DOI QR코드

DOI QR Code

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach

BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구

  • Received : 2011.10.13
  • Accepted : 2011.12.16
  • Published : 2012.03.31

Abstract

With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Keywords

References

  1. Armbrust, M. et al., "Above the clouds : a Berkeley view of cloud computing", UC Berkeley Technical Report, 2009.
  2. Armbrust, M., A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski et al., "A view of cloud computing", Communications of the ACM, Vol.53, No.4(2010), pp.50-58.
  3. Baker, M., R. Buyya, and D. Laforenza, "Grids and grid technologies for wide-area distributed computing", International Journal of Software : Practiceand Experience, Vol.32(2002), pp.1437-1477. https://doi.org/10.1002/spe.488
  4. Bishop, M., Computersecurity : Artandscience. Addision-Wesley, 2002.
  5. Braunwarth, K. S. and B. Heinrich, "ITService management-Ein Modell zur Bestimmung der Folgen von Interoperabilitatsstandards auf die Einbindung externer It-Dienstleister", Wirtschaftsinformatik, Vol.50, No.2(2008), pp.98-110. https://doi.org/10.1365/s11576-008-0029-x
  6. Erdogmus, H., "Cloud computing : Does Nirvara hide behind Nebula?", IEEESoftware, 4-6, p.4 in Frank Fischer, Dr. Freda Turner : Cloudcomputing as a Supply Chain, Business Operations-Systems Perspectives in Global Organizations, Walden University, 2009.
  7. Erdogmus, S., M. Kapanoglu, and E. Koc, "Evaluating high-tech alternatives by using analytic network process with BCOR and multiactors", Evaluation and Program Planning, Vol.28, No.4(2005), pp.391-399. https://doi.org/10.1016/j.evalprogplan.2005.07.003
  8. Gordon, L. A. and M. P. Loeb, "Budgeting process for information security expenditures", Communications of the ACM, Vol.49, No.1(2006), pp.121-125. https://doi.org/10.1145/1107458.1107465
  9. Guo, Z., M. Song, and J. Song, "A governance model for cloud computing", International Conference on Managementand Service Science(MASS), 2010.
  10. Gupta, M., S. Banerjee, M. Agrawal, and H. R. Rao, "Security analysis of Internet technology components enabling globally distributed workplaces-a framework", ACM Transactionson Internet Technology, Vol.8, No.4 (2008), pp.1-38.
  11. Hamilton, J., "Cooperative expendable microslide servers (CEMS) : low cost, low power servers for Internet-scale services", Conference on Innovative Data Research, 2009.
  12. Hawthorn, N., "Finding security in the cloud", Computer Fraud and Security, Vol.10 (2009), pp.19-20.
  13. Hwang, J. J., H. K. Chuang, Y. C. Hsu, and C. H. Wu, "A business model for cloud computing based on a separate encryption and decryption service", 2011 International Conference on Information Science and Applications( ICISA), (2011), pp.1-7.
  14. John, S., The cloud's five biggest weaknesses, accessed on 29-10-2011, 2010.
  15. Jun, S. and Y. Sha-sha, "The application of cloud storage technology in SMEs", International Conference on E-Business and EGovernment(ICEE), 2011.
  16. Kandukuri, B. R., R. Paturi, and A. Rakshit, "Cloud security issues", Proceedings of the 2009 IEEE International Conference on Services Computing, (2009), pp.517-520.
  17. Kaufman, L. M., "Data security in the world of cloud computing", Security and Privacy, IEEE, Vol.7, No.4(2009), pp.61-64. https://doi.org/10.1109/MSP.2009.87
  18. Kengpol, A. and C. O'Brien, "The development of a decision support for the selection of a advanced technology to achieve rapid product development", International Journal of Production Economics, Vol.69, No.2(2001), pp.177-191. https://doi.org/10.1016/S0925-5273(00)00016-5
  19. Khajeh-Hosseini, A., I. Sommerville, and I. Sriram, "Research challenges for Enterprise cloud computing", 1st ACM Symposium on Cloud Computing, SOCC, 2010.
  20. Li, X., Y. Li, T. Liu, J. Qiu, and F. Wang, "The method and tool of cost analysis for cloud computing", IEEE International Conference on Cloud Computing(CLOUD-II), 2009.
  21. Mansfield-Devine, S., "Danger in the clouds", Network Security, Vol.12(2008), pp.9-11.
