Cloudsourcing: Managing Cloud Adoption

Cloud computing adoption by organizations has been minor despite the initial optimism. The primary concerns obstructing adoption of cloud-based services are security, loss of control, and inadequate legislative. In a cloud-based model, information technology services are distributed and accessed over networks such as intranet or internet. Intranets are inside organizations and internet outside. The main concerns are inherently linked to employing services provided by other organizations and accessing them over internet. In such case, valuable organizational data and services are transferred to providers. The provider or other entities may compromise organizational data and services, thus posing significant security risks. By moving data and services to outside providers, organizations also loose substantial control over timely management and retention. Organizations must follow the rules set by the providers‒ which may not be well suited for them. The providers legally distance themselves from liabilities on important issues such as security, data loss and damage. There are also several other pertinent factors. Proper cloud computing adoption and utilization by organizations requires balanced approach. We elucidate various factors and highlight proper strategic concepts for effective cloud adoption management—benefiting both organizations and providers.

[1]  Paul Hofmann,et al.  Cloud Computing: The Limits of Public Clouds for Business Applications , 2010, IEEE Internet Computing.

[2]  Dimitrios Katsaros,et al.  Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.

[3]  John C. Henderson,et al.  Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing , 2010, MIS Q. Executive.

[4]  Marc Ringel,et al.  Knowledge management in international organisations , 2010, J. Knowl. Manag..

[5]  H. Collins Corporate Portals: Revolutionizing Information Access to Increase Productivity and Drive the Bottom Line , 2000 .

[6]  Thomas Hess,et al.  Software as a Service , 2008, Wirtschaftsinf..

[7]  Andrzej M. Goscinski,et al.  Toward dynamic and attribute based publication, discovery and selection for cloud computing , 2010, Future Gener. Comput. Syst..

[8]  Paul Lanois Caught in the Clouds: The Web 2.0, Cloud Computing, and Privacy? , 2010 .

[9]  Borja Sotomayor,et al.  Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.

[10]  Evangelos Katsamakas,et al.  Performance effects of information systems integration: : A system dynamics study in a media firm , 2010, Bus. Process. Manag. J..

[11]  David S. Linthicum,et al.  Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide , 2009 .

[12]  M. Alvesson Knowledge Work And Knowledge-Intensive Firms , 2004 .

[13]  Jens Dibbern,et al.  Assessing the potential of ubiquitous computing for improving business process performance , 2010, Inf. Syst. E Bus. Manag..

[14]  Eric Hand,et al.  Head in the clouds , 2007, Nature.

[15]  Dan Sullivan,et al.  Proven Portals: Best Practices for Planning, Designing, and Developing Enterprise Portals , 2003 .

[16]  Enuma Orakwue Private Clouds: Secure Managed Services , 2010, Inf. Secur. J. A Glob. Perspect..

[17]  Michael Hall,et al.  Security and Control in the Cloud , 2010, Inf. Secur. J. A Glob. Perspect..

[18]  Ramaraj Palanisamy,et al.  An empirical study on the influences on the acquisition of enterprise software decisions: A practitioner's perspective , 2010, J. Enterp. Inf. Manag..

[19]  Andreas Haeberlen,et al.  A case for the accountable cloud , 2010, OPSR.

[20]  Gary Anthes security in the cloud Cloud computing offers many advantages , but also involves security risks . Fortunately , researchers are devising some ingenious solutions , 2010 .

[21]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[22]  Roger Smith,et al.  Computing in the Cloud , 2009 .

[23]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[24]  Ilia Petrov,et al.  Aspects of Data-Intensive Cloud Computing , 2010, From Active Data Management to Event-Based Systems and More.

[25]  T. Davenport Thinking for a living : how to get better performance and results from knowledge workers , 2005 .

[26]  Sean Cubitt,et al.  Does cloud computing have a silver lining? , 2011 .

[27]  Michael Rosen,et al.  Applied SOA: Service-Oriented Architecture and Design Strategies , 2008 .

[28]  N. Panagopoulos,et al.  Intraorganizational information and communication technology diffusion: Implications for industrial sellers and buyers , 2007 .

[29]  Tom Butler,et al.  Understanding the design of information technologies for knowledge management in organizations: a pragmatic perspective , 2007, Inf. Syst. J..

[30]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.