Skip to main content
Erschienen in: Global Journal of Flexible Systems Management 1/2022

03.11.2021 | Original Research

Identifying Cloud Computing Risks based on Firm’s Ambidexterity Performance using Fuzzy VIKOR Technique

verfasst von: Mohammad Taghi Taghavifard, Setareh Majidian

Erschienen in: Global Journal of Flexible Systems Management | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has become a disruptive technology in recent years which brings numerous benefits to enterprises; however, as any other technology it is accompanied with some risks. Firms can achieve competitive advantage if they simultaneously explore new opportunity and exploit their existing knowledge and capabilities through investing on cloud computing. However, cloud computing risks can hamper these abilities. Applying the ambidexterity theoretical lens, we have provided evidence that potential cloud computing risks play a significant role on firms’ performance in two integral aspects of explorative and exploitative innovation. To address this objectives, fuzzy VIKOR technique has been deployed in which the fuzzy approach helps experts to express their opinion using linguistic variables and VIKOR technique ranks cloud computing risks considering ambidexterity criteria. The results show that how each cloud computing risk can disable firms from achieving innovative performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Amini, A., Jamil, N., Ahmad, A.R., Sulaiman, H. (2018) A fuzzy logic based risk assessment approach for evaluating and prioritizing risks in cloud computing environment. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A., Mohammed, F. (Eds.). Recent Trends in Information and Communication Technology. IRICT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 5. Springer, Cham. https://doi.org/10.1007/978-3-319-59427-9_67 Amini, A., Jamil, N., Ahmad, A.R., Sulaiman, H. (2018) A fuzzy logic based risk assessment approach for evaluating and prioritizing risks in cloud computing environment. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A., Mohammed, F. (Eds.). Recent Trends in Information and Communication Technology. IRICT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 5. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-319-59427-9_​67
Zurück zum Zitat Benitez, J., Castillo, A., Llorens, J., & Braojos, J. (2018). IT-enabled knowledge ambidexterity and innovation performance in small U.S. firms: The moderator role of social media capability. Information & Management, 55(1), 131–143.CrossRef Benitez, J., Castillo, A., Llorens, J., & Braojos, J. (2018). IT-enabled knowledge ambidexterity and innovation performance in small U.S. firms: The moderator role of social media capability. Information & Management, 55(1), 131–143.CrossRef
Zurück zum Zitat Bhardwaj, A., & Goundar, S. (2019). A framework to define the relationship between cyber security and cloud performance. Computer Fraud & Security, 2019(2), 12–19.CrossRef Bhardwaj, A., & Goundar, S. (2019). A framework to define the relationship between cyber security and cloud performance. Computer Fraud & Security, 2019(2), 12–19.CrossRef
Zurück zum Zitat Birkinshaw, J., & Gibson, C. (2004). Building ambidexterity into an organization. MIT Sloan Management Review, 45(4), 47–55. Birkinshaw, J., & Gibson, C. (2004). Building ambidexterity into an organization. MIT Sloan Management Review, 45(4), 47–55.
Zurück zum Zitat Boutkhoum, O., Hanine, M., Agouti, T., & Tikniouine, A. (2016). Selection problem of cloud solution for big data accessing: fuzzy AHPPROMETHEE as a proposed methodology. Journal of Digital Information Management, 14(6). Boutkhoum, O., Hanine, M., Agouti, T., & Tikniouine, A. (2016). Selection problem of cloud solution for big data accessing: fuzzy AHPPROMETHEE as a proposed methodology. Journal of Digital Information Management, 14(6).
Zurück zum Zitat Boutkhoum, O., Hanine, M., Agouti, T., et al. (2017). A decision-making approach based on fuzzy AHP-TOPSIS methodology for selecting the appropriate cloud solution to manage big data projects. International Journal of Systems Assurance Engineering and Management, 8, 1237–1253. https://doi.org/10.1007/s13198-017-0592-xCrossRef Boutkhoum, O., Hanine, M., Agouti, T., et al. (2017). A decision-making approach based on fuzzy AHP-TOPSIS methodology for selecting the appropriate cloud solution to manage big data projects. International Journal of Systems Assurance Engineering and Management, 8, 1237–1253. https://​doi.​org/​10.​1007/​s13198-017-0592-xCrossRef
Zurück zum Zitat Brown, L. (2010). Balancing risk and innovation to improve social work practice. British Journal of Social Work, 40, 1211–1228.CrossRef Brown, L. (2010). Balancing risk and innovation to improve social work practice. British Journal of Social Work, 40, 1211–1228.CrossRef
Zurück zum Zitat Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving—Results from an empirical study. The Journal of High Technology Management Research, 25(2), 172–187.CrossRef Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving—Results from an empirical study. The Journal of High Technology Management Research, 25(2), 172–187.CrossRef
Zurück zum Zitat Duncan, R. B. (1976). The ambidextrous organization: Designing dual structures for innovation. The Management of Organization. Duncan, R. B. (1976). The ambidextrous organization: Designing dual structures for innovation. The Management of Organization.
Zurück zum Zitat Elzamly, A., Hussin, B., & Basari, A. (2016). Classification of critical cloud computing security issues for banking organizations: A cloud Delphi study. International Journal of Grid and Distributed Computing, 9(8), 137–158. ISSN 2005-4262. Elzamly, A., Hussin, B., & Basari, A. (2016). Classification of critical cloud computing security issues for banking organizations: A cloud Delphi study. International Journal of Grid and Distributed Computing, 9(8), 137–158. ISSN 2005-4262.
Zurück zum Zitat Evans, S., & Bahrami, H. (2020). Super-Flexibility in Practice: Insights from a Crisis. Global Journal of Flexible Systems Management, 21(3), 207–214.CrossRef Evans, S., & Bahrami, H. (2020). Super-Flexibility in Practice: Insights from a Crisis. Global Journal of Flexible Systems Management, 21(3), 207–214.CrossRef
Zurück zum Zitat Garrison, G., Wakefield, R., & Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 377–393. Garrison, G., Wakefield, R., & Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 377–393.
Zurück zum Zitat Ghallab, A., Saif, M. H., & Mohsen, A. (2021). Data integrity and security in distributed cloud computing—a review. In V. K. Gunjan, & Zurada, J. M. (Eds.), Proceedings of international conference on recent trends in machine learning, IoT, smart cities and applications. Advances in intelligent systems and computing (Vol. 1245). Springer. https://doi.org/10.1007/978-981-15-7234-0_73 Ghallab, A., Saif, M. H., & Mohsen, A. (2021). Data integrity and security in distributed cloud computinga review. In V. K. Gunjan, & Zurada, J. M. (Eds.), Proceedings of international conference on recent trends in machine learning, IoT, smart cities and applications. Advances in intelligent systems and computing (Vol. 1245). Springer. https://​doi.​org/​10.​1007/​978-981-15-7234-0_​73
Zurück zum Zitat Gupta, A., Siddiqui, S., Alam, S., Shuaib, M. (2019). Cloud computing security using blockchain. Journal of Emerging Technologies and Innovative Research, 6(6). Gupta, A., Siddiqui, S., Alam, S., Shuaib, M. (2019). Cloud computing security using blockchain. Journal of Emerging Technologies and Innovative Research, 6(6).
Zurück zum Zitat Jafari-Sadeghi, V., Garcia-Perez, A., Candelo, E., & Couturier, J. (2021). Exploring the impact of digital transformation on technology entrepreneurship and technological market expansion: The role of technology readiness, exploration and exploitation. Journal of Business Research, 95, 106557. https://doi.org/10.1016/j.asoc.2020.106557CrossRef Jafari-Sadeghi, V., Garcia-Perez, A., Candelo, E., & Couturier, J. (2021). Exploring the impact of digital transformation on technology entrepreneurship and technological market expansion: The role of technology readiness, exploration and exploitation. Journal of Business Research, 95, 106557. https://​doi.​org/​10.​1016/​j.​asoc.​2020.​106557CrossRef
