Verified Document

Cloud Computing Despite Enterprises Being Research Proposal

RESEARCH QUESTION: Can private Cloud Computing architectures securely supporting integration to external databases, data marts and external systems located within logistics, supply chain and distributor businesses using the RBAC Model be more profitable based on integration to these external sources of information?

Hypotheses

Null Hypothesis: Companies relying on the Role-Based Access Control (RBAC) Model alone, as a single variable, are not more profitable than those relying on more traditional approaches to defining integration including EDI and FTP integration.

Alternative Hypothesis: The financial performance of firms that use the Role-Based Access Control (RBAC) Model for managing secured access to data throughout their supply chains is enhanced and statistically significant relative to those who do not adopt.

The dependent variable is the level of adoption of the Role-Based Access Control (RBAC) Model throughout logistics and supply- chain-based business. The independent variables are the financial results...

An analysis of the roles of those most dependent on integration through the public and hybrid cloud configurations is expected to show the greatest contribution to positive return on this investment.
References

Bertino, E & Sandhu, R. (2005). Database Security-Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19.

Brynjolfsson, E., Hofmann, P., & Jordan, J.. (2010). Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model. Association for Computing Machinery. Communications of the ACM, 53(5), 32.

Hopp, W., Iravani, M., & Xu, W. (2010). Vertical Flexibility in Supply Chains.

Management Science, 56(3), 495-502.

Sources used in this document:
References

Bertino, E & Sandhu, R. (2005). Database Security-Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19.

Brynjolfsson, E., Hofmann, P., & Jordan, J.. (2010). Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model. Association for Computing Machinery. Communications of the ACM, 53(5), 32.

Hopp, W., Iravani, M., & Xu, W. (2010). Vertical Flexibility in Supply Chains.

Management Science, 56(3), 495-502.
Cite this Document:
Copy Bibliography Citation

Related Documents

Solutions to Top Five Challenges to Cloud Computing for Enterprises...
Words: 3196 Length: 10 Document Type: Research Paper

deployment of cloud computing, which is a revolutionary technology for hosting and delivering services over the Internet, is characterized with some major challenges and concerns for enterprises. A brief overview of the top five challenges for the enterprise in cloud computing is discussed in the article. This is followed by a detailed discussion of the available solutions to these challenges including improved security controls, finding a suitable cloud provider,

Cloud Computing Assessing the Risks of Cloud
Words: 1163 Length: 4 Document Type: Essay

Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism

Cloud Computing and the Insider
Words: 1595 Length: 5 Document Type: Literature Review

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

Cloud Computing and Business
Words: 1606 Length: 5 Document Type: Term Paper

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

Cloud Computing and Computing
Words: 7745 Length: 25 Document Type: Thesis

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.

Cloud Computing and Insider Threats
Words: 1411 Length: 5 Document Type: Introduction

adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now