings indicated a concentration of research in China, Norway and Italy. The knowledge areas included three clusters: lifecycle integration and management, data curation and management and organisational and management capabilities. The benefits, challenges and support strategies were highlighted.

Research limitations/implications

More collaboration is needed across countries and territories on technology integration in REFM. Future research using alternative methodologies is recommended, with a focus on adopting and non-adopting REFM organisations. Further, implications for facility managers, employees, technology suppliers or vendors, training, organisations and management exist.

Practical implications

Further, implications for facility managers, employees, technology suppliers or vendors, training, organisations and management exist.

Originality/value

The study reveals the knowledge base on technology use in REFM. It adds to the evidence base on innovation and technology adoption in REFM.

Details

Facilities , vol. 41 no. 15/16
Type: Research Article
ISSN: 0263-2772

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7145

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 25 August 2021

Ana Faizi, Ali Padyab and Andreas Naess

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

1836

Abstract

Purpose

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

Design/methodology/approach

Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.

Findings

The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.

Originality/value

As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 16 October 2017

Xiang T.R. Kong, Ray Y. Zhong, Gangyan Xu and George Q. Huang

The purpose of this paper is to propose a concept of cloud auction robot (CAR) and its execution platform for transforming perishable food supply chain management. A new paradigm…

3309

Abstract

Purpose

The purpose of this paper is to propose a concept of cloud auction robot (CAR) and its execution platform for transforming perishable food supply chain management. A new paradigm of goods-to-person auction execution model is proposed based on CARs. This paradigm can shift the management of traditional manual working to automated execution with great space and time saving. A scalable CAR-enabled execution system (CARES) is presented to manage logistics workflows, tasks and behavior of CAR-Agents in handling the real-time events and associated data.

Design/methodology/approach

An Internet of Things enabled auction environment is designed. The robot is used to pick up and deliver the auction products and commends are given to the robot in real-time. CARES architecture is proposed while integrating three core services from auction workflow management, auction task management, to auction execution control. A system prototype was developed to show its execution through physical emulations and experiments.

Findings

The CARES could well schedule the tasks for each robot to minimize their waiting time. The total execution time is reduced by 33 percent on average. Space utilization for each auction studio is improved by about 50 percent per day.

Originality/value

The CAR-enabled execution model and system is simulated and verified in a ubiquitous auction environment so as to upgrade the perishable food supply chain management into a new level which is automated and real-time. The proposed system is flexible to cope with different auction scenarios, such as different auction mechanisms and processes, with high reconfigurability and scalability.

Details

Industrial Management & Data Systems, vol. 117 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 30 September 2021

Samuel Heuchert, Bhaskar Prasad Rimal, Martin Reisslein and Yong Wang

Major public cloud providers, such as AWS, Azure or Google, offer seamless experiences for infrastructure as a service (IaaS), platform as a service (PaaS) and software as a…

2378

Abstract

Purpose

Major public cloud providers, such as AWS, Azure or Google, offer seamless experiences for infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). With the emergence of the public cloud's vast usage, administrators must be able to have a reliable method to provide the seamless experience that a public cloud offers on a smaller scale, such as a private cloud. When a smaller deployment or a private cloud is needed, OpenStack can meet the goals without increasing cost or sacrificing data control.

Design/methodology/approach

To demonstrate these enablement goals of resiliency and elasticity in IaaS and PaaS, the authors design a private distributed system cloud platform using OpenStack and its core services of Nova, Swift, Cinder, Neutron, Keystone, Horizon and Glance on a five-node deployment.

Findings

Through the demonstration of dynamically adding an IaaS node, pushing the deployment to its physical and logical limits, and eventually crashing the deployment, this paper shows how the PackStack utility facilitates the provisioning of an elastic and resilient OpenStack-based IaaS platform that can be used in production if the deployment is kept within designated boundaries.

Originality/value

The authors adopt the multinode-capable PackStack utility in favor of an all-in-one OpenStack build for a true demonstration of resiliency, elasticity and scalability in a small-scale IaaS. An all-in-one deployment is generally used for proof-of-concept deployments and is not easily scaled in production across multiple nodes. The authors demonstrate that combining PackStack with the multi-node design is suitable for smaller-scale production IaaS and PaaS deployments.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 9 November 2022

Omar Ikbal Tawfik and Hamada Elsaid Elmaasrawy

This study aims to assesses the factors that affected the development of cloud-based accounting education (DCBAE) and students' academic performance at Oman Universities.

1782

Abstract

Purpose

This study aims to assesses the factors that affected the development of cloud-based accounting education (DCBAE) and students' academic performance at Oman Universities.

Design/methodology/approach

In this paper a questionnaire was used to collect data for a sample of students. Partial least squares (PLS) were used to assess the hypotheses and model.

Findings

Results indicate that human factors and cultural and social factors have a direct positive effect on the DCBAE and students' academic performance.

Practical implications

This study is carried out after five semesters since the beginning of the COVID-19 pandemic. Thus, it can help universities (accounting education in particular) in the Sultanate of Oman know the factors that affect the development of accounting education and adopt policies and strategies that depend on cloud computing in education operations, even after the COVID-19 pandemic.

Originality/value

The main contribution of this study is to evaluate the factors that affected the DCBAE and the academic performance of students in the Sultanate of Oman from March 15, 2020 to June 2022, a period that witnessed the application of cloud-based education, either in whole or in part using a questionnaire about the opinions of students.

Details

Arab Gulf Journal of Scientific Research, vol. 41 no. 2
Type: Research Article
ISSN: 1985-9899

Keywords

Open Access
Article
Publication date: 30 June 2020

Luca Ferri, Rosanna Spanò, Marco Maffei and Clelia Fiondella

This paper aims to investigate the factors influencing chief executive officers’ (CEOs') intentions to implement cloud technology in Italian small and medium-sized enterprises…

3146

Abstract

Purpose

This paper aims to investigate the factors influencing chief executive officers’ (CEOs') intentions to implement cloud technology in Italian small and medium-sized enterprises (SMEs).

Design/methodology/approach

The study proposes a model that integrates the theoretical construct of the technology acceptance model (TAM) with a classification of perceived benefits and risks related to cloud computing. The study employs a structural equation modeling approach to analyze data gathered through a Likert scale-based survey.

Findings

The findings indicate that risk perception has a strong negative effect on the intention to introduce cloud technology in firms. This effect is partially offset by the perceived ease of use of the technology.

Originality/value

The study provides a new theoretical framework that integrates the TAM and a classification of perceived risks to provide a clear view of management's cognitive processes during technological change. Moreover, the results show the main factors influencing decisions regarding the implementation of cloud computing in firms in light of the perception of risks. Finally, this study provides interesting findings for cloud service providers (CSPs) about their customers' decision-making processes.

Details

European Journal of Innovation Management, vol. 24 no. 3
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 10 of over 1000