ASIAN JOURNAL OF MANAGEMENT RESEARCH Online Open Access publishing platform for Management Research

Size: px
Start display at page:

Download "ASIAN JOURNAL OF MANAGEMENT RESEARCH Online Open Access publishing platform for Management Research"

Transcription

1 Online Open Access publishing platform for Management Research Copyright by the authors - Licensee IPA- Under Creative Commons license 3.0 Research Article ISSN Multi-criteria Decision in the Adoption of Cloud Computing Services for SME s based on BOCR Analysis Sania Khan 1, Mohammed Shahid Ahamed Khan 2, Chitta Sai Kumar 3 Ph.D Student at Gitam School of International Business, GITAM University, Visakhapatnam Sales Account Manager - IT Infrastructure Solution and Services, Computer Support House Co. Ltd., Riyadh, Kingdom of Saudi Arabia Electrical Engineer, Humaidi Munawar Al Onaizy Est., Riyadh, Kingdom of Saudi Arabia saniakhan05@gmail.com ABSTRACT Cloud computing being recognized as a huge transformation in the IT management has raised many questions among the IT experts towards its adoption in SME s (Small and Medium Enterprises). Past researches having demonstrated the strengths, weakness, opportunities and threats (SWOT) reinforced them with the technology acceptance, however they lack in suggesting the strong adoption decisions for SME s. Minimizing the economic downturn being one of the major objectives of this service adoption, it is prudent to consider the voice of cloud consumers and experts to investigate and suggest SME s with possible multi-criteria decisions based on BOCR (Benefit, Opportunity, Cost and Risk) analysis. A structural model using Analytic Hierarchy Process (AHP) was developed by assigning the weights and prioritizing each component with respect to the BOCR criteria. The findings suggested that cloud services are still in emerging stage and SME s are interested due to the excellent benefits and opportunities provided in align with the firm s growth. Despite major data security attacks and privacy issue stories from the past, if the cloud service providers can still work on ensuring and minimize such issues, cloud services will have a promising business growth in the future. This study helps organizations to strategically focus on these criteria to reach to a higher level of competitiveness and also assists decision makers to strategically leverage their efforts by effective implementation of cloud computing. Finally, the study concludes with several interesting pointers as directions for further researchers. Keywords: Cloud Computing, Cloud Computing Adoption, BOCR Analysis, Multi-Criteria Decision Making, SMEs, Structural Hierarchy Model, Analytic Hierarchy Process, AHP. 1. Introduction The growing applicatitons, stoage devices and database are proliferating the need for infrastructure drastically, while SME s with limited resources and lack of sophisticated technical expertise are facing challenges to setup their IT infrastructure in their everyday operations. At the same time it is inappropriate to accept every new technology that are being introduced in the IT industry very oftenly. However, IT experts visualized cloud computing as a key revolution in today s scenario, due to enormous sustainable benefits and opportunities provided with respect to three dimensions namely socio- economic and environment. On the other side, enterprises need to evaluate these benefits, opportunities, cost and risk which are practical in business environment before taking any strong decisions in the adoption of cloud services. 606

2 Based on this, present paper is organized into several sections. Section 2 presents the detailed review on cloud computing literature from BOCR perspectives. Section 3 explains the methodology usage in developing a muti-criteria decision and prioritization of main and subcriteria. Section 4 discusses the findings of the study and section 5 provides limitations, implications and concludes the study, followed by few possible directions for further research and adding references at the end. 2. Review of Literature The retrospective analysis of cloud computing provides several evidences, in understanding what factors are driving business organizations towards cloud adoption. Previously, many computing technologies like virtualization, web 2.0 and grid computing are adequately enough to simplify the complex IT practices establishing a high performance and easy resolutions for many business and technical concerns (Hunter, Little and Schroeter, 2008). Infact, some authors perceive cloud computing evolved from distributed and grid computing (Che et al, 2011). Similarly virtualization fetched the business to reduce the number of servers, server maintenance and staffing costs to consolidate the data center deployment (Gillen et al., 2008). Dunn, 2010; Buyya et al., 2009; 2010b; Holliday, C., and Hurst; 2006; Khajeh-Hosseini et al., 2010a; Yeboah-Boateng, E. O., and Essandoh, K. A. 2014; Schubert Jeffery and Neidecker-Lutz 2010) and it is an inevitable technology which is highly coupled with the cloud computing concept indicated by most of the firms who look for the economic downturn by reducing costs (Ogigau-Neamtiu, 2012; Hashizume et al. 2013; Kim, 2009; Mosher, 2011; Atayero and Feyisetan, 2011; Zissis and Lekkas, 2012). Buyya et al., 2009, in his Service Level Agreement (SLA) demonstrated the opportunity to minimize 53% of IT data center expenditure by reduced powering and cooling requirements. Further, Buyya et al, 2010a, also demonstrated cloud applications and services are supportive for start-up firms to generate additional revenues. Schubert, Jeffery and Neidecker-Lutz, 2010, demonstrates several benefits of cloud adoption viz., agility and adaptability being subset of elasticity, the consumer can be benefited with dynamic integration and extraction of physical resources and can pay per user licenses. These services are reliable as they provide expected output with minimum response time, guaranteed quality of service and no data loss or disruption by the service provider. Further the infrastructure and other resources in other location under others ownership are used by consumer on rent basis for a particular time period can actually help to put down the carbon emissions from their IT operations to meet legislative compliances and moreover can get good Return on Investment (ROI) (Bisong and Rahman, 2011; Rashmi et al, 2013; Qaisar and Khawaja, 2012). Despite several benefits by cloud adoption, there are many opportunities to develop new skills, organization growth, offering new products and services, improved work environment of the firm and a chance to focus on ITC s income and expenditure (Schubert, Jeffery and Neidecker-Lutz, 2010; Khajeh-Hosseini et al. (2010a). Chang et al, 2012a; Mohlameane, M. J., and Ruxwana, N. L., 2013, demonstrates the academic institutes and SME s have achieved the cost-saving with an improvement in user satisfaction through cloud adoption. Though the SME s consider the cost incurred on ICT as a key barrier, cloud services attracts them by reducing the cost of infrastructure, operations and maintenance cost. So it is crucial that the firms must analyze the costs of initial operations, compliances, privacy and security issues, and high switching costs due to 607

