Wednesday, December 11, 2019

Impact of Cloud Computing on an organization’s cost and security

Question: Discuss about the Impact of Cloud Computing on an organizations cost and security- A Case Study of Atlassian. Answer: Introduction In order to attain professionalism in a real sense, humans need to undergo persistent practice and research in their respective fields of research. Refinement of the preconceived communicative skills is a crucial aspect of this research. Viewing it from other perspective, conducting research broadens the perspectives of the individuals, which helps in the establishment of new facts. Based on this theme, this research would attempt to provide an insight into the impact of cloud computing on an organizations cost and security. Consideration of Atlassian as an example would enliven the intensity to which cloud computing, through the means of mass data storage, has revolutionized the business activities in terms of altering the business environment (Ross Blumenstein, 2015). The rationale of the research would enable the researcher to develop aims, objectives and questions. Further, the development of aims, objectives and questions would assist the researcher to assess the execution of the research in the right track from the initial stage itself. This assessment relates to the significance of the study and would support the researcher to move into the chapter of literature review. In order to add firmness in the research procedure, the researcher needs to develop a proper methodology for judging the right progress of the research. Research aim The aim of this research is to analyze the impact of cloud computing on the cost and security of the organization, Atlassian. Research objective Based on the identified aim, the following objectives can prove fruitful for the efficient execution of the research project: To achieve an understanding about the basic concepts related to cloud computing To examine the impact of the cloud computing on the cost and security of Atlassian organization To excavate out the challenges faced by the Atlassian personnel in terms of using cloud computing To suggest recommendations to the Atlassian personnel for improving the service of cloud computing Research questions What are the basic concepts related to cloud computing? What is the contribution of cloud computing on the parameter of financial and security in case of Atlassian? What are the challenges encountered by Atlassian in terms of using cloud computing service? What recommendations can be suggested to the Atlassian managers for improving the service of cloud computing? Research hypothesis H0: Cloud computing does not have any impact on the financial and security parameters of the organization, Atlassian H1: Cloud computing is an integral part of Atlassian business environment in terms of carrying out the business procedures. Significance of the research The rationale of the research makes the researcher aware of the intensity of the research topic on the society. This consideration is assistance for the researcher in terms of projecting the significance the research holds. Owing to the increased emergence of the cyber crimes, the companies and organizations underwent severe loss in terms of the official data and its secrecy. This situation stalled the efficiency and productivity of the companies and organizations, adversely affecting the purchasing power of the customers as well as the internal personnel (Chang et al., 2013). Moreover, lack of oriental approach in the installation of the security software aggravated the complexities of organizations such as Atlassian. In such a situation, this research project would act as an address to such cyber crisis. Along with this, this research would act as a secondary source of information for the researchers intending to carry out further research on the widespread impact on cloud computing on the business environment. The recommendations provided in the research would enhance the vision of the Atlassian managers in terms of taking a firm standpoint for storing the official data (Sanaei et al., 2014). This firmness would be a crucial aspect for the managerial authority in terms of fulfilling the identified and the specified requirements. Literature review Cloud computing is the practice of using internet networks by the companies and organizations to store huge amount of data. Along with the storage, the network also provides the facility to process data from one source to another. Not only this, the managers are also benefitted from this facility regarding the monitoring of the storage and processing of the data (Ali, Soar Yong, 2014). Themanagement aspect relates to the security facilities, which maintains the privacy and security of the official data. All these aspects seem true for the organization, Atlassian. As a matter of specification, Quick heal security software is installed in the profiles of the personnel, which acts as an agent in averting the instances of virus attacks, malfunctioning and hacker interventions. Effective utilization of this software helps the managers of Atlassian to keep a track of the cash that is flowing from the internal environment to the external sources (Garg, Versteeg Buyya, 2013). The functioning of cloud computing can be understood through the cloud deployment model. As a matter of specification, the model has four components: private, community, hybrid and public. The parameter of private relates to the sole trader type organization, where cloud management is solely practiced by the managers. Here, there is an absence of any third party sharing the expense of the business for the organization (Cleary Quinn, 2016). In community, the stakeholders, shareholders and the associate partners contribute in themanagement of the businesses of companies and organization like Atlassian through cloud computing. In hybrid, the organizational entities possess agency partners; however, the cloudmanagement possesses collaboration in the utilization of technology. The public parameter resembles community in terms of providing equal access to cloud computing services to the public domain (Schlagwein, Thorogood Willcocks, 2014). Internet of Things (IoT) is an important agent in the revolution of the field of technology. The things in the concept relates to the usage of internet by the people. Conjoining the two sentences projects the people as the other in terms of the internet usage. This specification acts as a deviation from the usual conventions regarding surfing the internet (Ali et al., 2015). In depth understanding regarding this field can be understood by IoT Maturity Model (IoTMM). There are five stages in the model: primitive, tentative, advanced, dynamic and optimized. In the primitive stage, the isolations in the sensors results in the limited functions of cloud computing. In this stage, the knowledge of the Atlassian personnel regarding the usage of the cloud computing service is at the raw stage and lacks in depth understanding. In the tentative stage, the lightweight protocols help the Atlassian personnel to achieve a slow and gradual understanding about the usage of the devices (Gangwar, Date Ramaswamy, 2015). The connection between the devices, at this stage, results in the complete network of cloud computing. The advanced stage comprises of the application of effective management techniques, which enhances the efficiency and productivity of the business procedures. This is due to the execution of market survey and possession of a strategic vision towards the improving the dynamism of the business environment. Inclusion of trainings in this stage can be one of the reasons for the enhancement of the preconceived skills, expertise and knowledge of the employees as well as the managers. Hiring experts for supervision of the machines proved beneficial for the managers in terms of averting the instances of cyber crimes (Pearson, 2013). Exposure of conscious and rationalistic approach in this direction proved fruitful in carrying out the business processes automatically. Overall, this stage can be said to have technological advancement for companies and organizations like Atlassian. This revolution helped the personnel to generate trust, dependence and reliance from the stakeholders, shareholder s and agency partners. The fourth stage, that is, dynamic, reflects the presence of enriched knowledge management. The evidence of this fact is the capability of the staffs to undertake appropriate decisions for the betterment of the organization (Hooper, Martini Choo, 2013). Along with this, the application of the analytics from a rationalistic approach broadened the perspectives of the employees in terms of conducting cloud computing services. The major drive behind this is the training, which encouraged the staffs to expose better performance. Consistency in the exposure of better performance altered the dynamics of the business environment of organizations, like Atlassian. The penultimate stage is the optimized stage, where the skills, expertise and knowledge of the personnel reach an advanced stage. Evaluation of the exposed performance enables the personnel to identify the major drawbacks in the cloud computing service. It is this evaluation which excavated the lack of orientation in this direction (Calheiros et al., 2015). This necessitated the need for search engine optimization in terms of latest technological devices for mass storage of data. This optimized search makes the personnel of Atlassian aware of the Unified Intelligence Solutions (UIS), which played a major role in adding automatization in the business procedures. This optimized search is also an agent for Atlassian personnel in terms of engaging in partnerships with other disciplines for adding value to their corporate social responsibility (Senarathna et al., 2015). Apart from this, queuing theory plays an important part in enhancing the clarity regarding the dynamics of the cloud computing services. The major application of this theory is to cease the process of waiting for companies and organizations regarding the provision of a resource for undertaking appropriate decisions for the efficient and effective execution of the organizational operations (Schulte et al., 2015). All these aspects seem true for the organization, Atlassian. Taking into consideration all the scopes and arenas of the theory helps the organizational personnel to make estimates regarding the time till when the service users have to wait for receiving quality services. This estimation is assistance in terms of calculating the outcome of the cloud computing services and the total time taken for conducting the services. Within this calculations and estimations comes the malfunctioning, which alarms the personnel to take preventive measures well in advance. Taking such measure s prior to the execution of the business helps the business personnel to avert the situation of emergencies such as malfunctioning, virus attacks and hacker intervention (Magalhes et al., 2015). These estimations and calculations reflect the matured and measured behavior of the personnel in terms of safeguarding the official data and personal information of the customers. Typical examples in this direction are the storage of data regarding the number of beds allocated to the patients; traffic congestion in the airport area; sales revenue generated through the sale of the air tickets; architectural designs of the systems to be launched. Oriental approach in this regards has helped the personnel of Atlassian to achieve large scale customer satisfaction (Jararweh et al., 2014). Delving deep into the subject, queue signifies wait and negligent attitude of the personnel in the provision of quality services to the customers adds the adjective endless to the action of waiting. Moreover, it compels the organizations like Atlassian to lag behind the contemporary brands amidst the competitive ambience of the Australian market. On the contrary, making judicious utilization of the cloud computing devices uplifts the personality of the personnel in terms of satisfying the needs, demands and requirements of the customers (Hutchings, Smith James, 2013). Emerging successful in this direction by the organizational personnel, showers quality services on the customers, stored in the treasury of the organization, represented by the cloud, rather a cluster of lucrative services. Within this, possession of adequate skills, expertise and knowledge, regarding the showering of supply and demand is a vital aspect for adding automatization in the business procedures. Methodology Every research is carried out through the adherence and compliance to a particular methodology. Typical components of this methodology are the research philosophy, research design, research strategy, data collection, data analysis, ethical considerations and research limitations. All these are collaboratively presented in the research onion. The inclusion of all these headings in the methodology of a research project reflects the progression of the research on a right track (Mackey Gass, 2015). Selection of the positivism philosophy would help the researcher to establish scientific and real facts, based on which relevant conclusions and recommendations would be drawn. Choosing exploratory design would enable the researcher to explore the unexplored realms of cloud computing and its effect on the financial and security parameter of organizations like Atlassian. Possessing a strategic vision towards the selection of survey would broaden the preconceived perspectives of the researcher regarding the impact of cloud computing on the business environment of companies and organizations like Atlassian. Along with this, random selection of the samples would help the researcher to save lot of time, which would result in the successful completion of the research project within the stipulated time frame (Flick, 2015). Finally, carrying out an action plan would systematize the research related activities, enhancing the efficiency and productivity of the research. Reflective journal The topic of my research is to find out the impact of cloud computing on the cost and security of the organization. I have came to learn that cloud computing is the recent trends that is developed by IT organization for the betterment of all small and big firms. These companies use the computing for better retrieving and manipulation of the data that is stored in the cloud (Rittinghouse Ransome, 2016). It is a virtual place that does not need any physical infrastructure. The most beneficiary aspects of using cloud computing are their flexibility, cost saving services and extensive speed (Almorsy et al., 2016). I have learned that cloud have already a pool of machines that is organizations, who intends to use this service get a structure of computers ready for use. In addition to that, I have also learned that cloud computing connects all the data present in the memory space and allows immediate interaction of the data on requesting demand. This journey has been very promising for me as I got the opportunity to learn many research facts and approaches that will help me to conduct a research ethically and effectively by selecting appropriate research methodology. However, I have faced some difficulty like selection of right sources for obtaining ideas regarding my research topic. Another adversity that I face is the proper guidance for attaining knowledge for the research. I have selected the topic of cloud computing as it is one of the recent technology that is used almost on all the contemporary firms in recent times. Moreover, being a student in this field I want to develop my analytical thinking in the concept regarding their security concern that an organization can attain for data storage. During my research I have found that 25% of the IT shops use cloud services for storing all the crucial information of their inventory and clients details. Furthermore, 11% of the companies have a major cloud infrastructure; while 26% of the other companies planned for major cloud infrastructure (Arora et al., 2013). Now, as a part of my research, initially I faced difficulty in drafting effective objectives and questions as different companies face different issues in using and implementing cloud computing. However, my dilemma got resolved when my mentor helped me and said that a research must be conducted on a particular topic in a particular direction. I hav e then crosschecked that concept of cloud computing is a wide area for research. I have then selected a particular company that is Atlassian and the aspect that I have selected in the area of cloud computing is its impact on cost and security. This knowledge has helped me to formulate the research question effectively so that it can justify my research topic. I have also learned how to write an effective literature review. My mentor have mentioned that there are numerous data present that are widely available in different sources but selecting relevant concept and mentioned it in the research makes it more appropriate. I have learned from my tutor that I can easily narrow down my literature if I consider my research aims and objectives prior to start with a generic data available on my research topic. Thus, if I search for the concept of cloud computing, I may found many directions where this IT