1 Introduction
2 Rise of cloud computing and its significance, risks and rewards
-
Infrastructure as a Service (IaaS): is a provision model offering the consumer outsourced processing, storage, networks, and other fundamental computing resources by cloud service providers such as IBM, Microsoft and Amazon’s EC2.
-
Platform as a Service (PaaS): is a service delivery model allowing the consumer to deploy consumer-created or acquired applications (e.g. operating systems, databases, Web servers, etc.) onto the cloud infrastructure.
-
Software as a Service (SaaS): is a software distribution model providing the consumer with the capability to use the provider’s applications running on a cloud infrastructure which are made available over the internet and accessible through a web browser. This type of cloud service offers complete application functionality that ranges from productivity applications (e.g., word processing, spreadsheets, etc.) to programs such as those for customer relationship management (CRM) or enterprise resource management (ERM).
2.1 Significance of cloud computing in the government context
2.2 Risks and rewards of cloud computing
-
strategic;
-
tactical; and
-
operational.
Classification | Factors | Description* |
---|---|---|
Strategic | • Centralisation of infrastructure | - Being able to centralise government infrastructure in locations with lower costs for example out-of-city centres. |
• Increased resilience | - The nature of cloud computing removes single points of failure and therefore provides a highly resilient computing environment for government organisations. | |
• Device and location independence | - The independence of device and location enables users to access systems using a web browser regardless of location or device. | |
• Release internal IT resources | - The reduction in the use government organisation’s own computer system and peripherals. | |
• Better Citizen Services | - Government organizations are redefining their businesses to deliver improved citizen services. For example, the Open Government initiative and Government as a Platform concept are good examples of better citizen services provided by governments informing and empowering the citizens through dashboards and scorecards about government and the flagship initiatives. | |
• Green Technology | - Cloud storage services are more energy efficient than storage on local hard disk drives when files are only occasionally accessed. Additionally cloud services are more efficient than modern mid-range PCs for simple office tasks. Thus reducing an organisation’s carbon footprint by saving energy. | |
Tactical | • Improved business continuity and disaster recovery | - Improved business continuity for government authorities and disaster-recovery capability by being on several cloud sites. |
• Improved agility and empowerment | - Improved agility and empowerment with users’ ability to re-provision technological infrastructure resources themselves. | |
• Faster implementation | - Cloud-based implementation can be achieved relatively quickly accelerating the time required to make the new services available to internal users compared to traditional systems implementation. | |
• Improved security | - Improved security by being able to leverage the cloud service providers’ specialised security and privacy staff personnel and additional robust security systems and infrastructure. | |
• Scalability | - Allows servers and storage devices to be shared and utilisation be increased or decreased as required. | |
• Easier application migration | - Ability to easily migrate application from one physical server (cloud) to another. | |
Operational | • Reduced costs | - Cost reduction as capital expenditure is converted to operational unit cost expenditure. |
• Reduced maintenance and support | - Reduced maintenance and support, especially for in-house IT teams, as software does not need to be installed on each user’s computer and can be accessed from different places. | |
• Flexibility of work practices | - Easier access from any appropriate internet-ready device, as infrastructure is off-site and provided by a third party and accessed via the internet, users can connect from anywhere. | |
• Utilisation and efficiency improvements | - Improved resource utilisation and more efficient systems especially for systems that are often only 10–20% utilised. | |
• Shared services | - Multi-tenancy enables sharing of resources and costs across a large pool of users. | |
• Increased peak-load capacity | - When peak-load capacity increases users need not engineer for higher load-levels. |
Classification | Factors | Description* |
---|---|---|
Strategic | • Unproven financial business case | - As most cloud projects are at an early stage there are limited or unproven financial business cases supporting the adoption of cloud systems. It is worth nothing that this risk could oscillate between strategic and operational risks of an organisation. |
• Loss of governance | - Cloud computing amplifies the need for governance and this requires the control and oversight by the organisation over policies, procedures, and standards for cloud computing services. | |
• Lack of trust on providers | - Organisations relinquish direct control over many aspects of security and privacy to the cloud provider which necessitates a high level of trust of the provider. | |
• Security and privacy issues | - Data sensitivity and privacy of information is a pivotal concern as there is a risk of unauthorised users gaining access to sensitive data due to various users accessing the servers all the time. Risks of security and privacy issues could also shift between strategic and operational risks of an organisation. | |
Tactical | • Portability restrictions | - The issue of being locked into a single cloud service provider due to high switching costs in terms of effort and time to switch between providers. |
• Lack of data ownership | - Organisation’s ownership rights over the data must be firmly established in the service contract to enable a basis for trust and privacy of data. | |
• Integration restrictions | - Integration with equipment hosted in other data centres may be difficult to achieve. Organisation’s own peripherals (e.g. printers) and email systems may prove difficult to integrate into the cloud systems. | |
Operational | • Poor performance | - Issues of poor performance are common with new systems because the actual load is different from the predicted load. Sharing internal and external servers may introduce new problems because of the time required for data transfer to external systems. |
• Limited storage capacity | - Some cloud service providers can include restrictions on the capacity of storage that they can/will provide. | |
• Financial pressures | - Though in the long run cloud hosting may prove a lot cheaper, it is currently new and has to be researched and improved making it more expensive in the short run. | |
• Loss of control | - Loss of control over both the physical and logical aspect of system and data as the shift to the public cloud requires a transfer of responsibility and control to the cloud provider. | |
• Lack of detailed information about data locations | - As data is stored redundantly in multiple physical locations, there is a risk of unavailability or undisclosed detailed information about the whereabouts of an organisation’s data. | |
• Disaster recovery restrictions | - Risk of partial or complete loss of data due to natural disasters. | |
• Lack of service availability | - Availability can be affected temporarily or permanently and a loss can be partial or complete due to equipment outages, natural disasters, virus attacks etc. | |
• Difficult to customise | - Decreased flexibility to customise systems as the organisation has no control over the cloud systems provided by the providers. |
3 Background to the case study Organisations
Variable | UKLA1 Description | UKLA2 Description | UKLA3 Description |
---|---|---|---|
Sector | - Public Sector, United Kingdom Local Authority | - Public Sector, United Kingdom Local Authority | - Public Sector, United Kingdom Local Authority |
Services | - Environmental health, refuse collection, building control, planning, highways, social services and education including schools | - Environmental health, refuse collection, building control, planning, highways, social services and education including schools | - Environmental health, refuse collection, building control, planning, highways, social services and education including schools |
Service Period | - 17 years (1995 to present, 2012) | - 17 years (1995 to present, 2012) | - 17 years (1995 to present, 2012) |
Number of employees | - 7500 | - 8500 | - 10,000 |
CEO | - Legal background with legal degree, qualified solicitor | - Finance background with Finance degree and qualified accountant | - Leisure Services background with marketing degree |
Customers | - Residents, citizens and tourists of UKLA1 | - Residents, citizens and tourists of UKLA2 | - Residents, citizens and tourists of UKLA3 |
Supplier | - Leading public sector cloud services provider | - Leading private sector cloud services provider | - Leading private sector cloud services provider |
Competitors | - None, all services provided without any competitors | - None, all services provided without any competitors | - Most services in house, refuse collection outsourced |
Service scope | - UKLA1 geographical area | - UKLA2 geographical area | - UKLA3 geographical area |
Corporate strategy | - Five-year strategy explicitly defined to deliver public services. Organisation striving to provide high-quality, low-cost and value-added services to its citizens | - No defined strategy, emergent issues addressed as they occur | - Four-year strategy to tie in with political elections, to deliver services to citizens within a reducing budget |
IT Strategy | - Five-year strategy, including action to investigate cloud computing | - No strategy | - Four-year strategy |
IT/IS infrastructure | - 80 staff, 5500 personal computers and laptops, 180 sites, 200 servers, 220 departmental and corporate IT systems. All employees had basic IT use competency | - 100 staff, 6500 personal computers and laptops, 120 sites, 250 servers, 270 departmental and corporate IT systems. Most employees had basic IT use competency | - 120 staff, 7000 personal computers and laptops, 150 sites. 400 servers, 350 departmental and corporate IT systems. All employees trained in IT use competency |
Budget | - £350 m | - £400 m | - £500 m |
Population | - 160,000 | - 200,000 | - 250,000 |
3.1 Information technology maturity
4 Research methodology
4.1 Data collection
Empirical materials | Media | Explanation |
---|---|---|
Meeting minutes (MM) | Electronic/paper | 1. Meetings of IT Corporate Plan Group and IT Strategy group 2. Meetings with cloud groups and sub-groups 3. Meetings of research group |
Interview transcripts (IN) | Electronic/paper | 1. Interviews with participants in Corporate Plan, IT strategy and cloud deployment groups 2. Final interviews with cloud project managers 3. Final interviews with senior stakeholders |
Informal discussion notes (IDN) | Electronic/paper | 1. Informal conversations with employees at non-managerial roles 2. Notes made from discussions with employees regarding the organisational culture, cloud adoption awareness etc. |
Diaries (DI) | Paper | 1. Reflections from participation in activities. 2. Written on the same or following day based on field notes. |
Emails (EM) | Electronic documents | 1. Meeting agendas 2. Comments on draft reports and minutes 3. Discussions/ frustrations comments exchanged among researchers 4. Time schedules and project plans |
4.2 Interview process
-
Head of IT
-
Cloud Project Manager
-
IT Infrastructure Manager
-
Data Protection Manager
-
Finance Manager
-
Social Services Manager
4.3 Case study validity
5 Case study findings
Cloud Service model category | Specific cloud service / technology | Technical service | Business service | UKLA1 findings | UKLA2 findings | ULKA3 findings |
---|---|---|---|---|---|---|
IaaS | Big Data Storage | Yes | No | Yes | Yes | Yes |
IaaS | On Demand computer power | Yes | Yes | Yes | Yes | Yes |
IaaS | Disaster recovery | Yes | Yes | Yes | Yes | Yes |
PaaS | Virtualised servers | Yes | No | Yes | Yes | Yes |
PaaS | SQL databases | Yes | Yes | Yes | Yes | Yes |
SaaS | Enterprise resource management | Yes | No | Yes | No | Yes |
5.1 Case one: UKLA1 findings
5.1.1 Link to IT strategy
5.1.2 Motivation for cloud
5.1.3 Evaluation of cloud technology
5.1.4 Cost benefits
Classification | Factors | UKLA1 findings | UKLA2 findings | UKLA3 findings |
---|---|---|---|---|
Strategic | • Centralisation of infrastructure | ● | ● | ● |
• Increased resilience | ○ | ● | ● | |
• Device and location independence | ● | ● | ● | |
• Release internal IT resources | ● | ● | ● | |
• Better Citizen Services | ● | ● | ● | |
• Green Technology | ● | ● | ● | |
Tactical | • Improved business continuity and disaster recovery | ● | ● | ● |
• Improved agility and empowerment | ● | ● | ● | |
• Faster implementation | ● | ● | ● | |
• Improved security | ● | ○ | ● | |
• Scalability | ● | ● | ● | |
• Easier application migration | ○ | ● | ● | |
Operational | • Reduced costs | ● | ● | ● |
• Reduced maintenance and support | ● | ● | ● | |
• Flexibility of work practices | ● | ● | ● | |
• Utilisation and efficiency improvements | ○ | ● | ● | |
• Shared services | ● | ● | ● | |
• Increased Peak-load capacity | ● | ● | ○ |
5.2 Case two: UKLA2 findings
5.2.1 Link to IT strategy
5.2.2 Motivation for cloud
5.2.3 Evaluation of cloud technology
5.2.4 Cost benefits
5.3 Case three: UKLA3 findings
5.4 Link to IT strategy
5.4.1 Motivation for cloud
5.4.2 Evaluation of cloud technology
5.4.3 Cost benefits
Classification | Factors | UKLA1 findings | UKLA2 findings | UKLA3 findings |
---|---|---|---|---|
Strategic | • Unproven financial business case | ○ | ● | ○ |
• Loss of governance | ○ | ● | ○ | |
• Lack of trust on providers | ● | ○ | ○ | |
• Security and privacy issues | ● | ● | ● | |
Tactical | • Portability restrictions | ○ | ○ | ○ |
• Lack of data ownership | ● | ● | ● | |
• Integration restrictions | ○ | ○ | ○ | |
Operational | • Poor performance | ○ | ● | ○ |
• Limited storage capacity | ○ | ○ | ○ | |
• Financial pressures | ○ | ● | ● | |
• Loss of control | ● | ● | ● | |
• Lack of detailed information about data locations | ● | ● | ● | |
• Disaster recovery restrictions | ○ | ● | ○ | |
• Lack of service availability | ● | ● | ● | |
• Difficult to customise | ● | ● | ● |
6 Discussion
-
Improved resilience: Existing literature (Marinos and Briscoe 2009; Hamouda 2012; Cabinet Office 2011b) highlights resilience as a key advantage of cloud computing such that a failure of one node of the system in the cloud environment has no impact on information availability and does not result in perceivable downtime for the organisation. However, UKLA1 did not have improved resilience and occasional downtime was experienced by the case study organisation via the cloud deployment. This was explained as early ‘teething problems’, compounded by a complicated cloud configuration and implementation set-up. Strong representations were made to the cloud provider to resolve these issues. The case organisation even threatened to revert to the legacy systems if this was not resolved. This ongoing problem was having a significant effect on the case study organisation’s ability to operate and function. Clearly, when the cloud system was unavailable, all users were unable to utilise the cloud solution to undertake business functions. This issue was however not observed in UKLA2 or UKLA3.