3 incompatibilities or migrating to different platforms necessarily, all of these components constitutes as the determinants in the overall cost of cloud adoption. However expecting risk in cloud adoption, Khajeh-Hosseini et al, (2010a) stated there might be chances of privacy and data security issues as these services are centrally operated through standard web protocols by the service providers, while few of the past failure cases from reputed organizations like Sony corporation inputs to undertake a careful understanding on these services. As cloud computing is linked with users sensitive data stored both at clients end and at cloud servers as well, identity management and authentication are very essential in cloud and these can also be outsourced to any third party specialists (Kim and Hong, 2012; Emam, 2013; Gonzalez et al, 2012; Sharma and Mittal, 2013; Han, Susilo and Mu, 2013; Yassin, A. A. et al, 2012). However third party relationship may arise a risk despite of other security threats inherent in infrastructural and virtual machine aspects (Hashizume et al., 2013). While security failure, lack of robustness and consistent being intolerable for cloud, the benefits, flexibility and agility are explained to have trivial credibility (Monjur and Mohammad Ashraf, 2014). Verification of genuine users and protecting their credential are crucial and violation of such matters will result in security concern (Kumar, 2012). However trusting the cloud depends on several aspects viz., human factor, process and policies, automation management (Abbadi and Martin, 2011). DDoS (Distributed Denial of Service) is common and major attack for cloud computing infrastructure (Dou, Chen and Chen, 2013). Other business risks can be like vendor lock-in, licensing issues, software bugs, service unavailability, provider's business discontinuity, but frankly speaking these does not come under security issues from technical perspective (Kim, 2009). User accounting, authentication and encryption are best practices of safe computing (Lee, 2012; Ogigau-Neamtiu, 2012; Singh and Jangwal, 2012). Issa M. Khalil et al, 2014 had given detail list of nine different attacks against cloud, along with their appropriate incidents, consequences and vulnerability caused by different parameters. It is known that the relay commands through Google AppEngine attacked computer (Google, 2014) and allowed to steal sensitive information from the Raytheon cloud (Raytheon, 2014). Also cloud computing found be an ideal environment for botnet attacks (Lin, W, 2012). In June, 2009 a complete homomorphism encryption scheme introduced by IBM endorsed data to be processed without getting decrypted (IBM, 2010). Differential privacy protection technology like air vat and cloud calculation stages prevented privacy leakages without authorization (Roy, I et al, 2013). Nevertheless these attempts seem to resolute data security and privacy issues, the customer also need to cope up with the minimum supporting resources and technical knowledge to properly accept the cloud, failure of which will lead to incompetent utilization of the cloud services. IT outsourcing being an alternative to cloud migration, few firms perceive as departmental downsizing and uncertainty with new technology which can deteriorate the customer care and service quality. The firms with hitech, affordable IT infrastructure and expertise believe as increased dependence on third parties with unsatisfied work. Though market size for public and hybrid cloud reached from US $59 billion to US $149 by 2014, indicating a hike in future revenue estimation, few business critical applications and 608

4 large enterprises are reluctant to move towards cloud adoption and the market is still far behind the expected one. In this direction Gartner Inc. research, Darryl Carlton, (2013) gave indications to conduct further studies on market trends and new requirements for application modernization to support business-led value. Additionally forecast on overview and analysis of public cloud world wide, the future of IT Sales and factors driving cloud evolution will gain practical knowledge to cloud computing adoption. The below Table 1 summarizes the cloud computing literature based on BOCR criteria and provides the roadmap for the study. Benefits Work productivity Agility, adaptability, scalability Better quality service Cost effective Return investment Going Green Ease of use on Table 1: List of BOCR Criteria and Sub-criteria (Source: Literature) Opportunity Emerging new skills New product/service development Pay for use licenses Standardized process Quick resolution problem Advanced work environment of Cost High cost initial High switching cost Cost uncertainty Risk Privacy and data security Lack of supporting resources Lack of cloud computing knowledge Departmental downsizing New uncertainty technology Dependence on third party Compatibility and internet connectivity Institutional readiness Legal policy and standards Migration to different platforms As all the criteria look independent and equally important, there is no clarity on hierarchy of either of them. So a research question has raised, Which is the most important criteria that explains the cloud adoption specifically in SME s? 3. Research Methodology To address the research question AHP, proposed by Thomas Satty, 1980; found to be an appropriate technique for the managers to take suitable strategic decision about a problem with the available multi-criteria decisions in hand (Sharma et al., 2008). It involves the mathematical synthesis of numerous judgments about the decision problem and decomposes into a multilevel hierarchical structure of criteria/alternatives by performing both discrete and continuous pairwise comparison of each element so as to obtain a relative importance of the 609

5 elements at each level to generate the best decision among the available one (Saaty and Vargas, 1996). The prioritization process is accomplished by assigning a number from a comparison scale (see Table 2) developed by Saaty (1980) to represent the relative importance of the criteria. Pairwise comparison matrices of these factors provide the means for calculation of importance (Sharma et al., 2008). Table 2: Pairwise Comparison Scale (Saaty, 1980; Yuksel and Dagdeviren, 2007) Intensity of Importance Explanation 1 Two criterion contribute equally to the objective ,4,6,8 Experience and judgment slightly favor one over another Experience and judgment strongly favor one over another Criterion is strongly favored and its dominance is demonstrated in practice Importance of one over another affirmed on the highest possible order Used to represent compromise between the priorities listed above The AHP method starts first with structuring the model, comparative analysis of the criteria/alternatives and then generating the priorities. Referring to the literature, AHP has been widely used in solving many decision making problems in different fields of research studies (Kurttila et al., 2000; Kangas et al., 2001, Kajanusa et al., 2004; Arslan and Turan, 2009; Sania Khan et al, 2011; Lee and Walsh, 2011). Primarily, the AHP splits the complex decision problem into a multi-criteria decision making and forms a hierarchy of interrelated decision elements in the form of a family tree (Dagdeviren et al., 2009). Secondly, it compares the criteria or the alternatives. After the problem has been decomposed and the hierarchy is constructed, prioritization procedure starts in order to determine the relative importance of the criteria. In each level, the criteria are compared pairwise according to their levels of influence and based on the specified criteria in the higher level. A multiple pairwise comparisons are conducted based on a standardized comparison scale of nine levels (Albayrak and Erensal, 2004). In the data collection procedure, the design of questionnaires for survey research (e.g. public opinion polls) represents one of the most controversial issues among survey researchers in terms of accuracy in measuring respondents perception. In order to determine the weights, the AHP determines weights of a set of factors by comparing them pair-wise and it uses its own (1/9, 1/8..8, 9) ratio scale judgments, by believing that peoples ability to make qualitative decisions is well represented by five attributes: equal, weak, strong, very strong and absolute. The numbers 2, 4, 6 and 8 stands for intermediate values between the numbers adjacent to them. The description of the scale provided by Satty (1980, p.54) is shown in Table 2. The scale 1-9 is used accordingly, based on the intensity of importance of the element i and if the element j is important than i, a fractional form of scale 1-9 is used like 1/9, 1/7 etc. The cloud computing adoption framework consists of four main criteria and each element has a number of sub-criteria resulting in five pair-wise comparison matrices (PCMs). An AHP template in Excel with self-explanatory was developed having five empty PCMs as a questionnaire, comprising only the main criteria and sub-criteria. Saudi Arabia, SMEs 610

