Excellence in Research and Innovation for Humanity

International Science Index


Select areas to restrict search in scientific publication database:
10003597
An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective
Abstract:
This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.

References:

[1] Adib, M. and Brohi, S. (2011). Exploring the Cloud Deployment and Service Delivery Models. International Journal of Research and Reviews in Information Sciences (IJRRIS), (online) 1(3), pp.77-80. Available at: http://www.academia.edu/4877212/Exploring_the_Cloud_Deployment_and_Service_Delivery_Models (Accessed 26 Nov. 2015).
[2] Aljabre, A. (2012). Cloud Computing for Increased Business Value. International Journal of Business and Social Science, 3(1), pp. 234–239.
[3] Avram, M. (2014). Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective. Procedia Technology, (online) 12, pp.529-534. Available at: http://ac.els-cdn.com/S221201731300710X/1-s2.0-S221201731300710X-main.pdf?_tid=44631b78-955c-11e5-b393-00000aab0f02&acdnat=1448666102_6b7c444fc5ebb3f724d3a0d8a4bffcde (Accessed 25 Nov. 2015).
[4] Bill Taylor, G. S. (2006). Research Methodology: (A Guide for Researchers in Management and Social Sciences). India: Asoke K. Ghosh, Prentice-Hall.
[5] Burges, R. G. (2005). The Ethics of Educational Research. The Falmer Press, UK.
[6] Burnard P. (1996) Teaching the analysis of textual data: an experi-ential approach. Nurse Education Today 16, 278–281.
[7] Burns N. & Grove S.K. (2005) The Practice of Nursing Research: Conduct, Critique & Utilization. Elsevier Saunders, St Louis.
[8] Chinn P.L. & Kramer M.K. (1999) Theory and Nursing a Systematic Approach. Mosby Year Book, St Louis.
[9] Consortium, T. N. (2011). The Horizon Report. USA: The New Media Consortium and EDUCAUSE Learning Initiative.
[10] Carroll, M., Kotzé, P. and van der Merwe, A. (2012). Securing Virtual and Cloud Environments. Cloud Computing and Services Science, pp.73-90.
[11] Chaudhari, D. and Rumale, A. (2013). Cloud Computing: Infrastructure as a Service. International Journal of Inventive Engineering and Sciences (IJIES), (online) 1(3), pp.1-7. Available at: http://www.ijies.org/attachments/File/v1i3/C0130021313.pdf (Accessed 27 Nov. 2015).
[12] Chowdhury, R., Mahato, S., Agrawal, S. and Mishra, R. (n.d.). Cloud Computing: A Review of Security Related Issues. 1st ed. (ebook) pp.1-19. Available at: http://www.hctl.org/ebooks/cloud-computing/chapter-12.pdf (Accessed 25 Nov. 2015).
[13] Dimitrios Zissis, Dimitrios Lekkas, Department of Product and Systems Design Engineering, University of the Aegean, Syros 84100, Greece (2012).
[14] Diogo A. B. Fernandes Liliana F. B. Soares · Joao V. Gomes · Mario M. Freire Pedro R. M (2013). In ́acio, International Journal of Information Security (IJIS).
[15] Downe-Wamboldt, B., (1992). Content analysis: method, applica-tions, and issues. Health Care for Women International 13 (3), 313–321.
[16] Eisenhardt, K. M. (1989). Building Theories from Case Study Research. Academy of Management. The Academy of Management Review.
[17] Elo, S., & Kynga, H. (2007). The qualitative content analysis process. Journal of Advanced Nursing, 107 - 115.
[18] Fielding, N. G., & Lee, R. M. (1998). Computer analysis and qualitative research. Thousand Oaks, CA: Sage.
[19] Franzosi, R. (2008). Content analysis: Objective, systematic, and quantitative description of content. SAGE benchmarks in social research methods: Content analysis, 2-43.
[20] Graneheim, U. H., & Lundman, B. (2004). Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. Nurse Education Today, 24, 105 - 112.
[21] Hashemi, S. and Bardsiri, A. (2012). Cloud Computing Vs. Grid Computing. ARPN Journal of Systems and Software, (online) 2(5), pp.188-194. Available at: http://scientific-journals.org/journalofsystemsandsoftware/archive/vol2no5/vol2no5_4.pdf (Accessed 26 Nov. 2015).
