Search results

1 – 10 of over 2000
Open Access
Article
Publication date: 4 February 2022

Paul Levy, Joe Morecroft and Mona Rashidirad

Based on the case study of an SME company in the United Kingdom (which we will call SweetStar Cloud), this paper examines the attempts of the company to achieve significant…

Abstract

Based on the case study of an SME company in the United Kingdom (which we will call SweetStar Cloud), this paper examines the attempts of the company to achieve significant strategic change. The company is attempting to move from being a tradition managed service provider of information services towards becoming a significant influencer in the market for digital services in the UK. As part of a knowledge transfer partnership (KTP), a local UK University has been closely involved in developing this new strategic direction and it is well poised to present and analyse the story. From the use of tried and tested strategic tools, including Porter's generic strategies and segmentation and targeting, the company has also embraced digital-specific approaches for developing partnerships with clients, developing pilot projects and experimenting with its use of social media. At the heart of this research is an analysis of the move from push marketing towards models of attraction. This paper aims to explore how traditional strategic tools are still applicable in the digital era alongside new tactical approaches in the digital sector. This aim has led to an approach to business that is responsible, in terms of moving away from a traditional push-selling model to one of partnership with customers at a strategic level. Strategy in dynamic markets often highlights responsiveness as a key success factor. The ability to respond (a response-ability) requires more agile companies. As SweetStar Cloud has developed its strategy, it has focused in achieving this more effective ability to respond through a more collaborative approach. In this sense, agile response-ability converges with business responsibility, as new abilities in communication, cooperation and trust development become key.

Details

Emerald Open Research, vol. 1 no. 12
Type: Research Article
ISSN: 2631-3952

Keywords

Open Access
Article
Publication date: 12 April 2022

Dijana Peras and Renata Mekovec

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…

1492

Abstract

Purpose

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.

Design/methodology/approach

Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.

Findings

The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.

Originality/value

This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7126

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Content available
Book part
Publication date: 25 October 2023

Sumesh Singh Dadwal

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support…

Abstract

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology and economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastructure, different subsystems and different functional domains are virtually connected to the information and communication technologies (ICT) and internet via sensors and devices and the Internet of Things (IoT), to collect and process real-time Big Data and make efficient, effective and sustainable solutions for a democratic and liveable city for its various stakeholders. This chapter explores the concepts and practices of sustainable smart cities across the globe and explores the use of technologies such as IoT, Blockchain technology and Cloud computing, etc. their challenges and then presents a view on business models for sustainable smart cities.

Open Access
Article
Publication date: 25 November 2022

Silvia Regina Veronezi Correia and Cristina Dai Prá Martens

The purpose of this article is to identify the critical success factors (CSFs) of information technology (IT) projects using cloud computing. CSFs are variables that can influence…

1967

Abstract

Purpose

The purpose of this article is to identify the critical success factors (CSFs) of information technology (IT) projects using cloud computing. CSFs are variables that can influence the success of projects and therefore need to be identified and managed appropriately.

Design/methodology/approach

This is an exploratory qualitative study with 23 experts in cloud computing projects through semi-structured interviews. The data was analyzed using content analysis.

Findings

The results present a list of CSFs for projects in a cloud computing environment. The study demonstrated that the CSF with greater relevance to cloud projects is the team’s technical capacity, followed by the support of senior management and the team’s soft skills. In addition, results demonstrated that contract item management is a limiting factor for cloud projects.

Research limitations/implications

The sample comprised only Brazilian experts, so it may not represent the same scenario as in other locations. The CSF ratio for cloud computing projects may vary depending on the company’s maturity in projects of this nature.

Practical implications

The CSF relationship can guide managers in properly conducting cloud computing projects, contributing to minimizing the risks and challenges that may interfere with the project.

Social implications

The relationship of the CSFs in cloud computing projects proposed fills a gap in studies specifically related to this context and tries to minimize project managers’ stress.

Originality/value

Contract items for the cloud context are added to the CSF literature in IT projects, which have not been addressed so far.

Details

RAUSP Management Journal, vol. 58 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 8 April 2020

Nizar Mohammad Alsharari

This study aims to explain the transformation process from using regular enterprise resource planning (ERP) system into implementing Cloud ERP system in the UAE public sector.

3636

Abstract

Purpose

This study aims to explain the transformation process from using regular enterprise resource planning (ERP) system into implementing Cloud ERP system in the UAE public sector.

