Wednesday, May 6, 2020

Implementing Cloud Computing Environment for Critical Factors

Question: Discuss about theImplementing Cloud Computing Environment for Critical Factors. Answer: Introduction The advancement of technology has reached to a level where it can be used in the implementation of ICT or Information and Communication Technology based businesses. The growth of e-commerce has facilitated the implementations as well. The integration between cloud computing and e-commerce provides solution to the improvement of economic growth based on technology (Laudon and Laudon 2016). The following report would include such implementation of cloud computing into the business of the furniture e-commerce called ALLOHA Furniture World, the benefits and risks associated with the implementation, the comparison of the risks and benefits inherent in cloud computing, the mitigation strategies for the risks and if ALLOHA Furniture should implement cloud computing or not. Benefits and risks of using cloud computing in ALLOHA Furniture World The benefits of cloud computing are myriad in the arena of e-commerce businesses. Firstly, cloud computing provides and e-commerce application to cater to the changing demands and scenarios of the market improving its scalability and the architecture that the business needs. Secondly, since in an e-commerce application, speed is the most important aspect to keep the customers glued, cloud computing provides with greater storage, computational power and bandwidth (Laudon and Laudon 2016). It also reduces maintenance and storage cost by implementing the technology in the virtual cyberspace and makes the entire system tolerant to any disaster. However, there are few risks associated with the system as well. Cloud environment, due to its distributive nature, is susceptible to security issues and forms one of the major concerns. In addition, as cloud computing uses virtual computer technology, users personal data is kept on various virtual data centres, which may cross international boundaries, making it more vulnerable to risks. Comparison of the risks and benefits inherent in cloud computing The risks and the benefits that are inherent in cloud computing has a steer clear chance of forming a risk about data vulnerability issues. The cloud-computing environment has indeed made a revolutionary change in adapting to a technology that is devoid of any physical storage system. An e-commerce application may be a representation of a virtual shop however; it does not possess any physical existence (Demydov et al. 2015). Therefore, implementation of the cloud computing environment e-commerce applications is indeed a benefit but also the risks make it prone to become a greater threat. There is no virtual limitation in cloud storage and therefore there are no limitations in the storage areas. The vast storage capability, however is a plus point but also has the potential to make the e-commerce application fall victim to data theft and data security issues. If ALLOHA Furniture World should move to using cloud services or not It is recommended that Alloha Furniture World should implement cloud services. This is because, the implementation of the e-commerce among small and medium entrepreneurs, which have limited resources and these enterprises, would want to develop and expand marketing with e-commerce, can use cloud services that are free or have a low cost. Cloud implementation is adjustable and has the potential to make the business scalable in nature (Wang et al. 2016). This would easily make the business of Alloha Furniture reach a soaring high increasing their customer base. Cloud service implementation also needs a very low economic range in comparison with other technological implementations. The integrity and security risks could also be mitigated, as many cloud service providers have good integrity and the cost can be customized to the requirements. With good infrastructure, especially for a provider reliable provider, implementation of these services could be easily done for Aloha Furniture Wor ld. Mitigation strategies to reduce the risks of moving to the cloud Cloud computing offers solutions as well along with the risks it provides in implementing the technology into e-commerce applications. It should be kept in mind that the cloud computing technology services should not be implemented without proper knowledge of the mitigation strategies by an e-commerce application (Lian 2015). These mitigation strategies are overseen by a hypervisor, with good understanding of the risks of a cloud computing environment. These could be done by the following methods: Implementation of critical methods to protect and prohibit the sharing of accounts and their credentials between users Using single sign-on (SSO) in the organization Working with experts to ensure cloud security regularly Implementation of end-to-end encryption Conclusion Thus, it can be concluded that, it is very beneficial for the e-commerce website application of Alloha Furniture World to implement the latest technology of cloud-based services to increase their customer base. Although, the technology has its risks along with the added benefits, there are ways that they can be mitigated to extract the proper utilization of the technology. The report establishes in details about the risks and benefits that the cloud services offer and how they can be utilised to benefit the business for Alloha Furniture World even mitigating the impending risks. Reference Demydov, I.V., Strykhalyuk, B.M., Shpur, O.M., Mohamed, M.E.H. and Klymash, Y.V., 2015. The structural-functional synthesis of cloud service delivery platform after service availability and performance criteria. , (1), pp.144-159. Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education India. Lian, J.W., 2015. Critical factors for cloud based e-invoice service adoption in Taiwan: An empirical study.International Journal of Information Management,35(1), pp.98-109. Wang, S., Wan, J., Li, D. and Zhang, C., 2016. Implementing smart factory of industrie 4.0: an outlook.International Journal of Distributed Sensor Networks,12(1), p.3159805.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.