How Businesses Can Use Cloud Computing Technology Term Paper

¶ … organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently. Common Types of Customer Data

Data Identity:

The individual is at the core of any database, so gaining an insight into how a person is, and having the ability to maintain a homogenous point-of-view for customers is the first step in the identification of data. This should embrace all the information that can make it possible for a person to be specially identified (Roberts, 2013)

Such information should include:

Personal information -- Date/place of birth, gender etc.

Postal Address -- Address line, street, name of building, number of building etc.

Identity -- Title, first name (Surname), forename, designation, letters etc.

Contact -- Work telephone number, home number, mobile number, email addresses both official and personal

Information about social platforms -- LinkedIn, Facebook, Instagram, Pinterest, Twitter and so on.

Job information -- Job description, company name, department etc.

Suppression and permission data- this is not distinctly an element of identity data but it is equally crucial in determining reasons for not communicating or suppression and permission to use the information.

Account information -- IDs, user IDs, and other details of you client accounts

Quantitative Data:

The next important element once it is clearly understood who the individual is, to try to understand how the client behaves, reacts or transacts with the firm. This is to facilitate acquisition of operational data that is measurable. Any activities completed or transacted between the business and the customer should be integral to this information (Roberts, 2013):

Communication information -- outbound and inbound: These should include channels of communication, dates, click throughs, opens and so on.

Online activities: products viewed, online registrations, and websites visited etc.

Transaction information (offline and online) Number of products viewed, actual products purchased, order renewal dates, abandoned baskets or products never actually purchased, products returned and subscription or order value etc.

Social Network Activity -- Tweets on Twitter, Facebook likes, etc.

Customer Services Information -- Customer query details and complaint details etc.

Descriptive Data:

A good market database starts with understanding the type of activities that the customers complete and getting to understand clientele personalities (Roberts, 2013).

It is equally important to gain a comprehensive insight of any additional profile information that the customer might have. This should furnish the firm with further information about the client beyond the quantitative and identity details including but not limited to:

Lifestyle details- type and number of cars, the kind of property they own, pets, and hobbies etc.

Career information: educational standards, professional ambitions, and current designation.

Family information: number of children, marital status, the age of children etc.

Qualitative Data:

The final type of data that one is likely to encounter pertains to the potential behavior of the customer, and further descriptions of the client. This is often generated in form of a questionnaire that details facts such as their opinion and motivations (Roberts, 2013):

Motivational insights answers questions such as why the product was purchased, that is for personal use or as a gift for another person, and the main reason why the product was purchased, that is in terms of locality, quality and price.

Opinion regarding their favorite holiday destinations, the restaurants they frequent and their preferred holiday destinations.

Information about attitude such as how they rate the product's value, their view of the customer service and how likely they are to make a repeat purchase.

Cloud Computing Technology

By simple definition, cloud computing simply refers to retention and protection of data in cyberspace. It can also be called internet computing because the internet is sometimes called the cloud. This is the origin of the term -- cloud computing -- because it entails computing that takes place over the internet. It is a very convenient form of using computers because it enables internet users frees access to their data regardless of their location, when they need it and how they want it without worrying about storage devices or management and maintenance of any external resources. More important is the fact that databases retained in the cloud are highly scalable and dynamic. It is a form of computing that is much more advanced than automatic computing, utility computing or grid computing (Kumari et.al).

In terms...

...

The best examples of cloud computing include Google applications such as Google Drive, Sky Drive in Outlook, Dropbox and many others. These applications can be easily accessed using any type of browser once they are installed on a computer. They can also be accessed by thousands of computers on the internet as long as one has the relevant password and username.
Cloud computing makes it possible to gain access to common internet traffic and shared resources such as Google Docs. It enables services to be dispensed on demand over any chosen network so that operations meeting the ever-evolving communication and business needs can be made possible (Kumari et.al). What makes this form of computing unique is the fact that the physical or actual location of the devices and resources being accessed is always unknown to the end user. It also avails a convenient platform on which users can manage and deploy their resources and data, or develop their databases on the cloud. This technology incorporates visualization of resources capable of managing and maintaining themselves on the cloud.

How Organizations Can Protect Customer Data Using Cloud Technology

Consumers' sensitive personal data may be exposed to remarkable security and privacy risks as a result of the ubiquitous nature of cloud computing. Earning the client's ultimate trust by guaranteeing maximum security and assured privacy for sensitive client data is a crucial challenge cloud computing industry is presently facing (King & Raja, 2012). Also facing challenges in regulating consumer data security and privacy are government agencies tasked with enforcing data protection laws, which were promulgated with only national borders in mind. In order to make sure that computer networks are secure, health care providers, for instance, need to follow best industry practices. Some of the most important elements of this move are password protection, antivirus protection; strong security protocols and firewalls because innovations are progressing towards building national and international infrastructure for electronic health information. In many instances, healthcare professionals have been known to undermine protection of passwords by letting them remain signed on multiple computers or in their usernames when the devices are not within their control (Taitsman et.al, 2013).

The small conveniences made possible by this practice come at the expense of personal data that is faced with risks of breaching. However, this problem can be addressed through employee training and automatic or timed logouts. In the same vein, professionals should adhere to following secure procedures when using either personal computers or portable electronic devices, and attention paid to data security must not end at the doors of the clinic. Instructive educational materials providing best practices to promote data security and privacy have been created through the collaboration of Office of the Inspector General (OIG) and Centers for Medicare and Medicaid Services (CMS) for healthcare providers (Taitsman et.al, 2013). In order to prevent security breaches and safeguard patient information, it is vital that healthcare professionals and the patients themselves collaborate. Both providers and the patients deserve more than normal guarantees. For example, in the event a phone call is answered by a healthcare professional, for an incoming call from a remote place like London (for instance), the inquiry is properly handled and the health data and the patient's privacy is adequately protected.

