Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/63653
|
Title: | 評估產業之雲端準備度 Assessing Cloud Readiness in Enterprises |
Authors: | 車育賢 |
Contributors: | 張欣綠 Chang, Hsin Lu 車育賢 |
Keywords: | 雲端運算 雲端準備度 私有雲 公有雲 Cloud computing Cloud readiness Private cloud Public cloud |
Date: | 2013 |
Issue Date: | 2014-02-10 14:48:40 (UTC+8) |
Abstract: | 近年來雲端運算逐漸盛行且其已被許多企業採用,雲端運算所帶來的好處包含提供更好的連結、企業不同廠的無間隙合作,進而提高生產效率。透過現存論文的研究,我們發現企業導入雲端運算與使其和企業內企業流程成功結合為兩大企業成功的因素。然而,要如何導入與對雲端運算加以控制卻很少在現存論文中談及,更遑論企業在導入雲端前該做哪些準備等議題。本研究也透過文獻的探討提出兩個研究面向(管理面與科技面),文獻探討也發現,此兩面向為企業選擇導入公有雲或是私有雲的主因。再者,本研究提出兩個討論面向的同時,也與現存的雲端服務供應商討論此兩面向,希望能讓兩面向更加符合現存雲端狀況。根據這兩面向的基礎,本研究在此兩大面向下提出許多因素來探討企業導入雲端的準備度。本研究也進一步透過問卷的方式訪問現存有採用或是導入雲端的企業,問卷內容涵蓋上述提到的兩面向,進而透過所收集的資料之分析來探討真正影響雲端導入成功與否的因素是否與研究所提出的假設符合。研究結果發現,虛擬化與IT建設的有無與完善程度對於私有雲的導入成功與否有正向關係。而研究結果也指出,公有雲與私有雲兩種型態的雲端也有相互的關係。 Cloud computing has been dedicated to providing several benefits, such as better connectivity and seemingly seamless cooperation between different plants, that improve firm performance. Previous research maintains that introducing cloud computing and combining it with companies’ processes are two of the prime factors that lead companies to success; however, the manner of implementing this technology and exerting control over it are rarely discussed, especially with regard to the preparation before a company’s official launch of cloud computing. A literature review enables us to propose two dimensions—technological and managerial concerns—of factors driving companies to introduce cloud computing through both private and public clouds. Moreover, after proposing the two dimensions, we examine them by conducting interviews with several companies in the hopes of making these dimensions more applicable and pragmatic in business. Because the purpose of this research is to prepare companies to implement cloud computing, we design a questionnaire based on the dimensions and undertake a survey with several companies that have implemented cloud computing to determine the underlying factors influencing the performance of cloud computing. The results of this research show that both of the virtualization and IT infrastructure readiness factors have positive impacts on private clouds, and the results also indicate a relationship between public and private clouds, which means companies that have adopted public clouds are more likely to succeed in adopting private clouds. |
Reference: | An, B., Lesser, V., Irwin, D., & Zink, M. (2010, May). Automated negotiation with decommitment for dynamic resource allocation in cloud computing. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (pp. 981-988). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1838338
Babcock, C. (2009, April 13). Why ’Private Cloud’ Computing Is Real – And Worth Considering. InformationWeek. Retrieved from http://www.informationweek.com/
Bagozzi, R. P., Yi, Y., & Phillips, L. W. (1991). Assessing construct validity in organizational research. Administrative science quarterly, 421-458.
Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A study of infrastructure as a service (IAAS). International Journal of engineering and information Technology, 2(1), 60-63.
Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud Computing: Understanding and Investigating Platform as a Service (PaaS). International Journal of Engineering, 3(3), 145-452.
Buyya, R., Ranjan, R., & Calheiros, R. (2010, May). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. Paper presented at the International Conference on Algorithms and Architectures, Busan, Korea. Abstract retrieved from http://link.springer.com/chapter/10.1007%2F978-3-642-13119-6_2?LI=true
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.
