A Framework for the Evaluation of CloudSourcing Proposals

Many organisations have recently adopted variants of cloud computing. Many of them have done so with considerable enthusiasm, but with very little reflection. Commentators have warned of uncertain benefits, predictable disbenefits and a wide range of risks. A study of IT media reports shows that cloud outages are frequent, and that at least some of the theoretical risks are very real. This paper draws on the accumulated bodies of theory on outsourcing and information and IT security in order to propose an evaluation framework. This instrument supports an organisation's executives in evaluating proposals for cloud computing, and assists their governing Boards to fulfil their legal obligations to ensure that choices are informed by business case analysis and risk assessment.

[1]  Roger Clarke,et al.  Evaluation Or Justification? The Application of Cost/benefit Analysis to Computer Matching Schemes , 1997, ECIS.

[2]  Leslie P. Willcocks,et al.  Business process outsourcing studies: a critical review and research directions , 2011, J. Inf. Technol..

[3]  Ojelanki K. Ngwenyama,et al.  How are Public Sector Organizations Managing is Outsourcing Risks? An Analysis of Outsourcing Guidelines from Three Jurisdictions , 2005, J. Comput. Inf. Syst..

[4]  Anne C. Rouse,et al.  Explaining I.T. Outsourcing Purchasers' Dissatisfaction , 2006, PACIS.

[5]  Roger Clarke How reliable is cloudsourcing? A review of articles in the technical media 2005-11 , 2012, Comput. Law Secur. Rev..

[6]  R. Hirschheim,et al.  Information systems outsourcing : myths, metaphors, and realities , 1993 .

[7]  Roger Clarke The Cloudy Future of Consumer Computing , 2011, Bled eConference.

[8]  Dirk Neumann,et al.  Bridging the Grid Adoption Gap - Developing a Roadmap for Trading Grids , 2007, Bled eConference.

[9]  Dirk Neumann,et al.  A Pay-as-Bid Mechanism for Pricing Utility Computing , 2007, Bled eConference.

[10]  Leslie P. Willcocks,et al.  Global Information Technology Outsourcing: In Search of Business Advantage , 2001 .

[11]  Roger Clarke Business Cases for Privacy-Enhancing Technologies , 2008 .

[12]  Ralf Steinmetz,et al.  European Conference on Information Systems ( ECIS ) Summer 10-6-2011 TAXONOMY OF TECHNOLOGICAL IT OUTSOURCING RISKS : SUPPORT FOR RISK IDENTIFICATION AND QUANTIFICATION , 2017 .

[13]  Roger Clarke,et al.  Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective , 2010, Bled eConference.

[14]  N. Venkatraman,et al.  An Empirical Study of Information Technology Outsourcing: Benefits, Risks, and Performance Implications , 1995, ICIS.

[15]  Leslie P. Willcocks,et al.  A review of the IT outsourcing empirical literature and future research directions , 2010, J. Inf. Technol..

[16]  Fatemeh Zahedi,et al.  The Next Phase of IT Outsourcing - Utility Computing: Understanding Utility Computing Acceptance , 2004, AMCIS.

[17]  Roger Clarke,et al.  User Requirements for Cloud Computing Architecture , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[18]  Christian M. Messerschmidt,et al.  Adoption of Grid Computing: an Empirical Verification of an Inter- and Intra-Organizational Approach , 2009, PACIS.

[19]  Bandula Jayatilaka,et al.  A Conjoint Approach to Understanding IT Application Services Outsourcing , 2009, J. Assoc. Inf. Syst..

[20]  Odd Fredriksson,et al.  European Conference on Information Systems ( ECIS ) 2008 Outsourcing Terms : A Literature Review from an ISD Perspective , 2017 .

[21]  Anne C. Rouse,et al.  Testing Some Myths About IT Outsourcing: A Survey of Australia's Top 1000 Firms , 2008, ECIS.

[22]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..