Risk Management Strategies For Cloud Computing Solutions In Kooheji Group

Benefits of cloud computing for enterprises

The research proposal is based on risk management strategies for using in the cloud solutions. The study is based on business context; therefore the selected organization for this proposal is Kooheji Group. The organization began its operations in the year 1985 as the trading house. Due to economics of the scale, the cloud providers have potential to provide state-of-the-art cloud to manage the entire business systems (Rittinghouse and Ransome 2016). Cloud based information systems are being exposed to the threats which can affect the business operations of Kooheji Group. The enterprises have low cost, save of energy and upgrade the system by replacement of traditional computer systems.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The rationale of this study is that this selected topic helps to identify data losses to the cloud computing services with use of risk management strategies. Based on this research study, advantages of the cloud computing is a best solution lead to cost effective solution to identify and mitigate the risks into a project work. The main context of this paper is to analyze the data loss which results into data corrupted, deleted as well as unreadable by the user as well as software application. It is occurred when one or more data elements are not utilized by means of data owner (Garrison, Wakefield and Kim 2015). The cloud service providers are balancing responsibility for maintenance of data integrity with delivering of a cost effective solutions to the customers, while there is protection of data assets as well as bottom line. In this study, the data losses are data destruction, corruption as well as unauthorized data access. Reasons for those data losses are infrastructure malfunctions, error into software as well as security breaches. Due to complexity into the cloud security, there is corruption of data.  

The aim of this study is to identify the data losses exposure to the cloud computing and recommend of the risk management strategies employed for controlling and reducing losses to the application of cloud computing. It is provided with required information to the administrators for supporting decision making risk management. Following are the research objectives such as:

  • To identify the risks into the cloud computing
  • To analyze benefits regarding charge in addition to safety for the enterprises to implement of cloud computing
  • To recommend of risk management strategies used in the cloud computing solutions

As the cloud computing is one of the technologies and it has greater projects due to price as well as computational offers. The research is being conducted based on the issues related to cloud computing. Therefore, the selected research questions for this study are:

The main purpose of this study is to identify as well as analyze the risks related to the cloud computing. There is a combination of the risk management matrix to provide implications for this particular study. In order to accomplish the investigate objectives; the study is focused on primary data collection methods (Lewis 2015). The selected method for the primary data collection is survey questionnaire. In this study, the researcher has taken of standard questionnaire for self-assessment of the risks into the cloud computing solutions. The structured questionnaire is being driven by the researcher based on the risk analysis factors and risk management into telecom organization from the literature review (Chen et al. 2015). The questionnaire for the survey is being developed with guidance for the research guides as well as discussion of the professionals into the risk management in Kooheji Group. The questionnaire is being tested by contacting with the employees of selected organization, ease of usage as well as value of data which are gathered.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Losses and exposures to cloud computing in business organizations

The current study is being made based on the data collected with employ of primary sources. The data are being collected through structured questionnaire from various employees those are working into Kooheji Group. The researcher has selected the participants with a number of 80. The structured questionnaire is being distributed among the employees in online mode. It is approached personally to get the questionnaire filled (Cleary, Horsfall and Hayter 2014). The questions are employed to know about the risk management strategies adopted by the business enterprises. Survey presents set of questions and based on questions the respondents will provide data to researcher. It ensures that the researcher has captured all the required information based on selected research topic. The survey questionnaires are distributed among the employees where they provided their responses for each respective question. 

The data are to be collected enter into the excel sheet. The data which are entered are classified based on the project requirements. The data analysis selected for this study is quantitative methods which is best to apply for the research problems (Flick 2017). This selected data analysis method helps the researcher to examine relationship among two variables. The data sets are interpreted by use of regression analysis. By use of this data analysis method, it is expected to turn raw numbers into data through application of rationale. This method is associated to find evidence to support or reject hypothesis that it is formulated at earlier stages. The primary data findings are analyzed and interpreted throughout comparing the findings with framework of same research work. Therefore, the statistical method used in this study is regression analysis. It is set of statistical processes to estimate relationships among the variables. In order to answer questions using regression analysis, the researcher should look throughout coefficients as well as p-values. When there is low p-value (<0.05), then thee independent variables is statistically significant. Coefficients are representing average change into the dependent variable provider change into the independent variable. P-values help to determine whether the relations that the researcher observed into sample also existed into larger population.           

