Volume 30, Issue 3 (Spring 2015)                   ... 2015, 30(3): 759-784 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Yaghoubi N M, Jafari H R, Shukuhy J. Identification and ranking of the risk factors of cloud computing in State-Owned organizations. .... 2015; 30 (3) :759-784
URL: http://jipm.irandoc.ac.ir/article-1-2601-en.html
University of Sistan and Baluchestan
Abstract:   (15063 Views)
Rapid development of processing and storage technologies and the success of the Internet have made computing resources cheaper, more powerful and more available than before. This technological trend has enabled the realization of a new computing model called cloud computing. Recently, the State-Owned organizations have begun to utilize cloud computing architectures, platforms, and applications to deliver services and meet constituents’ needs. Despite all of the advantages and opportunities of cloud computing technology, there are so many risks that State-Owned organizations need to know about before their migration to cloud environment. The purpose of this study is to identify and rank the risks factors of cloud computing in State-Owned organizations by making use of IT experts’ opinion. Firstly, by reviewing key articles, a comprehensive list of risks factors were extracted and classified into two categories: tangible and intangible. Then, six experts were interviewed about these risks and their classifications, and 10 risks were identified. After that, process of ranking the risks was done by seeking help from 52 experts and by fuzzy analytic hierarchy process. The results show that experts have identified intangible risks as the most important risks in cloud computing usage by State-Owned organizations. As the results indicate, "data confidentiality" risk has the highest place among the other risks.
Full-Text [PDF 612 kb]   (6675 Downloads)    
Type of Study: Research | Subject: Information Technology
Received: 2014/09/7 | Accepted: 2014/12/7 | Published: 2014/12/7

Add your comments about this article : Your username or Email:

Send email to the article author

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2021 CC BY-NC 4.0 | Iranian Journal of Information processing and Management

Designed & Developed by : Yektaweb