Design/methodology/approach

The study uses a qualitative case study and analyzes the primary evidences from in-depth interviews with the case organization’s personnel. It conducts a thematic analysis of the interviews’ findings. Furthermore, the study uses secondary and tertiary resources from published sources comprising the case organization’s website and previous studies.

Findings

The findings demonstrated that the transformation process to Cloud ERP could result in different practical benefits in an organization’s controlling system, cost reduction and profitability. Conversely, results revealed that the effectiveness of implementing cloud ERP is dependable on the provider’s professionalism; hence resulting in issues related to minimized organizational independence. In addition, the paper’s findings provide evidenced clarifications about the controversial misconceptions of Cloud ERP’s privacy issues.

Research limitations/implications

The paper is exposed to the regular case studies limitations, as the study is a qualitative research studying one case company. Thus, the study findings should be strengthened by future quantitative researches on more companies with implying more statistical analysis.

Practical implications

The paper has important implications for practitioners and decision-makers, as it presents significant and reality-based information about Cloud ERP implementation’s benefits and drawbacks. It thus enhances decision-makers’ ability to make an appropriate and suitable decision about adopting the Cloud ERP in the public sector.

Originality/value

As Cloud ERP is still emerging, this study is one of the very few case studies that discuss and present some experienced benefits and issues related to Cloud ERP implementation in UAE Government. This study also uses transformation theory to analyze the data.

Details

International Journal of Disruptive Innovation in Government, vol. 1 no. 1
Type: Research Article
ISSN: 2516-4392

Keywords

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

3956

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2022

Qi Ji, Yuanming Zhang, Gang Xiao, Hongfang Zhou and Zheng Lin

Data service (DS) is a special software service that enables data access in cloud environment and provides a unified data model for cross-origination data integration and data…

359

Abstract

Purpose

Data service (DS) is a special software service that enables data access in cloud environment and provides a unified data model for cross-origination data integration and data sharing. The purpose of the work is to automatically compose DSs and quickly generate data view to satisfy users' various data requirements (DRs).

Design/methodology/approach

The paper proposes an automatic DS composition and view generation approach. DSs are organized into DS dependence graph (DSDG) based on their inherent dependences, and DSs can be automatically composed using the DSDG according to user's DRs. Then, data view will be generated by interpreting the composed DS.

Findings

Experimental results with real cross-origination data sets show the proposed approaches have high efficiency and good quality for DS composition and view generation.

Originality/value

The authors propose a DS composition algorithm and a data view generation algorithm according to users' DRs.

Details

Journal of Intelligent Manufacturing and Special Equipment, vol. 3 no. 1
Type: Research Article
ISSN: 2633-6596

Keywords

Open Access
Article
Publication date: 16 October 2017

Xiang T.R. Kong, Ray Y. Zhong, Gangyan Xu and George Q. Huang

The purpose of this paper is to propose a concept of cloud auction robot (CAR) and its execution platform for transforming perishable food supply chain management. A new paradigm…

3303

Abstract

Purpose

The purpose of this paper is to propose a concept of cloud auction robot (CAR) and its execution platform for transforming perishable food supply chain management. A new paradigm of goods-to-person auction execution model is proposed based on CARs. This paradigm can shift the management of traditional manual working to automated execution with great space and time saving. A scalable CAR-enabled execution system (CARES) is presented to manage logistics workflows, tasks and behavior of CAR-Agents in handling the real-time events and associated data.

Design/methodology/approach

An Internet of Things enabled auction environment is designed. The robot is used to pick up and deliver the auction products and commends are given to the robot in real-time. CARES architecture is proposed while integrating three core services from auction workflow management, auction task management, to auction execution control. A system prototype was developed to show its execution through physical emulations and experiments.

Findings

The CARES could well schedule the tasks for each robot to minimize their waiting time. The total execution time is reduced by 33 percent on average. Space utilization for each auction studio is improved by about 50 percent per day.

Originality/value

The CAR-enabled execution model and system is simulated and verified in a ubiquitous auction environment so as to upgrade the perishable food supply chain management into a new level which is automated and real-time. The proposed system is flexible to cope with different auction scenarios, such as different auction mechanisms and processes, with high reconfigurability and scalability.

Details

Industrial Management & Data Systems, vol. 117 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of over 2000