conceit is utilized but searching the concept of cloud computing along with the parameters of cost and security provide me relevant details on my research topic. In addition to that based on this knowledge, I can easily search the issue an organization can face during the planning and implementation of cloud computing technology. Utilizing this concept, I compared the found cloud computing issues with that of my selected company that is Atlassian. This provide a reader an in-depth knowledge on the major concepts and key findings regarding my research through the literature review. Another aspect due to which I have to face problem is the selection of appropriate research methodology and procedures for completing my research in future. I have learned that prior to starting a research; we first have to select relevant research philosophy, research approach and purpose. However, each one of these categories has more classifications and that is very confusing for me initially. The prime reason for this is I can attain knowledge and assume an approach; however, since the research is not conducted at present I cannot assure the appropriateness of my selected methodology. Lastly, I have learned about the research ethics that is the most effective part for conducting a research. It is also mentioned by the research scholars that falsifying or misrepresenting research data enhances the chances for inaccurate research result. However, on collecting accurate data collection and analyzing will improve the research quality and offer a precise direction towards the research topic (Bryman Bell, 2015). Another concept of research ethics is trust, accountability, mutual respect, and fairness (Zikmund et al., 2013).My mentor has also mentioned that there are some sources that are copyrighted or are patent to mother nation or organization and utilizing these data in the research in absence of the company may violate the research ethics. I have also learned that while conducting a research, no respondents will be emotionally manipulated or harassed. The respondents are the most crucial element of the research as their perception will help to evaluate whether or n ot a developed technology is beneficial. The same concept goes with the secondary data collection. Data gathered by one research scholar should not be credited for others work. Maintenance of this accuracy allows a research to be ethically accurate. However, I can say that I am successful for selecting appropriate procedure for my research and I wrote about my emerging understanding of research methodologies and reflected my best understanding in developing literature review. Initially, sometimes I feel that the critical self-reflection prompted me to change my approach but lastly, on final drafting of my entire work, I feel confident that I have proceeded in a correct way. Ethics application Ethics adds value to the societal existence of the individuals. Abiding by the ethics such as valuing the viewpoints of the others, providing them opportunity to speak out their opinions, looking after the preservation of their basic rights, possession of courteous and kind attitude while communicating with the others falls within the ethics that one is bound to follow. All these aspects seem true for a researcher in terms of executing a research project. In a research project, the researcher is expected to adhere to certain rules and regulations for conducting the research in an efficient and effective manner (Panneerselvam, 2014). Staying within the boundary walls of ethics qualifies the researcher as efficient in terms of preserving the self respect of the samples selected. This is specially required in the process of surveys and interviews. As a matter of specification, following the research ethics adds authenticity, reliability and validity to the research project. Typical example in this direction is Data Protection Act (1998). Adherence to the propositions of this Act would enable the researcher to safeguard the individual sentiments of the selected samples (Flick, 2015). Viewing it from other perspective, the word protection relates to the functionality of this Act. The word data relates to the utilization of the responses of the samples only for the research purpose. The previous sentence assures the samples about refraining from the utilization of the gathered data for commercial purposes. Exposure of rational and conscious attitude in this direction would add value to the individuality of the researcher. The research topic is itself a solution to the researcher in terms of maintaining the privacy of the data collected from the samples (Mackey Gass, 2015). The previous sentence sheds light on the widespread impact created by cloud computing in the companies and organizations like Atlassian. Herein lays the symbolic significance of the words data and protection. Legalizing these terms can be considered as a courtly aid to the researcher in case he fails to solve the issues of conflicts, discriminations and harassments internally. In this research p roject, the researcher would adopt a liberal approach in the survey process. As a matter of specification, the samples would be at liberty to withdraw the process if they feel uncomfortable regarding the proposed questions (Panneerselvam, 2014). Taking a cue from the aspect of questions, the researcher needs to include those questions, which do not hurt the sentiments of the samples. Questions, which directly relate to the research topic, would result in the straight forward and interactive session. Moreover, it would generate an urge among the samples to provide answers as they are involved with the process of using the services on a daily basis (Flick, 2015). Evaluation is a crucial aspect here, as it would guide the researcher in terms of