6 account for approximately one-fourth of the country s GDP, 63% of the employment, and 98% of all the enterprises (Zawya, 2012) and also provides more job opportunities in comparison with large enterprises. Statistical data reveals about 1:28 new jobs generation for each one million of Saudi Riyal investment in large and SMEs respectively (Sadi and Henderson, 2011). In the Saudi Arabia s Ninth Economic Plan ( ) government has given emphasis on the importance of SMEs in the development of the Kingdom s economy (Saudi Gazette, 2012). All these facts provide impetus to conduct a study on Saudi Arabia s SME s. As Riyadh considered as major industrial cities in the country constituting many SME s, the questionnaire was circulated to 120 IT experts in the field of cloud computing from different SME s in Riyadh, Kingdom of Saudi Arabia (K.S.A). Only 48 respondents returned the filled in questionnaires, in that only 42 responses found to be useful. The responses from all the respondents are aggregated using the geometric mean rule, which indicates the central tendency or typical value of a set of numbers by using the product of their values and taking n th root of the resulting product value as shown below, where R is the response of each respondent. GEOMETRIC MEAN = nth (R1, R2...Rn) Let C = {Cj j = 1, 2.. n} be the set of criteria. The result of the pairwise comparison on n criteria can be summarized in an (n x n) evaluation matrix A in which every element aij (i, j = 1, 2... n) is the quotient of weights of the criteria. This pairwise comparison can be shown by a square and reciprocal matrix, (see Eq. (1)). a11 a12 a13..a1n A = (aij) nxn = a21 a22 a23..a2n.... (1) an1 an2 an3...ann Finally, each matrix is normalized and the relative weights are found. The relative weights are given by the right eigenvector (w) corresponding to the largest eigenvalue (λmax), as: Avg. of wts. = Eigen weights= λ max.w... (2) If the pairwise comparisons are completely consistent, the matrix A has rank 1 and λmax = n. In this case, weights can be obtained by normalizing any of the rows or columns of A (Albayrak and Erensal, 2004; Wang and Yang, 2007; Boraji and Yakchali, 2011). It should be noted that the quality of the output of the AHP is related to the consistency of the pairwise comparison judgments. The consistency is defined by the relation between the entries of A: aij x ajk = aik (Dagdeviren et al., 2009). The Consistency Index (CI) can be calculated by using the following formula (Saaty, 1980), n is the number of elements/criteria or alternatives based on which Random Index is considered as in Table 3. CI = (λmax n) / (n 1)... (3) 611

7 Table 3: Random Index (Source: Saaty and Vargas, 1991) N RI Table 4: Multi-criterion Weightages and Rankings Calculated Using AHP (Source: Survey Results from AHP) Sr. AHP Rank / Criterion and Sub-Criterion No. Weights Sub-Ranks 1 BENEFITS Work Productivity Agility, adaptability, Scalability Better Service Quality Cost Effective Return on Investment Going Green Ease of Use OPPORTUNITY Emerging New Skills New Product/Service Development Pay for Use Licenses Standardized Process Quick Resolution of Problem Advanced Work Environment COST High Initial Cost High Switching Cost Cost Uncertainty RISK Privacy and Data Security Lack of Supporting resources Lack of Cloud Computing Knowledge Departmental Downsizing New Technology Uncertainty Dependence on Third Party Compatibility and Internet Connectivity Institutional Readiness Legal Policy and Standards Migration to Different Platforms Using the final consistency ratio (CR) can conclude whether the evaluations are sufficiently consistent. The CR is calculated as the ratio of the CI and the random index (RI), as indicated in Eq. (4). The number 0.1 is the accepted upper limit for CR. If the final consistency ratio 612

8 exceeds this value, the evaluation procedure has to be repeated to improve consistency (Boraji and Yakchali, 2011). CR = CI/RI. (4) After calculating these values, the average weights of each criteria are considered as AHP weights and accordingly ranks are allotted for criteria and sub-criteria as shown in Table 4. The CR value being below 10%, the figure 1, represents the hierarchical structural model of BOCR criteria and sub-criteria with rankings for cloud computing adoption in SME s. 4. Results In comparison to all the main criteria, the benefits and opportunity received first and second highest weightages respectively. This is apparently because the respondents think that in the current ICT business environment benefits are significantly important and would welcome the cloud computing adoption which can provide them with best service quality and good work productivity along with expected returns on their investments. Figure 1: Hierarchical Structural Model of BOCR Criterion and Sub-criterion with Rankings for Cloud Computing Adoption in SME s Using AHP (Source: Developed from AHP Results) 613

9 They provide an opportunity for the new firms and SME s to get quick resolution for their technical problems anywhere in the world and assists them in learning new skills at a minimum cost and would establish a standard work process to be competitive in the industry. The risk is given next highest priority with a due consideration to the privacy and data security issues thinking that the new technology may be slightly uncertain and experimental in nature during the initial stages. Though it is an added advantage for the cloud adoptors to escape from the legal policies and standards, it is again a risk for service providers. The SME s rather perceiving the departmental downsizing, third party dependence as a threat, must rise their status with alternatives to understand the cloud computing well and support with necessary resources along with service providers. The cost is given least importance among all, which indicates the overall cost would be minimum to whatever extent they utilize the services accordingly. Nevertheless, the cost uncertainty, initial cost and switching cost must be competitive than the cost incurred on traditional IT process and must be discussed clearly at the earlier stage of service adoption. 5. Limitations, Implications and Conclusion As cloud computing technology is still in emerging stage and not so practically familiar in Saudi SME s the study suffers from following limitations. As cloud computing is not implemented vigorously among most of the SME s in Saudi Arabia, the study lacks the proficient experts with good knowledg and hands of experience in this field, consequently resulted in choosing only few potential experts to get accurate responses and also to manage the time frame of the study. These findings are applicable for only SME s and may not be generalized for other larger enterprises, as they differ in their business requirements, security and privacy issues. This study attempted to estimate appropriate weightages of various criterion associated with the cloud computing adoption among Saudi SME s using a multi-criterion decision method called Analytic Hierarchy process (AHP). It has also facilitated to prioritize the criterion and enabled us to provide action oriented suggestions and practical implications to Saudi SME s. On overall basis, the benefits and opportunities were prioritized as first and second respectively followed by risk and cost criteria. Hence it is understood the firms are expecting for a good quality service and instant problem solving in their regular IT operations. Even though the risk of privacy and data security are given prominent importance they can be managed by suitable type of cloud deployment among public, private, community and hybrid cloud. The cost found to be the least significant, assuming the overall idea behind welcoming such service is for cost reduction. This study also contributes in providing some useful managerial implications to the cloud service providers and SME s in understanding the enterprises and their expectations in cloud adoption and take strategial decisions to reach higher level of competitiveness respectively. The study was able to provide only the relative importance of each BOCR criteria for SME s, so further studies can focus on, 1. Other geographic locations of the world to acquire broad opinion on cloud computing adoption and also can make an attempt to develop the best marketing strategies and alternatives to overcome the barriers in cloud adoption. 2. Identifying and examining the interrelationships among the underlying factors and service quality could be useful in deriving certain inferences to the IT industry. 614