-
Easier Application Migration: According to Youseff et al. (2008) and Lloyd et al. (2013), in an IaaS cloud environment application migration is focused on efficient moving of applications back and forth between a virtualised data centre and private cloud environment and public clouds. However, there were intermittent problems with the virtualisation and storage area network software deployed in the case study cloud solution, which made this a difficult transition for UKLA1. This issue also contributed to the lack of improved resilience. This was because applications were not being moved smoothly between the various decentralised cloud environments, which led to cloud downtime and delays to users’ access to systems. There were no issues of this nature in UKLA2 or UKLA3.
-
Utilisation and efficiency improvements: The literature (Aymerich et al. 2008; Accenture 2010) highlights the fact that cloud computing allows better utilisation rates of systems. The results from UKLA1 and UKLA3 support this finding. However, UKLA2 did not resonate with this finding, although this factor is currently unclear in the case study. Further work is needed to understand how and what future costs will be incurred. Future robust financial modelling is required, which will be undertaken by UKLA2. Organisationally, the case is trying to identify a set of key performance indicators (KPIs) that will help to measure future efficiency improvements. The Chief Executive Officer of UKLA2 considers this to be a priority that needs to be undertaken, as any new service delivery needs to be linked to ‘austerity’ (National Audit Office 2011). Cost savings are a key benefit claimed by cloud solution advocates but the position in this case is unclear and needs to be clarified.
-
Improved security: As per Aymerich et al. (2008) and Dorey and Leite (2011), organisations can benefit from improved security by leveraging the cloud service providers’ specialised security and privacy personnel and additional security systems and infrastructure. However, there was a significant security breach in UKLA2 due to loss of governance. This occurred when passing control to the private sector cloud service provider, who was hacked and some information was accessed by an unauthorised third party. This resulted in serious concerns within UKLA2. Cloud implementation in UKLA2 therefore resulted in more vulnerability and lack of control.
-
Reduced costs: Existing literature (e.g. Bhattacherjee and Park 2014; Sultan 2014) asserts that one of the key benefits of cloud computing is that generates significant cost efficiencies for users from economies of scale and from the inherent cost advantages of Internet-based computing. This has been evident in the case of UKLA1 and UKLA3. However, in UKLA2 a formal business case was not developed and therefore it is still unclear whether the solution has been cost effective. While there was an urgent need to replace the existing IT infrastructure and therefore the innovative cloud was deployed for a valid reason, there is a need to undertake a post-implementation, cost-benefit review that should address both direct and indirect costs which resonates with Hochstrasser (1992) and Irani (2010).
-
Increased Peak Load Capacity: According to Armbrust et al. (2010), one of the benefits of cloud computing technologies is that when peak-load capacity increases, organisations need not engineer for higher load-levels as the cloud systems are capable of handling such loads. Although UKLA 1 and 2 did concur with the views of Armbrust et al. (2010), UKLA3 experienced issues with peak-load capacity such that there were delays accessing the cloud when under significant load. This was still being looked at and addressed by UKLA3.
-
Unproven financial business case: Another important issue is the lack of a clear business case. According to Yam et al. (2011), since cloud projects are at an early stage, there are limited or unproven financial business cases supporting the adoption of cloud systems. However, this was not the position in UKLA1 and UKLA3, as clear, robust financial business cases were prepared. UKLA1 had also undertaken a post implementation cost-benefit review. UKLA3 were due to undertake a review of this type. It was also evident that all 3 cases had been highly motivated to deploy CC by political pressure from central government.