Many industries that are now based on Information Technology (IT) and the internet from all over the world are moving towards being players in the cloud computing market. Of note are agencies or companies that specifically provide products based on cloud technology such as Salesforce, Apple and the more traditional software corporations like Microsoft. This does not leave out companies that principally offer IT and hardware services like HP and IBM (Berry & Reisman, 2012).

Lastly, there are also major players in the cloud computing market like Amazon and Google that are internet-based companies and mainly offer cloud computing services beside a variety of other functions such as ecommerce. Among the providers of cloud services that are presently active, Software as a Service (SaaS) market is by far the largest. SaaS is closely followed by Infrastructure as a Service (IaaS), which comes a distant second. The smallest of these players is Platform as a Service (PaaS). The major providers of SaaS include NetSuite, Oracle, Google and Salesforce.com. While in IaaS the major players are Amazon Web Services (AWS) Verizon and Rockspace. Companies that dominate PaaS are Salesforce.com, Google's App Engine, and Microsoft's Windows Azure. One can deduce from the list above that majority of the companies that provide cloud computing services are U.S.- based. Firms from other technologically advanced countries are also keen to get their fair share of this market. The most aggressive of these new entrants is a German-based software company…

Sources Used in Documents:

References

Angeles, S. (2013, May 1). Business News Daily: Small Business Solutions & Inspiration. Cloud Computing - A Small Business Guide - BusinessNewsDaily. Retrieved May 27, 2015, from http://www.businessnewsdaily.com/4427-cloud-computing-small-business.html

Berry, R., & Reisman, M. (2012). Policy Challenges of Cross-Border Cloud Computing. Journal of International Commerce and Economics, .Retrieved, from http://www.usitc.gov/journals/policy_challenges_of_cross-border_cloud_computing.pdf

Drew, J. (2012). Technology and CPAs: Visions of the future. Journal of Accountability. Retrieved, from http://www.journalofaccountancy.com/Issues/2012/Jun/20114844.htm

King & Raja. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28 (3), 308-319. Retrieved, from http://www.sciencedirect.com/science/article/pii/S0267364912000556
Kumari, Raov, & Raonk. Cloud Computing: An Overview .Journal of Theoretical and Applied Information Technology. Retrieved, from http://www.jatit.org/volumes/research-papers/Vol9No1/10Vol9No1.pdf
(n.d.). Protect IU | IU Public Safety & Institutional Assurance. Use of Cloud Computing | Protect IU. Retrieved May 27, 2015, from http://protect.iu.edu/cybersecurity/cloud/using-cloud-computing
Roberts, J. (2013, November 12). Digital marketing strategy advice - Smart Insights Digital Marketing. The four key types of customer data for marketing or... how valuable is knowing my customers pet's name? - Smart Insights Digital Marketing Advice. Retrieved May 27, 2015, from http://www.smartinsights.com/customer-relationship-management/customer-privacy/types-customer-data/
Singh, G., & Mishra, S. (2015). Cloud Computing Security and Data Protection: A Review. International Journal of Computers and Technology, 14(7). Retrieved, from http://cirworld.com/journals/index.php/ijct/article/view/4380/4036
Taitsman, J., Grimm, C., & Agrawal, S. (2013). Protecting Patient Privacy and Data Security. The New England Journal of Medicine, 368, 977-979. Retrieved, from http://www.nejm.org/doi/full/10.1056/NEJMp1215258
(n.d.). Welcome to the National Security Agency - NSA/CSS. An Overview of Cloud Computing. Retrieved May 27, 2015, from http://www.nsa.gov/research/_files/publications/cloud_computing_overview.pdf


Cite this Document:

"How Businesses Can Use Cloud Computing Technology" (2015, May 30) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/how-businesses-can-use-cloud-computing-technology-2150868

"How Businesses Can Use Cloud Computing Technology" 30 May 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/how-businesses-can-use-cloud-computing-technology-2150868>

"How Businesses Can Use Cloud Computing Technology", 30 May 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/how-businesses-can-use-cloud-computing-technology-2150868

Related Documents

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Cloud Computing and Organizational Cost Management The contemporary market trends have put a lot of pressure on many businesses to cut down on their spending and unnecessary costs using any reasonable measure. The globalization and the emerging trends in business demand that for any business to stand a chance to grow and expand across borders, it has to both adopt the current technology and do so at a reasonable cost that

Abstract Cloud computing technologies have emerged in the recent past as a new model/paradigm for hosting and delivering computing resources and services through the Internet. This paper discusses cloud computing technologies as a mechanism for improving business operations through offering computing resources/services via the Internet. This discussion includes an overview of cloud computing technologies, its benefits, and recent trends. This is followed by a discussion of speculations regarding the future of

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

Cloud Computing as an Enterprise Application Service Reordering the economics of software, cloud computing is alleviating many of the capital expenses (CAPEX), inflexibility of previous-generation software platforms, and inability of on-premise applications to be customized on an ongoing basis to evolving customer needs. These are the three top factors of many that are driving the adoption of cloud computing technologies in enterprises today. Implicit in the entire series of critical success

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly