Cloud-Based Enterprise Information Systems

2016-10-15
Cloud computing is growing at a very fast pace. Enterprise information systems (EISs) such as ERP, SCM, and CRM are used in organizations in order to increase customer satisfaction, operational excellence, and to decrease operational costs. Looking at the widespread literature available on both EIS and Cloud Computing, few researchers have examined the integration of both systems. While this area has not been fully investigated in the academia due to limited available literature, it has attracted significant interest from general practitioners. Accordingly, the Cloud-EIS can be considered as an important research problem. In this study, we attempt to investigate the factors influencing the usage and adoption of Cloud-EISs by considering Technology-Organization- Environment (TOE) framework as the basis to give directions to cloud service providers on how to design their products in order to increase adoption and usage. Analytic Hierarchy Process (AHP) is used in order to rank the determined factors. The results show that the most significant factors influencing the usage and adoption of Cloud-EISs are security & privacy, business activity-cloud EIS fitness, top management support, trust, and organization's IT resource.
22nd International Conference on Information and Software Technologies (ICIST)

Suggestions

DATABASE SECURITY IN PRIVATE DATABASE CLOUDS
Cinar, Onur; Guncer, R. Haluk; Yazıcı, Adnan (2016-12-22)
Cloud computing and cloud systems are very popular in today's Information Technology (IT) and systems and have grown very quickly. Cloud computing helps organizations solve increasing IT costs such as their licenses, power consumption, physical protection, by providing better standardization, higher benefit, greater performance, and quicker responses of information services. Carrying vital importance for our private and secret information, cloud systems must provide extra security solutions for database sys...
Secure model for efficient live migration of containers
Mavuş, Zeynep; Angın, Pelin; Department of Computer Engineering (2019)
Cloud services have become increasingly widespread in the past decade due to their ability to reduce the complexity and cost of managing computers and networks. Cloud applications are run in virtualized environments such as virtual machines and containers to be able to allocate resources in an inexpensive manner. Both of these approaches require effective resource utilization, for which an important enabling technology is live migration, which involves moving a service from one host to another with the mini...
Database security in private database clouds
Çınar, Onur; Yazıcı, Adnan; Baykal, Nazife; Department of Information Systems (2015)
Cloud computing and systems are very popular in today’s Information Technology and Systems and have grown extremely. Cloud computing helps organizations solve increasing IT costs such as their licenses,power consumption,physical protection,by providing better standardization,higher benefit,greater performance,and quick responses of information services. This thesis presents the study of ensuring database security in cloud computing, protecting data especially from internal attacks, and managing high volumes ...
A secure model for efficient live migration of containers
Mavus, Zeynep; Angın, Pelin (2019-09-01)
Cloud services have become increasingly widespread in the past decade due to their ability to reduce the complexity and the cost of managing computers and networks. Cloud applications are run in virtualized environments such as virtual machines and containers to be able to allocate resources in an inexpensive manner. Both of these approaches require effective resource utilization, for which an important enabling technology is live migration, which involves moving a service from one host to another with the ...
Homomorphic encryption for data security in cloud computing
Wainakh, Asndar; Akyıldız, Ersan; Cenk, Murat; Department of Cryptography (2018)
Recently, cloud computing has grown into a popular aspect of the IT industry. Cloud computing provides a range of hardware and software resources to its customers,which they can access through the internet. With the rapid development of cloud computing, various security issues related to confidentiality, and integrity are appearing. Traditional encryption techniques provide security to data while it is stored and transmitted, but not while it is processed. Hence traditional encryption techniques are not enou...
Citation Formats
U. Şener, E. Gökalp, and P. E. Eren, “Cloud-Based Enterprise Information Systems,” Druskininkai, LITHUANIA, 2016, vol. 639, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/30449.