Zurück zum Zitat Jansen, J. J. P., Van den Bosch, F. A. J., & Volberda, H. W. (2005). Exploratory innovation, exploitative innovation, and ambidexterity: The impact of environmental and organizational antecedents. Schmalenbach Business Review, 57, 351–363. https://doi.org/10.1007/BF03396721CrossRef Jansen, J. J. P., Van den Bosch, F. A. J., & Volberda, H. W. (2005). Exploratory innovation, exploitative innovation, and ambidexterity: The impact of environmental and organizational antecedents. Schmalenbach Business Review, 57, 351–363. https://​doi.​org/​10.​1007/​BF03396721CrossRef
Zurück zum Zitat Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759–775.CrossRef Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759–775.CrossRef
Zurück zum Zitat Kavitha, S., Bora, A., Naved, M., Bhavana Raj, K., Bhaludra, R., & Singh, N. (2021). An internet of things for data security in cloud using artificial intelligence. International Journal of Grid and Distributed Computing, 14(1), 1257–1275. Kavitha, S., Bora, A., Naved, M., Bhavana Raj, K., Bhaludra, R., & Singh, N. (2021). An internet of things for data security in cloud using artificial intelligence. International Journal of Grid and Distributed Computing, 14(1), 1257–1275.
Zurück zum Zitat Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud computing adoption framework. In The 2nd international workshop on internet of thing: Networking applications and technologies (IoTNAT’ 2016). Procedia Computer Science (pp. 485–490). Khan, N., & Al-Yasiri, A. (2016). Identifying cloud security threats to strengthen cloud computing adoption framework. In The 2nd international workshop on internet of thing: Networking applications and technologies (IoTNAT’ 2016). Procedia Computer Science (pp. 485–490).
Zurück zum Zitat Khanmohammadi, E., Zandieh, M., & Tayebi, T. (2019). Drawing a Strategy Canvas Using the Fuzzy Best–Worst Method. Global Journal of Flexible Systems Management, 20(1), 57–75.CrossRef Khanmohammadi, E., Zandieh, M., & Tayebi, T. (2019). Drawing a Strategy Canvas Using the Fuzzy Best–Worst Method. Global Journal of Flexible Systems Management, 20(1), 57–75.CrossRef
Zurück zum Zitat Manzurul Islam, M., Morshed, S., & Goswami, P. (2013). Cloud computing: A survey on its limitations and potential solutions. International Journal of Computer Science, 10(4): 2 Manzurul Islam, M., Morshed, S., & Goswami, P. (2013). Cloud computing: A survey on its limitations and potential solutions. International Journal of Computer Science, 10(4): 2
Zurück zum Zitat Osório, A.L. (2016). Towards vendor-agnostic IT-system of IT-systems with the CEDE platform. In H. Afsarmanesh, & Camarinha-Matos, L. S. (Eds.), Collaboration in a hyperconnected world, advances in information and communication technology (Vol. 480). Springer. https://doi.org/10.1007/978-3-319-45390-3_42. Osório, A.L. (2016). Towards vendor-agnostic IT-system of IT-systems with the CEDE platform. In H. Afsarmanesh, & Camarinha-Matos, L. S. (Eds.), Collaboration in a hyperconnected world, advances in information and communication technology (Vol. 480). Springer. https://​doi.​org/​10.​1007/​978-3-319-45390-3_​42.
Zurück zum Zitat Patel, K., & Alabisi, A. (2019). Cloud computing security risks: Identification and assessment. Journal of New Business Ideas & Trends, 17(2), 11–19. Patel, K., & Alabisi, A. (2019). Cloud computing security risks: Identification and assessment. Journal of New Business Ideas & Trends, 17(2), 11–19.
Zurück zum Zitat Peiyu, L., & Dong, L. (2011). The new risk assessment model for information system in cloud computing environment. Procedia Engineering, 15, 3200–3204.CrossRef Peiyu, L., & Dong, L. (2011). The new risk assessment model for information system in cloud computing environment. Procedia Engineering, 15, 3200–3204.CrossRef
Zurück zum Zitat Priyadarshinee, P., Kumar Jha, M., Raut, R., & Kharat, M. (2016). Risk analysis in adoption of cloud computing in SMEs—A literature review. International Journal of Business Information Systems, 23(1). Priyadarshinee, P., Kumar Jha, M., Raut, R., & Kharat, M. (2016). Risk analysis in adoption of cloud computing in SMEs—A literature review. International Journal of Business Information Systems, 23(1).
Zurück zum Zitat Rubab, K., Azhar, T., Anwar, M., & Majeed, S. (2020). Security threats in cloud computing: Trend and challenges. International Journal of Computing and Communications Networks, 2(1). Rubab, K., Azhar, T., Anwar, M., & Majeed, S. (2020). Security threats in cloud computing: Trend and challenges. International Journal of Computing and Communications Networks, 2(1).