10 3. Further, investigating the dynamic behaviour of cloud consumers may help in understanding them over the time and serve better. 4. Analysing the future market trend would provide some practical implications to IT industry. 6. References 1. Abbadi, I.M. and Martin, A., (2011), Trust in the Cloud. Information Security Technical Report, 16, pp Albayrak, E., and Erensal, Y. C., (2004), Using analytic hierarchy process (AHP) to improve human performance. An application of multiple criteria decision making problem. Journal of Intelligent Manufacturing, 15, pp Arslan, O., and Turan, O., (2009), Analytical investigation of marine casualties at the Strait of Istanbul with SWOTAHP method. Maritime Policy and Management, 36(2), pp Atayero, A.A. and Feyisetan, O., (2011), Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption. Journal of Emerging Trends in Computing and Information Sciences, 2(10), pp Bisong, A. and Rahman, S.S.M., (2011), An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security and Its Applications, 3(1), pp Borajee, M. and Yakchali, S. H., (2011), Using the AHP-ELECTRE III integrated method in a competitive profile matrix. International Conference on Financial Management and Economics 2011Proceedings, pp Buyya, R., Beloglazov, A., and Abawajy, J., July, (2010b), Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges. PDPTA'10 - The International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, USA. 8. Buyya, R., Ranjan, R., and Calheiros, R. N., (2010a), InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services, Algorithm and Architectures for Parallel Processing. Lecture Notes in Computer Science, 6081/2010, pp Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., and Brandic, I., (2009), Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Journal of Future Generation Computer Systems, 25(6), June, pp Celik, A., Holliday, J. and Hu st, Z., (2006), Data Dissemination to a Large Mobile Network: Simulation of Broadcast Clouds. The 7th International Conference on Mobile Data Management (MDM), May, Santa Clara University, USA. 615

11 11. Chang, V., Wills, G., Walters, R., and Currie, W., (2012a), Towards a structured Cloud ROI: The University of Southampton cost-saving and user satisfaction case studies. In Sustainable ICTs and Management Systems for Green Computing. IGI Global, page Che, J. Duan, Y, Zhang, T. and Fan, J., (2011), Study on the security models and strategies of cloud computing. Procedia Engineering, 23, pp Dagdeviren, M., Yavuz, S., and Kılınc, N., (2009), Weapon selection using the AHP and TOPSIS methods under fuzzy environment. Expert Systems with Applications, 36, pp Darryl Carlton, (2013), Cloud Computing 2014: ready for real business? Gartner Inc. 15. Dunn, T., (2010), Identity Management: Cloud and Virtualisation. Keynote, Munich Cloud. 16. Emam, A.H.M., (2013), Additional Authentication and Authorization using Registered -ID for Cloud Computing. International Journal of Soft Computing and Engineering, 3(2), pp Gillen, A., Grieser, T., and Perry, R., July, (2008), Business Value of Virtualization: Realizing the Benefits of Integrated Solutions. White Paper, the IDC. 18. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M. and Pourzandi, M., (2012), A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing, 1(11), pp Google Cloud Platform Used for Botnet Control, (2014), Available online: accessed during January Han, J., Susilo, W. and Mu, Y., (2013), Identity-based data storage in cloud computing. Future Generation Computer Systems, 29, pp Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B., (2013), An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), pp Hunter, J., Little, S., and Schroeter, R., (2008), The Application of Semantic Web Technologies to Multimedia Data Fusion within e-science. Book Chapter, Chapter 8, Semantic Multimedia and Ontologies, Part 3, pp IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering, (2010), at Uncovers- Encryption-Scheme-That-Could-Improve-Cloud-Security- Spam-Filtering135413/. Map Reduce, In: Castro M, Eds Proc. of the 7th Usenix Symp. On Networked Systems Design and Implementation. San Jose: USENIX Association, pp

12 24. Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem, (2014), Cloud computing security: A survey, Computers, 3, pp Kajanusa, M., Kangas, J., and Kurttila, M., (2004), The use of value focused thinking and the A WOT hybrid method in tourism management. Tourism Management 25, pp Kangas, J., Pesonen, M., Kurttila, M., and Kajanus, M., (2001), A'WOT: Integrating the AHP with SWOT Analysis. 6th ISAHP 2001 Proceedings, Berne, Switzerland, pp Khajeh-Hosseini, A., Greenwood, D., and Sommerville, I., 5-10, July,(2010a), Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. 3rd IEEE International conference on Cloud Computing, Miami, USA. 28. Kim, J. and Hong, S., (2012), A Consolidated Authentication Model in Cloud Computing Environments. International Journal of Multimedia and Ubiquitous Engineering, 7(3), pp Kim, W., (2009), Cloud Computing: Today and Tomorrow. Journal of Object technology, 8(1), pp Kumar, A., (2012), World of Cloud Computing and Security. International Journal of Cloud Computing and Services Science, 1(2), pp Kurttila, M., Pesonen, J., Kangas, M., and Kajanus, M., (2000), Utilizing the analytic hierarchy process (AHP) in SWOT analysis- a hybrid method and its application to a forest-certification case. Forest Policy and Economics, 1, pp Lee, K., (2012), Security Threats in Cloud Computing Environments. International Journal of Security and Its Application, 6(4), pp Lee, S., and Walsh, P., (2011), SWOT and AHP hybrid model for sport marketing outsourcing using a case of intercollegiate sport. Sport Management Review, 14, pp Lin, W., Lee, D., (2012), Traceback attacks in cloud Pebbletrace botnet. In Proceedings of the nd International Conference on Distributed Computing Systems Workshops (ICDCSW), Macau, China, pp Monjur Ahmed and Mohammad Ashraf Hossain, (2014), Cloud computing and security issues in the cloud, International Journal of Network Security and Its Applications (IJNSA), 6(1), pp Mosher, R, (2011), Cloud Computing Risks. ISSA Journal, July Issue, pp Mpho Mohlameane, J. and Nkqubela Ruxwana, L., (2013), The Potential of Cloud Computing as an Alternative Technology for SME s in South Africa. Journal of Economics, Business and Management, 1(4), pp

