A Tool to Map Applications to Information Technology Deployment Models

Autores/as

  • Han Ping Fung Technology Consulting, Hewlett-Packard Asia e University ITIL v3 Expert ITIL v2 Service Manager Project Management Professional (PMP) Certified Information System Security Professional CISSP) Certificate in Cloud Security Knowledge (CCSK) IPv6 Forum Gold Certified Network Engineer

DOI:

https://doi.org/10.18227/2237-8057rarr.v6i1.3233

Palabras clave:

Applications, IT Deployment Models, Criteria, Mapping Tool.

Resumen

The momentum to adopt cloud computing and IT outsourcing for application management is still prevalent. However, there is still lack of research or tool to map an application to a specific IT deployment model like public cloud, private cloud, IT outsourcing or in-house management. This research problem has prompted the researcher to perform literature review, developed a Microsoft Excel mapping tool as well as tested it for 26 applications from two organizations in Singapore. This mapping tool is based on 10 criteria to evaluate each application’s characteristics before mapping them to the appropriate IT deployment model. These 10 criteria include: 1) Regulatory Compliance, 2) Vendor Support, 3) Service Availability, 4) Workload Variability, 5) Security, 6) Infrastructure Compatibility, 7) Internet Suitability, 8) Architectures, 9) Financials, and 10) Affinity & Intranet Integration. This article demonstrates that the mapping tool is a valuable asset to both IT management and IT consultant in assessing applications and map them to the correct IT deployment models. The benefits of using this mapping tool include accuracy, consistency and speed in mapping the applications to the appropriate IT deployment models.

Citas

Ahmed, M., & Hossain, M. A. (2014). Cloud Computing and Security Issues in the Cloud. International Journal of Network Security & Its Applications, 6(1), 25-36.

Buyya, R., Broberg, J., & Goscinski, A. (2011). Cloud Computing – Principles and Paradigms. John Wiley & Sons, Inc., Publication.

Catinean, I., & Candea, D. (2013). Characteristics of the Cloud Computing Model as a Disruptive Innovation. Review of International Comparative Management, 14(5), 783-803.

Choudhary, R. (2012). A Survey on Cloud Computing Architecture. International Journal of Computer Technology & Applications, 3(4), 1400-1405.

Cianfaro, M. (2014). Legal Challenges to Cloud Computing: Does Physical Location Matter? Unpublished Master Thesis, Utica College.

Cloud Standards Customer Council (2013). Migrating Applications to Public Cloud Services: Roadmap for Success. Cloud Standards Customer Council, 1-28.

CSA (2011). Security Guidance for Critical Areas of Focus in Cloud Computing v3. Cloud Security Alliance.

Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004). Information Systems Outsourcing: A Survey and Analysis of the Literature. The DATA BASE for Advances in Information Systems, 35(4), 6-102.

Dutta, A., Peng, G. C. A., & Choudhary, A. (2013). Risks in Enterprise Cloud Computing: The Perspective of IT Experts. The Journal of Computer Information Systems, Summer 2013, 39-48.

Ghanam, Y., Ferreira, J., & Maurer, F. (2012). Emerging Issues & Challenges in Cloud Computing – A Hybrid Approach. Journal of Software Engineering and Applications, 2012, 5, 923-937.

Hajjat, M., Sun, X., Sung, Y. W. E., Maltz, D., Rao, S., Sripanidkulchai, K., & Tawarmalani, M. (2010). Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud. SIGCOMM’10, ACM, 243-254.

Nagaty, K. A. (2014). Cloud Tree: A Hierarchical Organization as a Platform for Cloud Computing. International Journal of Computer and Electrical Engineering, 6(1), February 2014.

Nanath, K., & Pillai, R. (2013). A Model for Cost-Benefit Analysis of Cloud Computing. International Information Management Association, Inc., 22(1), 95-119.

NIST (2011a). The NIST Definition of Cloud Computing. Special Publication 800-145, National Institute of Standards and Technology, August 2011.

NIST (2011b). Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication 800-144, National Institute of Standards and Technology, December 2011.

Sasko, R., Gusev, M., & Kostoska, M. (2012). Cloud Computing Security in Business Information Systems. International Journal of Network Security & Its Applications, 4(2), 75-93.

Walterbusch, M., Martens, B., & Teuteberg, F. (2013). Evaluating Cloud Computing Services from a Total Cost of Ownership Perspective. Management Review, 36(6), 613-638.

Descargas

Publicado

02/08/2016

Número

Sección

Administração de Empresas (Business Administration)