The list of population for this particular learning is taken from the Kooheji Group. The random sampling method is used for this study. Simple random sampling method is selected for this study from larger population (Hanvey 2018). Each of the participants for this study is selected by chance as well as each participant of population is equal chance to include into the sample. The sample size is 80. The participants are selected from the employees those are working into Kooheji Group.   

Possible risk management strategies for cloud computing solutions

The value of this research is to discover out the benefits of regarding price plus data security for the organizations to implement of cloud computing. Almorsy, Grundy and Muller (2016) discussed that the enterprise is used of cloud computing for implementing as well as managing the information system. There is a concluding factor in terms of the cost as well as security; the enterprise is adopted of cloud computing for effective use of the business system. Cleary, Horsfall and Hayter (2014) proposed that while implementation of the cloud computing solutions; there are lot of possibility that the risks are caused which will provide an effect on profitability and productivity of the organization. Therefore, the business enterprises should adopt of risk management strategies which help to prevent and overcome with the risks in organization. There are main risks which are open for the discussion on this study in the literature review part. Pearlson, Saunders and Galletta (2016) described the requirements which are taken into account to protect the cloud computing users. The risk management strategies are used to control the risks where the data are gets leaked to the project competitors which may hamper the business reputation.

The proposal is based on focusing on the risks on the clients of the cloud computing. Hsu, Ray and Li-Hsieh (2014) analyzed that the providers are in scope of this research study as they are guaranteed with the security. It is analyzed that cloud computing is useful as it is consisted of financial benefits as well as increases into flexibility of the smaller associations. The scope of this study is to identify the risks and recommend of risk management strategies use of cloud computing. The cloud computing is malformed the method the businesses are operated, but before the organization can tackle with the risks, it is required to adopt of risk management strategies for the organization. There are various risks which are identified and addressed into the literature study such as investment, safety, supply chin, budget, security and others. Mustafa et al. (2015) investigated that the risk management is viewed as an activity which is integrated into aspect of the selected organization. Therefore, proper risk management strategies are used to mitigate the risks which are occurred in business operations, so that there is successful implementation of information system. It helps to increase the competition in the marketplace and also productivity of business.

Figure 1: Gantt chart

(Source: Created by author)

The cloud computing is required the users to run the programs via the server and computer that is required of proximity. Avram (2014) stated that the modern era is being taken the internet and changed the way the enterprises are handling the businesses. Oliveira, Thomas and Espadanal (2014) analyzed that increase into the use of cloud services will also increase the risks into the business. There are risks into the business due to reliability as well as product’s authenticity and services is designed with the cloud computing such as issues related to data security along with copyrights. The major concern related to the cloud computing services is data security. Rittinghouse and Ransome (2016) proposed that the service providers are ensured that new as well as existing features of system entails an update into audit as well as compliance security. The activities into cloud are monitored as well as audited by the third party to make sure that the security standards are being met with the business requirements.    

Apart from the benefits of the cloud computing, there are also risks which are related with the cloud computing services. Into the traditional model related to the on-premises application, there are sensitive data which are resided into the enterprise and subject towards physical as well as personal safety controls. In the cloud computing models, the enterprise data are being stored as external. Gangwar, Date and Ramaswamy (2015) stated that malicious users can able to exploit into the data security model for gaining of unauthorized access to the data in addition to cloud computing vendors. Security measures are adopted to prevent from the data breaches. Phaphoom et al. (2015) argued that employ of the cloud computing services are implied the scheme vulnerability which are linked with the malicious employees. Hsu, Ray and Li-Hsieh (2014) discussed that all the security breaches are not resulted from the cloud computing services. One of the examples is use of weak security passwords and default password to log into the network and email platform. Following are the risks which are related with the cloud computing services such as:

Privacy risks: The business organizations which are used of cloud computing services have legal problems connected to the privacy as well as agreement risks. The cloud infrastructure has addressed confronts beyond the issues related to traditional methods such as remote access, transfer of data in addition to intrusion detections. Chang, Kuo and Ramachandran (2016) noted that the cloud computing has innovative physical data storage that can store of data from various clients into one physical devices.