Zurück zum Zitat Singh, S., Dhir, S., Evans, S., & Sushil (2021). The trajectory of two decades of global journal of flexible systems management and flexibility research: A bibliometric analysis. Global Journal of Flexible Systems Management, 22(4), 377–401.CrossRef Singh, S., Dhir, S., Evans, S., & Sushil (2021). The trajectory of two decades of global journal of flexible systems management and flexibility research: A bibliometric analysis. Global Journal of Flexible Systems Management, 22(4), 377–401.CrossRef
Zurück zum Zitat Smith, R. (2009). Computing in the cloud. Research Technology Management, 5, 65–68.CrossRef Smith, R. (2009). Computing in the cloud. Research Technology Management, 5, 65–68.CrossRef
Zurück zum Zitat Stamford, Conn. (2020). Proportion of enterprise IT spending on public cloud computing continues to increase. Gartner. Stamford, Conn. (2020). Proportion of enterprise IT spending on public cloud computing continues to increase. Gartner.
Zurück zum Zitat Swathy Akshaya, M., & Padmavathi, G. (2020). Taxonomy of security attacks and risk assessment of cloud computing. In J. Peter, Alavi, A., & Javadi, B. (Eds.), Advances in big data and cloud computing. Advances in Intelligent Systems and Computing (Vol. 750). Springer, Singapore. https://doi.org/10.1007/978-981-13-1882-5_4. Swathy Akshaya, M., & Padmavathi, G. (2020). Taxonomy of security attacks and risk assessment of cloud computing. In J. Peter, Alavi, A., & Javadi, B. (Eds.), Advances in big data and cloud computing. Advances in Intelligent Systems and Computing (Vol. 750). Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-13-1882-5_​4.
Zurück zum Zitat Tushman, M. L., & O’Reilly, C. A. (2006). The ambidextrous organizations: Managing evolutionary and revolutionary change. California Management Review, 38(4), 8–30.CrossRef Tushman, M. L., & O’Reilly, C. A. (2006). The ambidextrous organizations: Managing evolutionary and revolutionary change. California Management Review, 38(4), 8–30.CrossRef
Zurück zum Zitat Vaishnavi, V., & Suresh, M. (2020). Assessing the readiness level of healthcare for implementing agility using fuzzy logic approach. Global Journal of Flexible Systems Management, 21(2), 163–189.CrossRef Vaishnavi, V., & Suresh, M. (2020). Assessing the readiness level of healthcare for implementing agility using fuzzy logic approach. Global Journal of Flexible Systems Management, 21(2), 163–189.CrossRef
Zurück zum Zitat Vasiljeva, T., Shaikhulina, S., & Kreslins, K. (2017). Cloud computing: Business perspectives, benefits and challenges for small and medium enterprises (case of Latvia). In 16th Conference on reliability and statistics in transportation and communication (pp. 443–451). https://doi.org/10.1016/j.proeng.2017.01.087. Vasiljeva, T., Shaikhulina, S., & Kreslins, K. (2017). Cloud computing: Business perspectives, benefits and challenges for small and medium enterprises (case of Latvia). In 16th Conference on reliability and statistics in transportation and communication (pp. 443–451). https://​doi.​org/​10.​1016/​j.​proeng.​2017.​01.​087.
Zurück zum Zitat Venters, W., & Whitley, E. A. (2012). A critical review of cloud computing: Researching desires and realities. Journal of Information Technology, 27(3), 179–197.CrossRef Venters, W., & Whitley, E. A. (2012). A critical review of cloud computing: Researching desires and realities. Journal of Information Technology, 27(3), 179–197.CrossRef
Zurück zum Zitat Wang, T., & Chang, T. (2005). Fuzzy VIKOR as an aid for multiple criteria decision making. Institute of Information Management I-Shou University. Wang, T., & Chang, T. (2005). Fuzzy VIKOR as an aid for multiple criteria decision making. Institute of Information Management I-Shou University.
Metadaten
Titel
Identifying Cloud Computing Risks based on Firm’s Ambidexterity Performance using Fuzzy VIKOR Technique
verfasst von
Mohammad Taghi Taghavifard
Setareh Majidian
Publikationsdatum
03.11.2021
Verlag
Springer India
Erschienen in
Global Journal of Flexible Systems Management / Ausgabe 1/2022
Print ISSN: 0972-2696
Elektronische ISSN: 0974-0198
DOI
https://doi.org/10.1007/s40171-021-00292-8

Weitere Artikel der Ausgabe 1/2022

Global Journal of Flexible Systems Management 1/2022 Zur Ausgabe

Premium Partner