13 38. Ogigau-Neamtiu, F., (2012), Cloud Computing Security Issues. Journal of Defense Resource Management, 3(2), pp Qaisar, S. and Khawaja, K.F., (2012), Cloud Computing: Network/Security Threats and Countermeasures. Interdisciplinary Journal of Contemporary Research in Business, 3(9), pp Rashmi, Sahoo, G. and Mehfuz, S., (2013), Securing Software as a Service Model of Cloud Computing: Issues and Solutions. International Journal on Cloud Computing: Services and Architecture, 3(4), pp Raytheon UK Targeted in Cloud-Based Attack, (2014), Available online: accessed during January Roy, I., Ramadan H.E., Setty S.T.V., Kilzer A., Shmatikov, V., and Witchel E., (2013), Airavat: Security and privacy for [14] OASIS Key Management Interoperability Protocol (KMIP)TC, /tchome. php?wg_abbrev=kmip, accessed during January Saaty, T. L., (1980), Decision Making for Leaders: The Analytic Hierarchy Process for Decisions in a Complex World. 44. Saaty, T. L., and Vargas, L. G., (1991), Prediction, Projection and Forecasting. Kluwer Academic, Boston. 45. Saaty, T. L., and Vargas, L. G., (1996), Decision Making with the Analytic Network Process. Springer, USA. 46. Sadi, M. A. and Henderson, J. C., (2011), Franchising and small medium-sized enterprises (SMEs) in industrializing economies: A Saudi Arabian perspective. Journal of Management Development, 30(4), pp Sania Khan, Abdul Razak, H., and Krishna Kumar, V., (2011), Prioritization of Green IT Parameters for Indian IT Industry: Using Analytical Hierarchy Process. World Journal of Social Sciences, 1(4), pp Saudi Gazette, IT-powered SMEs to create jobs in KSA.Saudi Gazette. (Retrieved January 3, 2012), method= home.regcon andcontentid= , accessed during January Schubert, L., Jeffery, K., and Neidecker-Lutz, B., January, (2010), The Future for Cloud Computing: Opportunities for European Cloud Computing Beyond. Expert Group report, public version Sharma, M. J., Moon, I., and Bae, H.,(2008), Analytic hierarchy process to assess and optimize distribution network. Applied Mathematics and Computation, 202, pp

14 51. Sharma, S. And Mittal, U., (2013), Comparative Analysis of Various Authentication Techniques in Cloud Computing. International Journal of Innovative Research in Science, Engineering and Technology, 2(4), pp Singh, S. and Jangwal, T., (2012), Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues. International Journal of Computer Science and Information Technology, 4(2), pp Wang, J. J., and Yang, D. L., (2007), Using a hybrid multi-criteria decision aid method for information systems outsourcing. Computers and Operation Research, 34(12), pp Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D., (2012), Efficient Password-based Two Factors Authentication in Cloud Computing. International Journal of Security and Its Applications, 6(2), pp Yeboah-Boateng, E.O., and Essandoh, K.A., (2014), Factors Influencing Adoption of Cloud Computing by Small and Medium Enterprises in Developing Economies. International Journal of Emerging Science and Engineering, 2(4), pp Yuksel, I., and Dagdeviren, M., (2007), Using the analytic network process (ANP) in a SWOT analysis-a case study for a textile firm. Information Sciences, 177(16), pp Zawya, (2012). Saudi SMEs Opportunity. Saudi_SME_opportunity -ZAWYA /, accessed on February Zissis, D and Lekkas, D., (2012), Addressing cloud computing security issues. Future Generation Computer Systems, 28, pp

MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process

MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process Business Intelligence and Decision Making Professor Jason Chen The analytical hierarchy process (AHP) is a systematic procedure

More information

CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD

CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD Monjur Ahmed 1 and Mohammad Ashraf Hossain 2 1 Senior Lecturer, Daffodil Institute of IT, Dhaka, Bangladesh. 2 Freelance IT Consultant, Dhaka, Bangladesh.

More information

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy

More information

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Vol.8, No.3 (2014), pp.175-180 http://dx.doi.org/10.14257/ijsh.2014.8.3.16 A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Hong-Kyu Kwon 1 and Kwang-Kyu Seo 2* 1 Department

More information

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Y. H. Liang Department of Information Management, I-SHOU

More information

Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains

Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) August 2015, PP 58-62 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Comparative Analysis of

More information

USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO

USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORIZE PROJECTS IN A PORTFOLIO Ricardo Viana Vargas, MSc, IPMA-B, PMP Professor Fundação Getúlio Vargas (FGV) Brasil Professor Fundação Instituto

More information

Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY

Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY This chapter highlights on supply chain performance measurement using one of the renowned modelling technique

More information

CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS

CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS Musa Ahmed Zayyad Department of Computer Studies, Hassan Usman Katsina Polytechnic, Katsina E-mail: zayyad19@yahoo.com +2348063440008(Nigeria)

More information

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD C.S. RAJARAJESWARI, M. ARAMUDHAN Research Scholar, Bharathiyar University,Coimbatore, Tamil Nadu, India. Assoc. Professor, Department of IT, PKIET, Karaikal,

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

How to do AHP analysis in Excel

How to do AHP analysis in Excel How to do AHP analysis in Excel Khwanruthai BUNRUAMKAEW (D) Division of Spatial Information Science Graduate School of Life and Environmental Sciences University of Tsukuba ( March 1 st, 01) The Analytical

More information

QoS based Cloud Service Provider Selection Framework

QoS based Cloud Service Provider Selection Framework Abstract Research Journal of Recent Sciences ISSN 2277-2502 QoS based Cloud Service Provider Selection Framework Kumar N. and Agarwal S. Department of Computer Science, Babasaheb Bhimrao Ambedkar University,

More information

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu

More information

Project Management Software Selection Using Analytic Hierarchy Process Method

Project Management Software Selection Using Analytic Hierarchy Process Method Project Management Software Selection Using Analytic Hierarchy Process Method ISSN - 35-055 Sweety Sen (B.tech: Information Technology) Dronacharya College of Engineering Gurgaon, India Phone no. : 00343

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

A Multi-Criteria Decision-making Model for an IaaS Provider Selection

A Multi-Criteria Decision-making Model for an IaaS Provider Selection A Multi-Criteria Decision-making Model for an IaaS Provider Selection Problem 1 Sangwon Lee, 2 Kwang-Kyu Seo 1, First Author Department of Industrial & Management Engineering, Hanyang University ERICA,

More information

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP Mingzhe Wang School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: mingzhew@gmail.com Yu Liu School

More information

The Analytic Hierarchy Process. Danny Hahn

The Analytic Hierarchy Process. Danny Hahn The Analytic Hierarchy Process Danny Hahn The Analytic Hierarchy Process (AHP) A Decision Support Tool developed in the 1970s by Thomas L. Saaty, an American mathematician, currently University Chair,

More information

An Analysis of Data Security Threats and Solutions in Cloud Computing Environment