-
Loss of governance: According to Catteddu and Hogben (2009), one of the most important security risks when using cloud computing is a loss of governance for organisations. The authors assert that when using cloud infrastructure, the client relinquishes control to the cloud service provider which could, as a consequence, have an adverse effect on their regulatory compliance, thus leaving a gap in security and governance defences. However, this seems unlikely to occur in UKLA1 and UKLA3. This is because governance has been addressed by deploying a high two-factor authentication system. This gives a high level of security (i.e.128bit encryption) for users requiring access to the system. The case studies have also implemented a data classification approach, which classifies data according to importance and criticality. Important information is then encrypted and also backed locally as a fail-safe. While this approach will not resolve any cloud system failure, it does give the case study organisation secure and encrypted data in the cloud and access to its vital data locally as a backup system. These failsafe initiatives ensure that access to data and the data itself is secure and complies with regulatory requirements, together with provision of a suitable backup system.
-
Lack of trust on providers: Organisations relinquish direct control over many aspects of security and privacy to the cloud provider which requires a high level of trust of the provider (Armbrust et al. 2010). However, this was not seen as problematic from UKLA2 and UKLA3’s perspective. This was because the data held in the cloud was 128bit encrypted. This means that the data was secure and the custodian cloud supplier cannot access the data content. This was critical due to the confidential and sensitive data held in the cloud solution.
-
Portability restrictions: Another primary concern around cloud computing that exists in the literature (Wyld 2009) and among IT executives is the fear among organisations of being locked into vendors. This is due to high switching costs in terms of time and effort that would be needed to switch between cloud service providers resulting in portability restrictions. Nonetheless, the three UKLAs did not reflect this concern. This was because the cloud solution deployed was a leading industry solution. The case studies, following a risk assessment, considered this aspect as low risk, in the same way as the industry is locked into standard PC software, such as Microsoft. To further illustrate the point, only 18 IT vendors handle approximately 80% of the UK’s estimated public sector IT expenditure (National Audit Office 2011). Thus, highlighting the fact that the case study organisations were already in a restricted situation in terms of being able to switch IT providers. It is also highly unlikely that the cloud solution company will cease to exist in the future. Although there is a slight risk, the case organisations are satisfied with this small exposure.
-
Integration restrictions: According to Khajeh-Hosseini et al. (2010), integration with existing equipment, for example, IT in the case organisations could be problematic. However, this was not an issue in all UKLAs because the IT systems had been deployed to the cloud so there were no issues of this nature.
-
Poor performance: The literature (Iosup et al. 2011; Jansen 2011) reports that issues of poor performance are common with new cloud systems because the actual load is different from the predicted load. However, in UKLA1 and UKLA3 this was not problematic. This was because accurate load metrics were calculated and tested prior to the cloud migration. This ensured that there was sufficient load capacity and adequate performance. This was important as remediation of failure needed to be clear.
-
Limited storage capacity: Some cloud service providers can include restrictions on the capacity of internet and storage that they can provide (Goiri et al. 2010). However, this was not the position in all UKLAs. This was because each case organisation implemented a leading and proven cloud solution, which had demonstrated that it has sufficient capacity to deal with fluctuations and growth in cloud usage. This large capacity had been able to absorb all the extra workload generated by each case study organisation. The large cloud provider had also carried out many implementations in other organisations where capacity is likely to increase. In addition, there were new organisations deploying the cloud solution. The three case studies are carefully monitoring the situation to ensure any issues in relation to future shortage will be resolved. This is an important aspect due to increasing digitisation of public services. Limited capacity would be a major handicap to the organisations. Effectively, it would prevent the case study organisations from undertaking business functions. There were also peak-load internet network capacity issues with ULKA3, which were being addressed.
-
Financial pressures: A recent survey by a global media company highlights the fact that an organisation’s IT spending in the short term will increase prior to realising long-term cost savings (Framingham 2012). However, this was not the finding in UKLA1. This was because the case organisation had carefully negotiated a ‘pay on completion’ financial model. This was unusual, in that most IT and cloud providers expect payment to be made via staged payments throughout the project implementation. This innovative funding approach had the significant benefit of preventing short-term costs accruing and rising. Savings were made by switching off legacy systems and funding the new cloud solution by savings in legacy licensing and hardware costs. There was also a pay-as-you-go financial arrangement, which ensured an appropriate payment method. The case organisation focused on strong contractual negotiation and firm arrangements, which proved to be of significant benefit. There were financial pressures in UKLA2 and UKLA3, which were consistent with the literature.
