Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method
- PDF / 766,547 Bytes
- 14 Pages / 595.276 x 790.866 pts Page_size
- 14 Downloads / 216 Views
Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method Wafa Bouaynaya 1
# Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract Cloud computing already raises numerous security questions related to outsourced data confidentiality. Several companies are starting to require the reversibility of their cloud computing. They want to redirect their information systems to another provider or backsourcing their activities. Cloud computing reversibility is considered to be one of the first obstacles to service development; however, few researches have been conducted on this field. We propose characterizing the reversibility of cloud computing using a deductive approach. We suggest ten research hypotheses that identify the guarantees, objectives and process of reversibility. This research is based on a three-lap Delphi method, supported by 18 experts working on cloud computing projects. This article contributes to characterizing cloud computing reversibility and parametric theorization through a new coefficient of concordance proposal. This indicator helps to assess the experts’ agreement to or rejection of a hypothesis. Keywords Cloud computing . Reversibility . Delphi method . Concordance coefficient
1 Introduction Since the launch of Amazon’s first PaaS service in 2006, cloud computing has gained steady ground. Much cheaper and more adapted to the needs of SMEs, cloud computing provides considerable contribution compared to the ASP, Application Software Provider, traditional computer application outsourcing. It remains, however, an IT outsourcing process for firms (Martens and Teuteberg 2012; Mazhelis and Tyrväinen 2012). Gurbaxani (2007) defines IT outsourcing as “a long-term contractual arrangement in which one or more service providers are assigned the responsibility of managing all or part of a client’s information systems (IS) infrastructure and operations”. The decision to outsource IT services has a positive impact on firm-level performance (Chang and Gurbaxani 2012). Firms can gain productivity by moving production processes for services in which they are relatively inefficient to a third part provider. Cloud computing was also originally designed to address a security issue by reducing the number of servers * Wafa Bouaynaya [email protected] 1
Graduate School of Management and CRIISEA research center, University of Picardy, Amiens, France
and network infrastructures in the enterprise (Mazhelis and Tyrväinen 2012; Jones et al. 2017); however, it has become an uncertainty for many businesses once security issues are addressed. It already raises numerous security questions related to outsourced data confidentiality. In addition, the lack of maturity of several proposed offers has companies concerned. In fact, the cloud computing market is a relatively young and rapidly evolving one (Shivakumar and Raju 2010). Several start-ups end up disappearing after a few years or even a few months, endangering their customers’ activity. Therefore, the client compa
Data Loading...