An Analysis of Data Security Threats and Solutions in Cloud Computing Environment An Analysis of Data Security Threats and Solutions in Cloud Computing Environment Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information Technology Ropar,

More information

Decision making in ITSM processes risk assessment

Decision making in ITSM processes risk assessment Decision making in ITSM processes risk assessment V Grekul*, N Korovkina, K Korneva National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia * Corresponding

More information

TOURIST HOTEL LOCATION SELECTION WITH ANALYTIC HIERARCHY PROCESS *

TOURIST HOTEL LOCATION SELECTION WITH ANALYTIC HIERARCHY PROCESS * TOURIST HOTEL LOCATION SELECTION WITH ANALYTIC HIERARCHY PROCESS * Nilsen KUNDAKÇI ESRA AYTAÇ ADALI AYŞEGÜL TUŞ IŞIK ABSTRACT Selection of tourist hotel location is a multi-criteria decision making (MCDM)

More information

Vendor Evaluation and Rating Using Analytical Hierarchy Process

Vendor Evaluation and Rating Using Analytical Hierarchy Process Vendor Evaluation and Rating Using Analytical Hierarchy Process Kurian John, Vinod Yeldho Baby, Georgekutty S.Mangalathu Abstract -Vendor evaluation is a system for recording and ranking the performance

More information

Application of the Multi Criteria Decision Making Methods for Project Selection

Application of the Multi Criteria Decision Making Methods for Project Selection Universal Journal of Management 3(1): 15-20, 2015 DOI: 10.13189/ujm.2015.030103 http://www.hrpub.org Application of the Multi Criteria Decision Making Methods for Project Selection Prapawan Pangsri Faculty

More information

Measuring System Performance & User Satisfaction after Implementation of ERP

Measuring System Performance & User Satisfaction after Implementation of ERP Proceedings of Informing Science & IT Education Conference (InSITE) 2012 Measuring System Performance & User Satisfaction after Implementation of ERP Imran Batada Institute of Business Administration,

More information

INVOLVING STAKEHOLDERS IN THE SELECTION OF A PROJECT AND PORTFOLIO MANAGEMENT TOOL

INVOLVING STAKEHOLDERS IN THE SELECTION OF A PROJECT AND PORTFOLIO MANAGEMENT TOOL INVOLVING STAKEHOLDERS IN THE SELECTION OF A PROJECT AND PORTFOLIO MANAGEMENT TOOL Vassilis C. Gerogiannis Department of Project Management, Technological Research Center of Thessaly, Technological Education

More information

K.Niha, Dr. W.Aisha Banu, Ruby Anette

K.Niha, Dr. W.Aisha Banu, Ruby Anette International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 41 A Cloud Service Providers Ranking System Using Ontology K.Niha, Dr. W.Aisha Banu, Ruby Anette Abstract Cloud

More information

Design of Customer-Oriented Cloud Products

Design of Customer-Oriented Cloud Products Design of Customer-Oriented Cloud Products Gülfem Isiklar Alptekin, S. Emre Alptekin Abstract Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises

More information

Corporate Social Responsibility Program Toward Sustainability Crude Palm Oil Industry Using Analytic Hierarchy Process

Corporate Social Responsibility Program Toward Sustainability Crude Palm Oil Industry Using Analytic Hierarchy Process Corporate Social Responsibility Program Toward Sustainability Crude Palm Oil Industry Using Analytic Hierarchy Process Fuad Halimoen 1, Alvi Syahrin 2, Herman Mawengkang 3 1 Graduate School of Management,

More information

CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES

CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES 49 CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES 3.1 INTRODUCTION Key Performance Indicators (KPIs) is means for assessment of an organisations current position

More information

ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL

ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL Kardi Teknomo ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL Revoledu.com Table of Contents Analytic Hierarchy Process (AHP) Tutorial... 1 Multi Criteria Decision Making... 1 Cross Tabulation... 2 Evaluation

More information

European Scientific Journal October 2015 edition vol.11, No.28 ISSN: 1857 7881 (Print) e - ISSN 1857-7431

European Scientific Journal October 2015 edition vol.11, No.28 ISSN: 1857 7881 (Print) e - ISSN 1857-7431 MICRO-FACTORS INFLUENCING SITE SELECTION FOR SMALL AND MEDIUM ENTERPRISES (SMES) IN SAUDI ARABIA: AL- HASSA AREA USING ANALYTICAL HIERARCHY PROCESS (AHP) ANALYSIS Hussain, Al-Salamin. MBA King Faisal University,

More information

Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process

Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process Chun Yong Chong, Sai Peck Lee, Teck Chaw Ling Faculty of Computer Science and Information Technology, University

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):593-598 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on supply chain risk evaluation based on

More information

Secured Storage of Outsourced Data in Cloud Computing

Secured Storage of Outsourced Data in Cloud Computing Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated

More information

Using Analytic Hierarchy Process Method in ERP system selection process

Using Analytic Hierarchy Process Method in ERP system selection process Using Analytic Hierarchy Process Method in ERP system selection process Rima Tamošiūnienė 1, Anna Marcinkevič 2 Abstract. IT and business alignment has become of the strategic importance and the enterprise

More information

Textile and Clothing Supply Chain Management: Use of Planning-Link in the Strategic Planning Process

Textile and Clothing Supply Chain Management: Use of Planning-Link in the Strategic Planning Process X Congreso Galego de Estatística e Investigación de Operacións Pontevedra, 3 4 5 de novembro de 2011 Textile and Clothing Supply Chain Management: Use of Planning-Link in the Strategic Planning Process

More information

Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks

Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks Adopting an Analytic Hierarchy Process to Select Internet Advertising Networks Chin-Tasi Lin 1), Pi-Fang Hsu 2) 1) Yuanpei Institute of Science and Technology, Department of Information Management, Taiwan

More information

Project Management Software Selection Using Analytic Hierarchy Process Method

Project Management Software Selection Using Analytic Hierarchy Process Method International Journal of Applied Science and Technology Vol. 4, No. ; November 04 Project Management Software Selection Using Analytic Hierarchy Process Method Birgul Kutlu Professor Bogazici University

More information

6 Analytic Hierarchy Process (AHP)

6 Analytic Hierarchy Process (AHP) 6 Analytic Hierarchy Process (AHP) 6.1 Introduction to Analytic Hierarchy Process The AHP (Analytic Hierarchy Process) was developed by Thomas L. Saaty (1980) and is the well-known and useful method to

More information

CLOUD COMPUTING ARCHITECTURE FOR HIGHER EDUCATION IN THE THIRD WORLD COUNTRIES (REPUBLIC OF THE SUDAN AS MODEL)