the feasibility and effectiveness of the proposed questions in terms of the identified objectives. The possession of liberal approach in terms of withdrawing the survey process assures the samples regarding the absence of compulsion in terms of answering the proposed question. These questions adversely affect the mindset of the samples, generating fear in terms of leakage of the provided answers. In such cases, the prime responsibility of the researcher is to switch over to other questions rather than asking the same questions repeatedly (Mackey Gass, 2015). Repeating the controversial question creates a negative image about the researcher in the minds of the samples. Exploring the other aspect of research ethics, using a particular book, journal article, and website and not acknowledging it in the reference of bibliography section would prove the researcher as guilty of plagiarism, which is a deviation of the basic research ethics. Along with this, referring to the sites forbidden by the professor for the research purpose is also considered to be a violation of the research ethics (Panneerselvam, 2014). Typical examples in this direction are Slideshare, Wikipedia among others. However, using these sites is accepted for understanding the basic concepts. Enlisting these sites in the references or bibliography section is a violation of the ethics that the researchers are expected to follow for carrying out a research project. Exposing courteous attitude to the personnel who have helped the researcher to carry out the research project adds value to the personality of the researcher. Equality should be maintained in this direction as it might emotional conflict between the professionals, peers , friends, well wishers, guide and mentors, who have assisted the researcher in the execution of the research project (Flick, 2015). Maintenance of the ethics exposes the professional attitude of the researcher. On the contrary, exposure of immature behavior towards the execution of the research snatches away the designation of researcher. This is interplay with the individuality of the researcher on humanitarian grounds. References Ali, O., Soar, J., Yong, J. (2014, October). Impact of cloud computing technology on e-government. InInternational Conference on Information and Software Technologies(pp. 272-290). Springer International Publishing. Ali, O., Soar, J., Yong, J., McClymont, H., Angus, D. (2015, May). Collaborative cloud computing adoption in Australian regional municipal government: An exploratory study. InComputer Supported Cooperative Work in Design (CSCWD), 2015 IEEE 19th International Conference on(pp. 540-548). IEEE. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Bryman, A., Bell, E. (2015).Business research methods. Oxford University Press, USA. Calheiros, R. N., Masoumi, E., Ranjan, R., Buyya, R. (2015). Workload prediction using ARIMA model and its impact on cloud applications QoS.IEEE Transactions on Cloud Computing,3(4), 449-458. Chang, V., Walters, R. J., Wills, G. (2013). The development that leads to the Cloud Computing Business Framework.International Journal of Information Management,33(3), 524-538. Cleary, P., Quinn, M. (2016). Intellectual capital and business performance: An exploratory study of the impact of cloud-based accounting and finance infrastructure.Journal of Intellectual Capital,17(2), 255-278. Flick, U. (2015).Introducing research methodology: A beginner's guide to doing a research project. Sage. Gangwar, H., Date, H., Ramaswamy, R. (2015). Understanding determinants of cloud computing adoption using an integrated TAM-TOE model.Journal of Enterprise Information Management,28(1), 107-130. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hooper, C., Martini, B., Choo, K. K. R. (2013). Cloud computing and its implications for cybercrime investigations in Australia.Computer Law Security Review,29(2), 152-163. Hutchings, A., Smith, R. G., James, L. (2013). Cloud computing for small business: Criminal and security threats and prevention measures.Trends and Issues in Crime and Criminal Justice, (456), 1. Jararweh, Y., Jarrah, M., Alshara, Z., Alsaleh, M. N., Al-Ayyoub, M. (2014). Cloudexp: A comprehensive cloud computing experimental framework.Simulation Modelling Practice and Theory,49, 180-192. Mackey, A., Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Magalhes, D., Calheiros, R. N., Buyya, R., Gomes, D. G. (2015). Workload modeling for resource usage analysis and simulation in cloud computing.Computers Electrical Engineering,47, 69-81. Panneerselvam, R. (2014).Research methodology. PHI Learning Pvt. Ltd.. Pearson, S. (2013). Privacy, security and trust in cloud computing. InPrivacy and Security for Cloud Computing(pp. 3-42). Springer London. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Ross, P. K., Blumenstein, M. (2015). Cloud computing as a facilitator of SME entrepreneurship.Technology Analysis Strategic Management,27(1), 87-101. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Schlagwein, D., Thorogood, A., Willcocks, L. P. (2014). How commonwealth bank of Australia gained benefits using a standards-based, multi-provider cloud model.MIS Quarterly Executive,13(4), 209-222. Schulte, S., Janiesch, C., Venugopal, S., Weber, I., Hoenisch, P. (2015). Elastic business process management: state of the art and open challenges for BPM in the cloud.Future Generation Computer Systems,46, 36-50. Senarathna, I., Warren, M., Yeoh, W., Salzman, S. (2015). A Conceptual Model for Cloud Computing Adoption by SMEs in Australia'. InDelivery and Adoption of Cloud Computing Services in Contemporary Organizations(pp. 100-128). IGI Global. Zikmund, W. G., Babin, B. J., Carr, J. C., Griffin, M. (2013).Business research methods. Cengage Learning.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.