[22] Kondracki, N.L., Wellman, N.S., Amundson, D.R., (2002). Content analysis: review of methods and their applications in nutri-tion education. Journal of Nutrition Education and Behaviour 34 (4), 224–230.
[23] Leech, Nancy L., and Anthony J. (2011), Onwuegbuzie. 'Beyond Constant Comparison Qualitative Data Analysis: Using Nvivo.'. School Psychology Quarterly 26.1: 70-84. Web.
[24] McKendrick, J.: 7 Predictions for Cloud Computing in (2013), That Make Perfect Sense Forbes.
[25] Mei Li, (2013). Trunki Packs up Sage and Rolls over to Netsuite Cloud. (online) Available at: http://www.netsuite.com/portal/uk/press/releases/nlpr06-26-13.shtml (Accessed 25 Nov. 2015).
[26] Mei Li, (2015). Maclaren Turns to Netsuite Suitecommerce to Run Global B2B and B2C Commerce. (online) Available at: http://www.netsuite.com/portal/company/pressreleases/06-01-15b.shtml (Accessed 25 Nov. 2015).
[27] Mei Li, (2015). Whsmith Transforms Global Franchise Business with Netsuite and Accenture. (online) Available at: http://www.netsuite.co.uk/portal/uk/company/pressreleases/10-06-15b.shtml (Accessed 23 Nov. 2015).
[28] Mell, P. and Grance, T. (2011). The NIST definition of Cloud Computing. NIST, Special publication 800-145, Gaithersburg, MD.
[29] Mohammad Sajid, Zahid Raza (2013) - "Cloud Computing: Issues & Challenges" - International Conference on Cloud, Big Data and Trust, Nov 13-15, RGPV.
[30] Moore, Philip., Xhafa, Fatos., Sharma, Mak., (2015). Cloud-Based Monitoring for Patients with Dementia. Pages 213-239 In Advanced Technological Solutions for E-Health and Dementia Patient Monitoring.
[31] Moore. Philip., Sharma. Mak., (2013). Enhanced Patient Monitoring in a Hospital Setting. IT Convergence Parctice. 1(3), 1-21. Retrieved November 2015 from http://isyou.info/inpra/papers/inpra-v1n3-01.pdf
[32] Polit D.F. & Beck C.T. (2004) Nursing Research. Principles and Methods. Lippincott Williams & Wilkins, Philadelphia, PA.
[33] Robson C. (1993) Real World Research. A Resource for Social Scientists and Practitioner–Researchers. Blackwell Publishers, Oxford.
[34] Sahu, B. and Tiwari, R. (2012). A Comprehensive Study on Cloud Computing. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9), pp.33-37.
[35] Singh, A. (2015). An Overview of Cloud Computing. International Journal of Advanced Research in Computer and Communication Engineering, 4(7), pp.407-409.
[36] Subashini, S., Kavitha, V. (2010): A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications 34(1), 1–11 (2011). DOI 10.1016/j.jnca.2010.07.006
[37] Schram, T. H. (2003). Conceptualizing qualitative in-quiry: Mindwork for fieldwork in education and the social sciences. Upper Saddle River, NJ: Pearson.
[38] Simons, H. (2009). Cast study Research in Practice. London: Sage Publications Limited.
[39] Tharindu Rekha Liyanagunawardena, A. A. (2013). MOOCs: A Systematic Study of the Published Literature 2008-2012. Irrodl.
[40] T. Brooks, C. Caicedo and J. Park, (2012) “Security Challenges and Countermeasures for Trusted Virtualized Computing Environments” School of Information Studies (iSchool) Syracuse University, Syracuse, NY, USA, World Congress on Internet Security (WorldCIS).
[41] Varsha, D., Whadhwa, A. and Gupta, S. (2015). Study fo Security Issues in Cloud Computing. International Journal of Computer Science and Mobile Computing, (online) 4(6), pp.230-234. Available at: http://ijcsmc.com/docs/papers/June2015/V4I6KJ07.pdf (Accessed 26 Nov. 2015).
[42] Verificient, (2015). Automated Remote Proctoring Solutions, Proctortrack. (Online) Available at: http://www.proctortrack.com/
[43] Yin, R. K. (2012). Applications of Case Study Research. United States of America: Sage Publications, Inc.
Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007