Unauthorized access to the business data: The cloud services are aggregated of data from the business organizations, and the business is believed that there are pushing towards risks to protect the data. Ali, Khan and Vasilakos (2015) stated that each of the businesses those are using of cloud computing services increase value of service as the potential target. It is concentrate towards the risks on the single point of business failures. The cloud computing risks are accessible by the insider threats.

 The researcher is focused on three perspectives on assessment of the risks into the cloud computing. The first is proposed on the risk assessment framework that is used by the cloud consumers. Khan and Al-Yasiri (2016) suggested that in some cases, the risks are being transferred to the cloud provider. The cloud provider manages the infrastructure of IT and cannot disclose the security models as well as procedures. The proposed risks by the researcher in section 2.2 are assessed from the side of cloud provider without taking account of the involvement of cloud consumers. When the consumers are involved into the risk assessment process, then various proposed risk assessment frameworks are being used.

Risk management by cloud consumers: Etro (2015) presented quantitative framework through which the impact as well as risks related to the cloud security are being assessed with use of risk management strategies. Alhammadi, Stanier and Eardley (2015) added three of the security objectives in context of the cloud platforms such as proper trust, audit ability as well as usability. It is considered that risk factors into the cloud computing are taken from viewpoint of the consumers. In terms to analyze the identified risks, risk matrix is used where the risks are categorized based on probability and impact. Proper countermeasures are taken based on the outcomes.

Risk management by cloud provider: Botta et al. (2016) presented of information risk management framework which is covered of cloud service models as well as deployment models. This particular framework is based on ISO/IEC 27001 standards. Jones et al. (2017) focused on the critical areas of the cloud computing that are protected as well as designed to meet with the security objectives of informational assets.

Type of risk

Description

Impact

Likelihood

Probability

Risk level

Mitigation of risks

Risk owner

Privacy

The business organizations which are used of cloud computing services have legal risks associated to the privacy as well as agreement risks

Moderate

Medium

Moderate

Medium

The confidential data should be kept password protected into the organizational database system.

Risk Manager

Unauthorized access to the business data

The cloud services are aggregated of data from the business organizations, and the business is believed that there are pushing towards risks to protect the data.

Major

High

Likely

High

The data are not permissible to access by any unauthorized access; therefore the authorized user only should have accessibility.

Risk Manager

Flick (2017) stated that the research work is defined as data collection which helps the researcher to get answer to the research questions about different aspects into concern subject. This work is asked to provide answers to the questions of the theoretical interest to specific discipline. The research methods and approaches are used to ensure that proper methods are to be used to understand the selected research topic. The research related to the theories along with concepts is to be taken into adoption that help to better understand of the topic. Hanvey (2018) argued that concepts of both validity as well as reliability provide criteria by which it is required to judge the research methods. This particular research work is not considered as academic activities but it is applied to respect to the human activity. It is based to make decision efficient and also significant. It is included to define research problems, collection of data, analyze data and arriving to a conclusion.

Malterud, Siersma and Guassora (2016) cited that the research philosophy helps to select sources while development of information and knowledge related to the study. Based on the selected research topic, positivism is selected which help to analyze the hidden facts related to risk management strategies used to prevent from the data losses.

The application of research approaches reveal needed format to conduct the study based on selected topic. According to Jorgensen (2015), deductive approach is selected for this study to determine validity of selected research objectives. The practical application and theories are used to prove the objectives. It is used of data analysis processes to get better and in-depth research results.