-
Disaster recovery restrictions: As per Popovic and Hocenski (2010), there have been concerns over the partial or complete loss of data due to natural disasters when moving to a cloud environment. However, this was unlikely to occur in UKLA1 and UKLA3. This was because the cloud solution was a world-leading product, with several locations around the world. In the event a disaster should occur, the cloud provider will be able to recover the data and systems immediately. This was because the data and virtualised systems are replicated in several places worldwide. The case studies back-up of legacy systems were located offsite, in only one location. Due to geography and internal governance, this facility was within 20 miles of each case study’s IT data centres. This local arrangement was high risk. For example, a flood or storm could damage both data centres. The cloud solution has resolved this issue. Disaster Recovery is a key case study benefit of cloud deployment.
7 Case synthesis and lessons learnt for cloud computing deployment
Aspect | Rationale | UKLA1 findings | UKLA2 findings | ULKA3 findings |
---|---|---|---|---|
1. Feasibility study, value and benefit appraisal | Understand impact | ● | ○ | ● |
2. Senior IT management team commitment | Deliver project | ● | ● | ● |
3. Cloud Strategy aligned to business strategy | Meet business needs | ● | ○ | ● |
4. Project Management | Deliver Project | ● | ● | ● |
5. Appropriate Training | Exploit Technology | ○ | ○ | ○ |
6. Appropriate support | Ensure effectiveness | ● | ● | ● |
7. Better citizen services | Ensure efficiency | ● | ● | ● |
8. Regular post-implementation cost reviews | Understand costs | ○ | ● | ○ |
9. Appropriate data location of cloud | Ensure availability | ● | ● | ● |
10. Adequate security and privacy | Protect Data | ● | ○ | ● |
11. Disaster recovery facilities | Ensure cloud recovery | ● | ● | ● |
12. Data ownership | Clarify responsibility | ○ | ● | ● |
13. Governance | Clarify responsibility | ○ | ● | ● |
14. Reduce IT staff headcount | Reduce costs | ● | ● | ● |
15. Adequate availability | Ensure availability | ● | ● | ○ |
16. Financial pressures | Understand costs | ○ | ● | ○ |
17. Adequate Capacity | Ensure Availability | ● | ● | ● |
18. Portability Restrictions | Protect investment | ○ | ○ | ○ |
19. Adequate performance | Ensure efficiency | ● | ● | ● |
20. Contract negotiation and arrangements | Protect investments | ● | ○ | ● |
Lessons | Description |
---|---|
Lesson 1 | Public sector organisations need to critically question the underlying assumptions of their existing IT infrastructures and assess strategically whether a cloud solution fits the risks and rewards considered to be acceptable by the organisation and its stakeholder community. |
Lesson 2 | Cloud implementation should have an explicit concern for the organisational context and flexible working methods that need to be adopted if the full benefits of cloud computing are to be leveraged in the public sector. |
Lesson 3 | The views and assumptions of cloud should be exposed and considered within the public authorities’ evaluation process and not be ephemeral to it. |
Lesson 4 | The hierarchical and political nature of public sector organisations creates a barrier to change and this must be overcome to ensure cloud solutions are successful in practice. |
Lesson 5 | Public sector organisations must ensure the cloud solution is secure to ensure data is not accessed by unauthorised parties |
Lesson 6 | Public sector organisations should undertake a cloud benefits review to ensure the solution is a clear business case that is delivering cost savings, business efficiency savings and value for money. |
Lesson 7 | Public authorities should ensure that the strong leadership of the national government is followed to enable dynamic cloud solutions to be deployed to shape public sector outcomes. |
Lesson 8 | Public sector organisations should promote cloud internally and ensure adequate training is undertaken. |
Lesson 9 | Public authorities should implement adequate, legal, regulatory and governance frameworks to ensure cloud systems functions successfully. |
Lesson 10 | Public sector organisations should create a cloud aware culture to capitalise on the impact and benefits of cloud. |
8 Conclusions
-
Government organisations are leveraging cloud computing technologies to help transform their operations to deliver improved citizen services in a cost effective way. For example, the Open UK Government initiative and Government as a Platform concept highlight better citizen services provided by governments to inform and empower the citizens through dashboards and scorecards.
-
Real-time automatic data synchronisation with internet-ready mobile data devices is predicted to significantly improve the organisational impact of cloud solution. These will need to be addressed along with strong contractual negotiations to protect investment decisions and project realisation (ex-post evaluation).
-
Flexible work practices and the significance of the senior management team in driving the implementation and project delivery of the cloud solution. Here, management is specifically distinguished from leadership right across the supply chain.