Volume 30, Issue 3 (Spring 2015)                   ... 2015, 30(3): 759-784 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Yaghoubi N M, Jafari H R, Shukuhy J. Identification and ranking of the risk factors of cloud computing in State-Owned organizations. .... 2015; 30 (3) :759-784
URL: http://jipm.irandoc.ac.ir/article-1-2601-en.html
University of Sistan and Baluchestan
Abstract:   (12992 Views)
Rapid development of processing and storage technologies and the success of the Internet have made computing resources cheaper, more powerful and more available than before. This technological trend has enabled the realization of a new computing model called cloud computing. Recently, the State-Owned organizations have begun to utilize cloud computing architectures, platforms, and applications to deliver services and meet constituents’ needs. Despite all of the advantages and opportunities of cloud computing technology, there are so many risks that State-Owned organizations need to know about before their migration to cloud environment. The purpose of this study is to identify and rank the risks factors of cloud computing in State-Owned organizations by making use of IT experts’ opinion. Firstly, by reviewing key articles, a comprehensive list of risks factors were extracted and classified into two categories: tangible and intangible. Then, six experts were interviewed about these risks and their classifications, and 10 risks were identified. After that, process of ranking the risks was done by seeking help from 52 experts and by fuzzy analytic hierarchy process. The results show that experts have identified intangible risks as the most important risks in cloud computing usage by State-Owned organizations. As the results indicate, "data confidentiality" risk has the highest place among the other risks.
Full-Text [PDF 612 kb]   (5401 Downloads)    
Type of Study: Research | Subject: Information Technology
Received: 2014/09/7 | Accepted: 2014/12/7 | Published: 2014/12/7

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


© 2019 All Rights Reserved | Iranian Journal of Information processing and Management

Designed & Developed by : Yektaweb