CLOUD COMPUTING ARCHITECTURE FOR HIGHER EDUCATION IN THE THIRD WORLD COUNTRIES (REPUBLIC OF THE SUDAN AS MODEL) CLOUD COMPUTING ARCHITECTURE FOR HIGHER EDUCATION IN THE THIRD WORLD COUNTRIES (REPUBLIC OF THE SUDAN AS MODEL) Mohmed Sirelkhtem Adrees 1, Majzoob Kamal Aldein Omer 2 and Osama E. Sheta 3 1 Department

More information

Subcontractor Selection Using Analytic Hierarchy Process

Subcontractor Selection Using Analytic Hierarchy Process Volume 3 Number 3 2012 pp. 121-143 ISSN: 1309-2448 www.berjournal.com Subcontractor Selection Using Analytic Hierarchy Process Vesile Sinem Arıkan Kargı a Ahmet Öztürk b Abstract: Turkish textile firms

More information

DATA PORTABILITY AMONG PROVIDERS OF PLATFORM AS A SERVICE. Darko ANDROCEC

DATA PORTABILITY AMONG PROVIDERS OF PLATFORM AS A SERVICE. Darko ANDROCEC RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2013 Special Number DATA PORTABILITY AMONG PROVIDERS OF PLATFORM AS A SERVICE Darko ANDROCEC

More information

Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing

Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing Setting deadlines and priorities to the tasks to improve energy efficiency in cloud computing Problem description Cloud computing is a technology used more and more every day, requiring an important amount

More information

OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia

OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia OPERATIONAL RISK EFFECT ON INSURANCE MARKET S ACTIVITY Darja Stepchenko, Irina Voronova, Gaida Pettere Riga Technical University, Latvia Abstract. The main aim of Solvency II framework is to establish

More information

In Sync: Cloud Computing Solution and SME Industry IT Requirement

In Sync: Cloud Computing Solution and SME Industry IT Requirement In Sync: Cloud Computing Solution and SME Industry IT Requirement Harinder Kaur Assistant Professor, University College of Engineering, Punjabi University, Patiala - 147001 Abstract Cloud Computing is

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

Preface Introduction

Preface Introduction Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

A Secure Model for Cloud Computing Based Storage and Retrieval

A Secure Model for Cloud Computing Based Storage and Retrieval IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

Content-Based Discovery of Twitter Influencers

Content-Based Discovery of Twitter Influencers Content-Based Discovery of Twitter Influencers Chiara Francalanci, Irma Metra Department of Electronics, Information and Bioengineering Polytechnic of Milan, Italy irma.metra@mail.polimi.it chiara.francalanci@polimi.it

More information

International Journal of Computer Sciences and Engineering Open Access. Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm

International Journal of Computer Sciences and Engineering Open Access. Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm Garima Malik

More information

Evaluating Simulation Software Alternatives through ANP

Evaluating Simulation Software Alternatives through ANP Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 Evaluating Simulation Software Alternatives through ANP

More information

Vinay Parisa 1, Biswajit Mohapatra 2 ;

Vinay Parisa 1, Biswajit Mohapatra 2 ; Predictive Analytics for Enterprise Modernization Vinay Parisa 1, Biswajit Mohapatra 2 ; IBM Global Business Services, IBM India Pvt Ltd 1, IBM Global Business Services, IBM India Pvt Ltd 2 vinay.parisa@in.ibm.com

More information

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Supriya M, Venkataramana L.J, K Sangeeta Department of Computer Science and Engineering, Amrita School of Engineering Kasavanahalli,

More information

Design of Analytic Hierarchy Process Algorithm and Its Application for Vertical Handover in Cellular Communication

Design of Analytic Hierarchy Process Algorithm and Its Application for Vertical Handover in Cellular Communication Design of Analytic Hierarchy Process Algorithm and Its Application for Vertical Handover in Cellular Communication Under the Guidance of Asso. Prof. Mr. Saurav Dhar Deptt. of Electronics and Communication

More information

ENHANCEMENT OF FINANCIAL RISK MANAGEMENT WITH THE AID OF ANALYTIC HIERARCHY PROCESS

ENHANCEMENT OF FINANCIAL RISK MANAGEMENT WITH THE AID OF ANALYTIC HIERARCHY PROCESS ISAHP 2005, Honolulu, Hawaii, July 8-10, 2003 ENHANCEMENT OF FINANCIAL RISK MANAGEMENT WITH THE AID OF ANALYTIC HIERARCHY PROCESS Jerzy Michnik a,b, 1, Mei-Chen Lo c a Kainan University, No.1, Kainan Rd.,

More information

Maintainability Estimation of Component Based Software Development Using Fuzzy AHP

Maintainability Estimation of Component Based Software Development Using Fuzzy AHP International journal of Emerging Trends in Science and Technology Maintainability Estimation of Component Based Software Development Using Fuzzy AHP Author Sengar Dipti School of Computing Science, Galgotias

More information

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University. Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous

More information

Environments, Services and Network Management for Green Clouds

Environments, Services and Network Management for Green Clouds Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

Cisco Cloud Enablement Services for Adopting Clouds

Cisco Cloud Enablement Services for Adopting Clouds Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud

More information

Prize: an R package for prioritization estimation based on analytic hierarchy process

Prize: an R package for prioritization estimation based on analytic hierarchy process Prize: an R package for prioritization estimation based on analytic hierarchy process Daryanaz Dargahi October 14, 2015 daryanazdargahi@gmail.com Contents 1 Licensing 2 2 Overview 2 3 Relative AHP 3 3.1

More information

Multi-Criteria Decision-Making Using the Analytic Hierarchy Process for Wicked Risk Problems

Multi-Criteria Decision-Making Using the Analytic Hierarchy Process for Wicked Risk Problems Multi-Criteria Decision-Making Using the Analytic Hierarchy Process for Wicked Risk Problems Introduction It has become more and more difficult to see the world around us in a uni-dimensional way and to

More information

Analytic hierarchy process (AHP)

Analytic hierarchy process (AHP) Table of Contents The Analytic Hierarchy Process (AHP)...1/6 1 Introduction...1/6 2 Methodology...1/6 3 Process...1/6 4 Review...2/6 4.1 Evaluation of results...2/6 4.2 Experiences...3/6 4.3 Combinations...3/6

More information

Živan Živković, Djordje Nikolić, Predrag Djordjević, Ivan Mihajlović, Marija Savić

Živan Živković, Djordje Nikolić, Predrag Djordjević, Ivan Mihajlović, Marija Savić Acta Polytechnica Hungarica Vol. 12, No. 7, 2015 Analytical Network Process in the Framework of SWOT Analysis for Strategic Decision Making (Case Study: Technical Faculty in Bor, University of Belgrade,

More information

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course , pp.291-298 http://dx.doi.org/10.14257/ijmue.2015.10.9.30 The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course Xiaoyu Chen 1 and Lifang Qiao

More information

Analytical hierarchy process for evaluation of general purpose lifters in the date palm service industry