Chang, V., Wills, G., & De Roure, D. (2010). Cloud business models and sustainability: impacts for businesses and e-research. Software Sustainability Workshop. Retrieved from http://eprints.soton.ac.uk/271054/37/VC_Cloud_Business_Models_accepted_AHM2010.pdf Charter, R. A. (1999). Sample size requirements for precise estimates of reliability, generalizability, and validity coefficients. Journal of Clinical and Experimental Neuropsychology, 21(4), 559-566.
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85-90.
Clemons, E. K., & Chen, Y. (2011, January). Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing. Internet Computing, IEEE. Advance online publication. doi: 10.1109/HICSS.2011.292
Dargha, R. (2011). Cloud Computing: Key Considerations for Adoption. Infosys. Retrieved from http://www.infosys.com/cloud/resource-center/documents/cloud-computing.pdf
Das, S., Agarwal, S., Agrawal, D., Abbadi, A. E. (2010). An Elastic, Scalable, and Self Managing Transactional Database for the Cloud (UCSB Computer Science Technical Report). Retrieved from University of California, Department of Computer Science: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.9402
Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud computing: Distributed Internet computing for IT and scientific research. Internet Computing, IEEE, 13(5), 10-13.
Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: Issues and challenges. Internet Computing, IEEE. Advance online publication. doi: 10.1109/AINA.2010.187
Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., & Wolf, D. (2011). Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Computing, 91(1), 23-42.
Emerson Network Power (2010). Taking the Enterprise Data Center into the Cloud [White paper]. Retrieved from http://www.emersonnetworkpower.com/en-US/Brands/Liebert/Documents/White%20Papers/scalable-data-center_24567-R11-10.pdf
Ercan, T. (2010). Effective use of cloud computing in educational institutions. Procedia - Social and Behavioral Sciences, 2(2), 938-942.
Géczy, P., Izumi, N., & Hasida, K. (2012). Cloudsourcing: Managing Cloud Adoption. Global Journal of Business Research, 6(2), 57-70.
Goodburn, M. A., & Hill, S. (2010). The cloud transforms business. Financial Executive, 26(10), 35-39.
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. Security & Privacy, IEEE, 9(2), 50-57.
Grover, V., & Teng, J. T. (1993). The Decision to Outsource Information-Systems Functions. Journal of Systems Management, 44(11), 34-38.
Gurav, U., & Shaikh, R. (2010, February). Virtualization: a key feature of cloud computing. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1741957
Harris, W. (2011, April). Cloud Computing-Based IT Solutions for Organizations With Multiregional Branch Offices. Paper presented at the 2nd International Conference on Information Managemant and Evaluation: ICIME2011, Toronto, Canada. Abstract retrieved from http://www.academic-conferences.org/pdfs/ICIME11-Booklet.pdf
Hayes, B. (2008). Cloud computing. Communications of the ACM, 52(7), 9-11.
Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing (G00157782). Retrieved from http://www.gartner.com/DisplayDocument?id=685308
Hunter, P. (2009). Cloud aloud. Engineering & Technology, 4(16), 54-56.
IBM Corporation. (2009). Fact sheet: IBM Strategy and Change Services for Cloud Adoption [Fact sheet]. Retrieved from http://www-03.ibm.com/press/us/en/attachment/28557.wss?fileId=ATTACH_FILE5&fileName=Fact%20sheet%20-%20IBM%20Strategy%20and%20Change%20Services%20for%20Cloud%20Adoption.pdf
IBM Corporation. (2010). Defining a framework for cloud adoption [White paper]. Retrieved from ftp://public.dhe.ibm.com/common/ssi/ecm/en/ciw03067usen/CIW03067USEN.PDF
Ibrahim, A. S., Hamlyn-harris, J. H., & Grundy, J. (2010, November). Emerging security challenges of cloud virtual infrastructure. Paper presented at the Asia Pacific Software Engineering Conference 2010 Cloud Workshop, Sydney, Australia. Abstract retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.603
Jiang, J. J., Muhanna, W. A., & Klein, G. (2000). User resistance and strategies for promoting acceptance across system types. Information & Management, 37(1), 25-36.