Lewis (2015) discussed that there are two sources for review such as primary and secondary review. The primary review is consisted of report by original researchers for this study. Secondary review is described by somebody other than real researcher. It is consisted of review of journal article, academic journal articles and conference proceedings. Primary data analysis method is used to provide detailed information which is related to selected topic that assisted to provide data accuracy along with review of standard of this research study.

The researcher is conducted of quantitative data analysis techniques which are used to get primary data sources. Jorgensen (2015) examined that the application related to qualitative data analysis help to provide of theoretical concepts of the risk management strategies for use of cloud computing solutions. This method is provided of statistical results to gathered data from the data collection process. This method is basically used to interpret of data which are collected in form of the narration.  

Collected data are analyzed by use of data analysis methods and this study is based on regression analysis. McCusker and Gunaydin (2015) concluded that this data analysis method is statistical technique used for describing relations among the variables. There are two variables regression model assigns one of them variables status of independent and other variable status of dependent variable. Simplest case to examine is one which is variable Y referred to as dependent variable and related to one variable X, referred to as independent variable. The researcher collected the raw data used into the primary sources to prove as well as analyze validity of developed hypothesis. Malterud, Siersma and Guassora (2016) proposed that in order to analyze the data, the researcher has taken assistance of the regression analysis statistical tool to analyze both reliability as well as validity. Based on the regression model, the researcher identified both of dependent as well as independent variables presented into the study. Regression analysis is consisted of:

Dependent variable = A + B * Independent variable;

Where;

A = Intercept of Linear Regression Model

B = Coefficient of Independent Variable

References

Alhammadi, A., Stanier, C. and Eardley, A., 2015. The determinants of cloud computing adoption in Saudi Arabia.

Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges. Information sciences, 305, pp.357-383.

Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, pp.529-534.

Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.

Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.

Chen, X., Fang, H., Lin, T.Y., Vedantam, R., Gupta, S., Dollár, P. and Zitnick, C.L., 2015. Microsoft COCO captions: Data collection and evaluation server. arXiv preprint arXiv:1504.00325.

Cleary, M., Horsfall, J. and Hayter, M., 2014. Data collection and sampling in qualitative research: does size matter?. Journal of advanced nursing, 70(3), pp.473-475.

Etro, F., 2015. The economics of cloud computing. In Cloud Technology: Concepts, Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.

Flick, U. ed., 2017. The SAGE handbook of qualitative data collection. SAGE.

Garrison, G., Wakefield, R.L. and Kim, S., 2015. The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 35(4), pp.377-393.

Hanvey, C., 2018. Data Collection Methods. In Wage and Hour Law (pp. 19-46). Springer, Cham.

Jones, S., Irani, Z., Sivarajah, U. and Love, P.E., 2017. Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information Systems Frontiers, pp.1-24.

Jorgensen, D.L., 2015. Participant observation. Emerging trends in the social and behavioral sciences: An interdisciplinary, searchable, and linkable resource, pp.1-15.

Khan, N. and Al-Yasiri, A., 2016. Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Computer Science, 94, pp.485-490.

Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), pp.473-475.

Malterud, K., Siersma, V.D. and Guassora, A.D., 2016. Sample size in qualitative interview studies: guided by information power. Qualitative health research, 26(13), pp.1753-1760.

McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed methods and choice based on the research. Perfusion, 30(7), pp.537-542.

Mustafa, S., Nazir, B., Hayat, A. and Madani, S.A., 2015. Resource management in cloud computing: Taxonomy, prospects, and challenges. Computers & Electrical Engineering, 47, pp.186-203.

Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), pp.497-510.

Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.

Phaphoom, N., Wang, X., Samuel, S., Helmer, S. and Abrahamsson, P., 2015. A survey study on major technical barriers affecting the decision to adopt cloud services. Journal of Systems and Software, 103, pp.167-181.

Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.