scholarly journals The Role of Cloud Computing in the Development of Information Systems for SMEs

2017 ◽  
pp. 1-7 ◽  
Author(s):  
Rompante Cunha Carlos ◽  
Paulo Morais Elisabete ◽  
Sousa João Paulo ◽  
Gomes João Pedro
Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


Author(s):  
Grace Fox

Abstract The recent increase in highly publicised cloud breaches, coupled with issues surrounding transparency and control in the cloud, highlights the importance of understanding and addressing privacy in this context. The extant cloud privacy literature has a tendency to focus on technical solutions to address security and privacy together, but a small emerging body of literature acknowledges the importance of consumers’ privacy perceptions in the context of cloud computing. Given the breadth of cloud applications and the situational nature of privacy, it is imperative to unpack the role of privacy in this complex domain. This chapter leverages the broader privacy literature in the Information Systems field to identify potential measures to enhance consumer privacy in the cloud context and highlights a number of paths for research to further our knowledge of consumer privacy perceptions in the various cloud contexts.


2018 ◽  
pp. 1251-1271
Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


IJOHMN ◽  
2017 ◽  
Vol 3 (3) ◽  
Author(s):  
Dr. A. SUBRAMANIAN

Present status and use for educational purposes, technology is fulfilling an ever increasing role in both the traditional education field, and in other fields which are utilizing technology for educational purposes. Within the educational field we can see technology as a means of removing barriers for students and teachers alike. First, technology can remove financial and geographical barriers through distributed learning. This allows students and teachers to experience educational opportunities that they might have otherwise never been able to encounter. Second, technology is bringing about a new focus on problem and skill based learning. Information databases are being used to assist teachers in the acquisition of new knowledge and provide professional support outside of the traditional professional development seminar. In regards to future action, we should continue to utilize the successful trends in education as a means to fulfil their developmental potential and see increased impacts on our field. In particular, we should continue the use of distance learning as a means of professional development for teachers, by providing more opportunities aimed at improving their job related performance. Distance learning for students should also be an area of focus by providing software that allows for increasing authenticity in simulations, multimedia content, and social connections. We should continue to focus on technology that allows students to interact with other students and environments located outside of their current environment, locality, and culture. Information systems are also in need of continual investment. Information systems perform two important roles for the educational system: Focus on this paper, technology has already served an important role in education in multiple fields. Specifically, technology has been of great use to the educational field in terms of its focus on improving the effectiveness and efficiency of the educational experiences of both students and teachers. Continued use and development of technology can serve to further benefit the educational field and recommendations based on the development of existing trends in education should be pursued for great gains in educational achievement..


Author(s):  
Wai-Tat Fu ◽  
Jessie Chin ◽  
Q. Vera Liao

Cognitive science is a science of intelligent systems. This chapter proposes that cognitive science can provide useful perspectives for research on technology-mediated human-information interaction (HII) when HII is cast as emergent behaviour of a coupled intelligent system. It starts with a review of a few foundational concepts related to cognitive computations and how they can be applied to understand the nature of HII. It discusses several important properties of a coupled cognitive system and their implication to designs of information systems. Finally, it covers how levels of abstraction have been useful for cognitive science, and how these levels can inform design of intelligent information systems that are more compatible with human cognitive computations.


2015 ◽  
Vol 21 (4) ◽  
pp. 771-790 ◽  
Author(s):  
Luay Anaya ◽  
Mohammed Dulaimi ◽  
Sherief Abdallah

Purpose – The purpose of this paper is to articulate clear understanding about the role of enterprise information systems (EIS) in developing innovative business practices. Particularly, it aims to explore the different ways that make EIS enables innovation development. Design/methodology/approach – The study adopted exploratory case study, based on qualitative approach. Investigations included two case studies each involved interviewing a number of senior information technology staff, working at these cases. Findings – The paper provides empirical insights about the EIS role in enabling innovation. The analysis of the case studies revealed that integrating an EIS with other system(s) or with digital devices can provide new practices that could not be easily available without these technologies. The study also found that applying data analytics tools into data accumulated from EIS, to extract new insights, lead to innovative practices. Practical implications – The study provides a set of recommendations for organizations interested to maximize the benefits from their investments in EIS. Originality/value – The paper provides evidences from cases in United Arab Emirates for the EIS role in enabling business innovation.


Sign in / Sign up

Export Citation Format

Share Document