Cloud Computing Essays (Examples)

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

A Study of how cloud computing related to Cost-Effectiveness
Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland … Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The study shows that cloud computing supports greater capacity levels and also protracted capabilities of the organization, devoid of incurring additional costs, which would have otherwise required investment in … organization, devoid of incurring additional costs, which would have otherwise required investment in personnel training, infrastructure, and software. Also, a key feature of cloud computing is its capacity to diminish the financial burden that is placed on firms in technology adoption. The authors also……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

The Cost Effectiveness of cloud computing within an Accounting Organization
Table of Contents
1 Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 Research Problem 5
… Research Questions 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 Literature Review 6
2.1 cloud computing Definition 6
2.2 Types of cloud computing Services 6
2.2.1 Infrastructure as a Service (IaaS) 6
2.2.2 Platform as a Service (PaaS) 7
2.2.3 Software as a Service (SaaS) 7
… as a Service (IaaS) 6
2.2.2 Platform as a Service (PaaS) 7
2.2.3 Software as a Service (SaaS) 7
2.3 Deployment of Organizational cloud Services 8
2.3.1 Public cloud 8
2.3.2 Private cloud 8
2.3.3 Hybrid cloud 9
2.4 Effectiveness of cloud computing 9
2.4.1 Cost-Savings 9
2.4.2 Remote Accessibility 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… along to replace it – and software engineers and IT professionals are hard at work to exploit these technologies even further, including using cloud-based technologies and sensor-equipped devices to collect, aggregate and analyze a wide range of data in real time.
Although there are different IT platforms … and analyze a wide range of data in real time.
Although there are different IT platforms that are currently being used for these computing purposes, one of the main contenders for many businesses at present is the Internet of Things or IoT. For example, according to An ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

… Service and Technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.
The authors of this article maintain that leadership forms one of the main factors for organizational adoption of successful innovation. … model phases, utilizing PLS technique and information from as many as 154 companies, for studying the implementation of novel technology, namely MCC (mobile cloud computing). Factors like corporate vision, supportive leaders, intellectual stimulation, and personal acknowledgment are important when it comes to implementation intent. In contrast, supportive leaders … The authors conclude that empathetic, efficient leadership, right from the vision stage to the stage of institutionalization, proves crucial to adopt information technology cloud innovation successfully. Superior communication skills, involving ensuring team motivation, personnel being up- to- date on reform and growth, and regular emphasis on corporate ……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Using DoorDash To Promote A Restaurant Brand

Pages: 7 (2131 words) Sources: 4 Document Type:Research Paper Document #:85037477

… kitchen and it will go straight to the computer for check-out as well. It eliminates several steps and creates a more efficient environment. cloud computing would come into play here as well, since it would allow data to be collected from people who visit the website and stored … into play here as well, since it would allow data to be collected from people who visit the website and stored in the cloud for processing.
Measuring Market Performance
Measuring market performance can be accomplished by comparing sales year over year and month over month. It can ……

References

References

Gallardo-Echenique, E. E., Marqués-Molías, L., Bullen, M., & Strijbos, J. W. (2015). Let’s talk about digital learners in the digital era. International Review of Research in Open and Distributed Learning, 16(3), 156-187.

Gibson, C., & Homan, S. (2004). Urban redevelopment, live music and public space: Cultural performance and the re?making of Marrickville. International Journal of Cultural Policy, 10(1), 67-84.

Lawson, C. (2007). Victorian Young Planners: News and Views-Pot, Parma and Trivia Night. Planning News, 33(6), 12.

Queensland. (2020). Key components of a digital strategy. Retrieved from https://www.business.qld.gov.au/running-business/it/digital-strategy/key-components

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

...Cloud computing Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment processing and customer data.
The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the deployment in the ABC system. It combines traditional firewall with other network devices that filter unauthorized network protocols. In a distributed system where traffic is passed through different nodes,……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

...Cloud computing Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".