  22. Martens, B., F. Teuteberg, and M. Grauler, "Design and implementation of a community platform for the evaluation and selection of cloud computing services : a market analysis", Proceedings of the 19th European Conference on Information Systems, 2011.
  23. Martens, B. and F. Teuteberg, "Decisionmaking in cloud computing environments : A cost and risk based approach", Information Systems Frontiers, (2011), pp.1-23.
  24. Mell, P. and T. Grance, "The NIST definition of cloud computing", National Institute of Standards and Technology, 2009.
  25. Petkovic, I., "CRM in the cloud", 2011 IEEE 8th International Symposium on Intelligent Systems and Informatics, 2010.
  26. Sarkis, J., L. Meade, and A. Presley, "Sustainability in the built environment : factors and a decision framework", Handbook of Corporate Sustainability, Vol.7(2011), pp. 113-136.
  27. Satty, T. L., The Analytic Network Process, RSWPublications, Pittsburgh, PA, 2001a.
  28. Satty, T. L., Decision Making for Leaders, RSWPublications, Pittsburgh, PA, 2001b.
  29. Satty, T. L. and Y. Cho, "The decision by the US congress on China's trade status : a multicriteria analysis", Socio-Economic Planning Sciences, Vol.35, No.4(2001), pp.243-252. https://doi.org/10.1016/S0038-0121(01)00016-7
  30. Singh, C., R. Shelor, J. Jiang, and G. Klein, "Rental software valuation in IT investment decisions", Decision Support Systems, Vol. 38, No.1(2004), pp.115-130. https://doi.org/10.1016/S0167-9236(03)00081-2
  31. Sipahi, S. and M. Timor, "The Analytic Hierarchy Process and Analytic Network Process : An Overview of Applications", Management Decision, Vol.48, No.5(2010), pp.775-808. https://doi.org/10.1108/00251741011043920
  32. Sterritt, R., "Autonomic computing", Innovations in Systems and Software Engineering, Vol.1, No.1(2005), pp.79-88. https://doi.org/10.1007/s11334-005-0001-5
  33. Talukder, A. K., L. Zimmerman, and H. A. Prahalad, "Cloud economics : Principles, costs, and benefits", In N. Antonopoulos and L. Gillam (Eds.), Cloud computing : Principles, systems and applications, London : Springer-Verlag, (2010), pp.343-360.
  34. Tjader, Y. C., J. S. Shang, and L. G. Vargas, "Offshore oursourcing decision making : A policy-maker's perspective", European Journal of Operational Research, Vol.207, No.1(2010), pp.434-444. https://doi.org/10.1016/j.ejor.2010.03.042
  35. Tummala, V. M. R., K. S. Chin, and S. H. Ho, "Assessing success factors for imlementing CE : A case study in Hong Kong electronics industry by AHP", International Journal of Production Economics, Vol.49, No.3 (1997), pp.265-283. https://doi.org/10.1016/S0925-5273(97)00016-9
  36. Tummala, V. M. R., K. S. Chin, and S. Chiu, "An evaluation of success factors using AHP to implement ISO 14001 based EMS", International Journal of Quality and Reliability Management, Vol.16, No.4(1999), pp. 341-361. https://doi.org/10.1108/02656719910248226
  37. Weinhardt, C., A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W. Michalk et al., "Cloud computing-a classification, business models, and research directions", Business and Information Systems Engineering, Vol.1, No.5 (2009), pp.391-399. https://doi.org/10.1007/s12599-009-0071-2
  38. Weiss, A., "Computing in the clouds", net Worker, Vol.11, No.4(2007), pp.16-25.
  39. Wijnmalen, D. J. D., "Analysis of benefits, opportunities, costs, and risks (BOCR) with the AHP-ANP : a critical validation", Mathematical and Computer Modelling, Vol.46, No.7/8(2007), pp.892-905. https://doi.org/10.1016/j.mcm.2007.03.020
  40. Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing, accessed on 29/9/2011.
  41. Xiao, S. and G. Cheng, "Application research of CRM based on SaaS", 2010 International Conference on E-Business and E-Government, 2010.
  42. Yeo, C. S., S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, Vol.26, No.8(2010), pp.1368-1380. https://doi.org/10.1016/j.future.2009.05.024
  43. Zhang, Q., L. Cheng, and R. Boutaba, "Cloud computing : state of the art and research challenges", Journal of Internet Services and Applications, Vol.1, No.1(2010), pp.7-18. https://doi.org/10.1007/s13174-010-0007-6

Cited by

  1. Modelling of Cloud Computing Enablers Using MICMAC Analysis and TISM vol.9, pp.3, 2018, https://doi.org/10.4018/IJACI.2018070103