Cloud computing - The business perspective

The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. However, if cloud computing is to achieve its potential, there needs to be a clear understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing. In this article, we identify the strengths, weaknesses, opportunities and threats for the cloud computing industry. We then identify the various issues that will affect the different stakeholders of cloud computing. We also issue a set of recommendations for the practitioners who will provide and manage this technology. For IS researchers, we outline the different areas of research that need attention so that we are in a position to advice the industry in the years to come. Finally, we outline some of the key issues facing governmental agencies who, due to the unique nature of the technology, will have to become intimately involved in the regulation of cloud computing.

[1]  N. Carr The end of corporate computing , 2005 .

[2]  Ronald B. Mitchell,et al.  Sources of Transparency: Information Systems in International Regimes , 1998 .

[3]  Jim Gray,et al.  Distributed Computing Economics , 2004, ACM Queue.

[4]  Won Kim,et al.  Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..

[5]  Davide Maria Parrilli,et al.  Legal Issues in Grid and Cloud Computing , 2010, Grid and Cloud Computing.

[6]  Myoung-Ho Kim,et al.  An analysis of the optimal number of servers in distributed client/server environments , 2004, Decis. Support Syst..

[7]  Selwyn Piramuthu,et al.  Real option valuation on grid computing , 2008, Decis. Support Syst..

[8]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[9]  Allison M. McCormack,et al.  Information Age , 1979 .

[10]  Vincent S. Lai,et al.  The impact of transborder data flow restrictions on international information systems management , 1998, Decis. Support Syst..

[11]  Randolph B. Cooper,et al.  The inertial impact of culture on IT implementation , 1994, Inf. Manag..

[12]  Omer F. Rana,et al.  Economic Models and Algorithms for Distributed Systems , 2009, Economic Models and Algorithms for Distributed Systems.

[13]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[14]  Margaret K. Mayer Future trends in model management systems: parallel and distributed extensions , 1998, Decis. Support Syst..

[15]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[16]  Zhangxi Lin,et al.  A cost-effective critical path approach for service priority selections in grid computing economy , 2006, Decis. Support Syst..

[17]  Jörn Altmann,et al.  Cloud Computing Value Chains: Understanding Businesses and Value Creation in the Cloud , 2010, Economic Models and Algorithms for Distributed Systems.

[18]  Sailesh Chutani,et al.  SLA management in federated environments , 2001, Comput. Networks.

[19]  J. Christopher Westland,et al.  Assessing the Economic Benefits of Information Systems Auditing , 1990, Inf. Syst. Res..

[20]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[21]  Malcolm Munro,et al.  Information Technology Assessment and Adoption: A Field Study , 1985, MIS Q..

[22]  Hsing Kenneth Cheng,et al.  Optimal location and pricing of Web services intermediary , 2005, Decis. Support Syst..

[23]  Vasudeva Varma,et al.  Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.

[24]  Jahyun Goo,et al.  Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory , 2008, Decis. Support Syst..

[25]  Clayton M. Christensen The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .

[26]  Hong Guo,et al.  The Debate on Net Neutrality: A Policy Perspective , 2008, Inf. Syst. Res..

[27]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[28]  Richard F. Deckro,et al.  Evaluating information assurance strategies , 2005, Decis. Support Syst..

[29]  Mike P. Papazoglou,et al.  Integrated value chains and their implications from a business and technology standpoint , 2000, Decis. Support Syst..

[30]  H. Raghav Rao,et al.  Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..

[31]  Henry C. Lucas,et al.  The information systems identity crisis , 2005 .