Retrieved from https://studentshare.org/finance-accounting/1416633-information-managment
https://studentshare.org/finance-accounting/1416633-information-managment.
The article after providing a brief background of the Cloud Computing technology, focuses on its evolutionary path. “This paper examines cloud computing in the context of other major changes in Information Technology (IT) and explores the revolutionary transformations and challenges it brings to IT management.” (Bento and Bento 39). The authors divide the evolution into six phases starting from 1970’s, when the IT systems in organizations got centralized, particularly regarding the financial and accounting information.
They further delve into these phases by discussing how advancement in hardwares, softwares and most prominently Worldwide Web, led to the development of Cloud Computing. Discussion of each phase provides good information and appears to be the strong “phases” of this article. The next part of the article provides number of definitions for Cloud Computing and high number of definitions appears to be a slight weaker part in the article. Although, giving high number of definitions can gave different perspectives of Cloud Computing, the article has too much definitions and it occupies sizable part of the article, minimizing the other topics.
For example, details about how one works in the Cloud has been given only in a minimal manner. In the final part of the article, the author again relates the various evolutionary phases with the business environment. Although, it gives somewhat newer perspectives, it appears to be a kind of repetition of the first part. So, the author could have researched and written more about Cloud Computing applications, instead of giving background information maximally. Critique of the Second Article- Although, this IS based technology, Cloud computing has many benefits including cutting of costs, reorienting work force in other departments, etc, there are some security issues.
These security issues is only focused in the journal article, A survey on security issues in service delivery models of Cloud Computing written by S. Subashini and V. Kavitha. The authors list out the various ways in which the information or data stored in the Cloud could be compromised and that includes issues with Data security, Network security, Data integrity, Data segregation, Web application security Vulnerability in virtualization, etc, etc. The authors start off by providing an apt introduction about Cloud Computing and its optimum application in business enterprises.
They provide facts of how cloud computing will grow to $95 billion and that 12% of the worldwide software market will move to the cloud (Subashini and Kavitha 2). Then the authors move into the focus area of security issues, listing and discussing in-depth each security issue. The main strength of this article is that it does not miss any security issue that could plague the Cloud Computing environment. The authors focus on all the probable security issues, even providing real-life examples of companies at some places.
However, this can also be viewed as a weakness, because there is not much real-life examples. Only the example of Amazon’s Cloud Computing environment is given at some places, and not much about other companies. Even while, discussing about the probable security issues and the corrective steps, the authors are skeptical whether a new paradigm or model of Cloud Computing will work. They state, that “A new model targeting at improving features of an existing
...Download file to see next pages Read More