Studyspark Study Document

Cloud Computing Despite Enterprises Being Research Proposal

Pages:2 (633 words)

Sources:2

Subject:Technology

Topic:Cloud Computing

Document Type:Research Proposal

Document:#18871517




RESEARCH QUESTION: Can private Cloud Computing architectures securely supporting integration to external databases, data marts and external systems located within logistics, supply chain and distributor businesses using the RBAC Model be more profitable based on integration to these external sources of information?

Hypotheses

Null Hypothesis: Companies relying on the Role-Based Access Control (RBAC) Model alone, as a single variable, are not more profitable than those relying on more traditional approaches to defining integration including EDI and FTP integration.

Alternative Hypothesis: The financial performance of firms that use the Role-Based Access Control (RBAC) Model for managing secured access to data throughout their supply chains is enhanced and statistically significant relative to those who do not adopt.

The dependent variable is the level of adoption of the Role-Based Access Control (RBAC) Model throughout logistics and supply- chain-based business. The independent variables are the financial results of having greater integration with suppliers using the Role-Based Access Control (RBAC) Model.

The intent of this research is to determine if secured, role-based communication over public and hybrid cloud platforms can make a financial contribution to firms who choose to implement this strategy. An analysis of the roles of those most dependent on integration through the public and hybrid cloud configurations is expected to show the greatest contribution to positive return on this investment.

References

Bertino, E & Sandhu, R. (2005). Database Security-Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19.

Brynjolfsson, E., Hofmann, P., & Jordan, J.. (2010). Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model. Association for Computing Machinery. Communications of the ACM, 53(5), 32.

Hopp, W., Iravani, M., & Xu, W. (2010).…


Sample Source(s) Used

References

Bertino, E & Sandhu, R. (2005). Database Security-Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19.

Brynjolfsson, E., Hofmann, P., & Jordan, J.. (2010). Economic and Business Dimensions Cloud Computing and Electricity: Beyond the Utility Model. Association for Computing Machinery. Communications of the ACM, 53(5), 32.

Hopp, W., Iravani, M., & Xu, W. (2010). Vertical Flexibility in Supply Chains.

Management Science, 56(3), 495-502.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Solutions to Top Five Challenges to Cloud Computing for Enterprises...

Pages: 10 (3196 words) Sources: 10 Subject: Education - Computers Document: #57319198

deployment of cloud computing, which is a revolutionary technology for hosting and delivering services over the Internet, is characterized with some major challenges and concerns for enterprises. A brief overview of the top five challenges for the enterprise in cloud computing is discussed in the article. This is followed by a detailed discussion of the available solutions to these challenges including improved security controls, finding a suitable cloud provider,

Studyspark Study Document

Cloud Computing Assessing the Risks of Cloud

Pages: 4 (1163 words) Sources: 4 Subject: Education - Computers Document: #70192550

Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism

Studyspark Study Document

Cloud Computing and the Insider

Pages: 5 (1595 words) Sources: 5 Subject: Business - Management Document: #15509569

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

Studyspark Study Document

Cloud Computer and Insider Threats Cloud Computing

Pages: 6 (1924 words) Sources: 6 Subject: Education - Computers Document: #91735903

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly

Studyspark Study Document

Cloud Computing and Business

Pages: 5 (1606 words) Sources: 5 Subject: Information Technology Document: #56152092

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

Studyspark Study Document

Cloud Computing Software As a Utility in

Pages: 5 (1598 words) Sources: 5 Subject: Education - Computers Document: #67147930

Cloud Computing Software as a utility in some cases pointed to be "on-interest software," is actually a software conveyance feature by which the software and cohorted information is partly accommodated by the cloud. The SaaS is normally entered by people utilizing a meager consumer through a net program. The SaaS has ended up to be one of the regular conveyance feature of numerous organizational requisitions, incorporating bookkeeping, cooperation, client association administration,

Join thousands of other students and

"spark your studies".