Kandukuri, B. R., Paturi, V. R., & Rakshit, A. (2009, September). Cloud security issues. Internet Computing, IEEE. Advance online publication. doi: 10.1109/SCC.2009.84
Kim, W., Kim, S. D., Lee, E., & Lee, S. (2009, December). Adoption issues for cloud computing. In Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (pp. 3-6). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1806341
Knorr, E., & Gruman, G. (2008). What cloud computing really means. Infoworld. Retrieved from http://moodle-rsc.ukc.ac.uk/login/index.php
Krautheim, F. J. (2009, June). Private virtual infrastructure for cloud computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing (pp. 5). USENIX Association. Retrieved from https://www.usenix.org/conference/hotcloud-09/private-virtual-infrastructure-cloud-computing
Lai, V. S., & Mahapatra, R. K. (1997). Exploring the research in information technology implementation. Information & Management, 32(4), 187-201.
Leavitt, N. (2009). Is cloud computing really ready for prime time. Internet Computing, IEEE, 42(1), 15-20.
Lenk, A., Klems, M., Nimis, J., Tai, S., & Sandholm, T. (2009, May). What`s inside the Cloud? An architectural map of the Cloud landscape. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 23-31). IEEE Computer Society. Retrieved from http://origin-www.computer.org/csdl/proceedings/icse-cloud/2009/3713/00/05071529.pdf
Li, Z. J., Chen, C., & Wang, K. (2011). Cloud computing for agent-based urban transportation systems. Intelligent Systems, IEEE, 26(1), 73-79.
Loebbecke, C., Thomas, B., & Ullrich, T. (2012). Assessing Cloud Readiness at Continental AG. MIS Quarterly, 11(1), 11-20.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189.
McAfee, A. (2011). What every CEO needs to know about the cloud. Harvard Business Review, 89(11), 124-132.
Mell, P., & Grance, T. (2010). The NIST Definition of Cloud Computing. Communications of the ACM, 53(6), 145.
Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245-253.
Preimesberger, C. (2011). The world from hardware to software and now to cloud-according to DELL. eWEEK. Retrieved From http://www.eweek.com/
Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: a comparison of covariance-and component-based SEM. MIS Quarterly, 33(1), 197-214.
Raman, T. V. (2008). Cloud computing and equal access for all. In Proceedings of the 2008 international cross-disciplinary conference on Web accessibility, pp. 1-4.
Reynolds, E., & Bess, C. (2009). Clearing Up the Cloud: Adoption Strategies for Cloud Computing. Cutter IT Journal, 22(6), 14-20.
Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I. M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., & Galan, F. (2009). The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development, 53(4), 4-1.
Rogers, E. (1983). Diffusion of Innovations. New York, USA: Free Press.
Royston, J. P. (1983). Some techniques for assessing multivarate normality based on the shapiro-wilk W. Applied Statistics, 121-133.
Shapiro, S. S., & Wilk, M. B. (1965). An analysis of variance test for normality (complete samples). Biometrika, 52(3), 591-611.
Simalango, M. F., Kang, M. Y., & Oh, S. (2010). Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization (Doctoral dissertation, Ajou University, South Korea). Retrieved from http://arxiv.org/ftp/arxiv/papers/1010/1010.4952.pdf
Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. Internet Computing, IEEE, 13(5), 14-22.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.
Sultan, N. (2010). Cloud computing for education: A new dawn?. International Journal of Information Management, 30(2), 109-116.
Wang, L., Laszewski, G. V., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New Generation Computing, 28(2), 137-146.
Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16.
VMware (2011) Global Cloud Computing adoption: transformation Is in the air [White paper]. Retrieved from http://www.vmwaregrid.com/vcloud_service_provider/servedbythenet/assets/Cloud_IDG.pdf
Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. European Journal of Information Systems, 12(4), 251-268. |
Description: | 碩士 國立政治大學 資訊管理研究所 100356027 102 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0100356027 |
Data Type: | thesis |
Appears in Collections: | [資訊管理學系] 學位論文
|
Files in This Item:
File |
Size | Format | |
602701.pdf | 1228Kb | Adobe PDF2 | 272 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|