Analytical hierarchy process for evaluation of general purpose lifters in the date palm service industry Journal of Agricultural Technology 2011 Vol. 7(4): 923-930 Available online http://www.ijat-aatsea.com ISSN 1686-9141 Analytical hierarchy process for evaluation of general purpose lifters in the date

More information

Introduction. Rising demand

Introduction. Rising demand When assessing requirements for datacenter consolidation and virtualization, a combination of performance, capacity and technology options will need to be taken into consideration, and each has a host

More information

A REVIEW AND CRITIQUE OF HYBRID MADM METHODS APPLICATION IN REAL BUSINESS

A REVIEW AND CRITIQUE OF HYBRID MADM METHODS APPLICATION IN REAL BUSINESS Application in Real Business, 2014, Washington D.C., U.S.A. A REVIEW AND CRITIQUE OF HYBRID MADM METHODS APPLICATION IN REAL BUSINESS Jiri Franek Faculty of Economics VSB-Technical University of Ostrava

More information

A new Environmental Performance Index using analytic hierarchy process: A case of ASEAN countries

A new Environmental Performance Index using analytic hierarchy process: A case of ASEAN countries Article A new Environmental Performance Index using analytic hierarchy process: A case of ASEAN countries Wan Khadijah Wan Ismail, Lazim Abdullah Department of Mathematics, Faculty of Science and Technology,

More information

Securing Data in the Cloud

Securing Data in the Cloud Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

IBM Enterprise Content Management Product Strategy

IBM Enterprise Content Management Product Strategy White Paper July 2007 IBM Information Management software IBM Enterprise Content Management Product Strategy 2 IBM Innovation Enterprise Content Management (ECM) IBM Investment in ECM IBM ECM Vision Contents

More information

Using Analytic Hierarchy Process (AHP) Method to Prioritise Human Resources in Substitution Problem

Using Analytic Hierarchy Process (AHP) Method to Prioritise Human Resources in Substitution Problem Using Analytic Hierarchy Process (AHP) Method to Raymond Ho-Leung TSOI Software Quality Institute Griffith University *Email:hltsoi@hotmail.com Abstract In general, software project development is often

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

Cloud computing insights from 110 implementation projects

Cloud computing insights from 110 implementation projects IBM Academy of Technology Thought Leadership White Paper October 2010 Cloud computing insights from 110 implementation projects IBM Academy of Technology Survey 2 Cloud computing insights from 110 implementation

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

Corresponding Author email: s.esfandi.7@gmail.com

Corresponding Author email: s.esfandi.7@gmail.com International Research Journal of Applied and Basic Sciences 2015 Available online at www.irjabs.com ISSN 2251-838X / Vol, 9 (4): 542-546 Science Explorer Publications Review and Prioritization of the

More information

A Comparison Study of Information Security Risk Management Frameworks in Cloud Computing

A Comparison Study of Information Security Risk Management Frameworks in Cloud Computing A Comparison Study of Information Security Risk Management Frameworks in Cloud Computing Mohammed Alnuem Information Systems Department King Saud University Riyadh, Saudi Arabia Email: malnuem@ksu.edu.sa

More information

Analytical Hierarchy Process for Higher Effectiveness of Buyer Decision Process

Analytical Hierarchy Process for Higher Effectiveness of Buyer Decision Process P a g e 2 Vol. 10 Issue 2 (Ver 1.0), April 2010 Global Journal of Management and Business Research Analytical Hierarchy Process for Higher Effectiveness of Buyer Decision Process Razia Sultana Sumi 1 Golam

More information

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi Proceedings of the 10 th International Conference on Manufacturing Research ICMR 2012 ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING Mehran G.

More information

Federation of Cloud Computing Infrastructure

Federation of Cloud Computing Infrastructure IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.

More information

SMICloud: A Framework for Comparing and Ranking Cloud Services

SMICloud: A Framework for Comparing and Ranking Cloud Services 2011 Fourth IEEE International Conference on Utility and Cloud Computing SMICloud: A Framework for Comparing and Ranking Cloud Services Saurabh Kumar Garg, Steve Versteeg and Rajkumar Buyya Cloud Computing

More information

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Nina Begičević University of Zagreb, Faculty of Organization and Informatics, Pavlinska 2, Varaždin nina.begicevic@foi.hr

More information

Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia

Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia 2014 IEEE 6th International Conference on Cloud Computing Technology and Science Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia Nouf Alkhater Gary Wills Robert

More information

An Evaluation of Strategic Networking Equipments Using. AHP(Analytic Hierarchy Process)

An Evaluation of Strategic Networking Equipments Using. AHP(Analytic Hierarchy Process) An Evaluation of Strategic Networking Equipments Using AHP(Analytic Hierarchy Process) DaeKyeong Nam, Juseong Kim bnco@etri.re.kr, juskim@etri.re.kr Abstract We analyze the evaluation of strategic networking

More information

Evaluation Tools for Adoption of Cloud Hosting Services 01\

Evaluation Tools for Adoption of Cloud Hosting Services 01\ Evaluation Tools for Adoption of Cloud Hosting Services 01\ Evaluation Tools for Adoption of Cloud Hosting Services Take Home Message July 2013 Knowledge Impact Strategies found no existing full-service

More information

Analytic Hierarchy Process for Design Selection of Laminated Bamboo Chair

Analytic Hierarchy Process for Design Selection of Laminated Bamboo Chair Analytic Hierarchy Process for Design Selection of Laminated Bamboo Chair V. Laemlaksakul, S. Bangsarantrip Abstract This paper demonstrates the laminated bamboo chair design selection, the applicability

More information

Intuitionistic fuzzy load balancing in cloud computing

Intuitionistic fuzzy load balancing in cloud computing 8 th Int. Workshop on IFSs, Banská Bystrica, 9 Oct. 2012 Notes on Intuitionistic Fuzzy Sets Vol. 18, 2012, No. 4, 19 25 Intuitionistic fuzzy load balancing in cloud computing Marin Marinov European Polytechnical

More information

Emerging Technology for the Next Decade

Emerging Technology for the Next Decade Emerging Technology for the Next Decade Cloud Computing Keynote Presented by Charles Liang, President & CEO Super Micro Computer, Inc. What is Cloud Computing? Cloud computing is Internet-based computing,

More information

Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis

Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Keyun Ruan, Ibrahim Baggili (PhD), Prof Joe Carthy, Prof Tahar Kechadi University College Dublin, Zayed

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

THE ANALYTIC HIERARCHY PROCESS (AHP)

THE ANALYTIC HIERARCHY PROCESS (AHP) THE ANALYTIC HIERARCHY PROCESS (AHP) INTRODUCTION The Analytic Hierarchy Process (AHP) is due to Saaty (1980) and is often referred to, eponymously, as the Saaty method. It is popular and widely used,

More information