Cloud Management and Governance: Adapting IT Outsourcing to External Provision of Cloud-Based IT Services
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 10
Abstract
Outsourcing is a strategic option which complements IT services provided internally in organizations. The maturity model for IT service outsourcing (henceforth MM-2GES) is a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38500, and the frameworks and best practices of ITIL and COBIT, with a specific focus on IT outsourcing. MM-2GES allows independent validation, practical application, and an effective transition to a model of good governance and management of outsourced IT services. Cloud computing is a new model for provisioning and consuming IT services on a need and pay-per-use basis. This model allows the IT systems to be more agile and flexible. The external provision of cloud-based services as part of Cloud computing appears as an evolution of traditional outsourcing, due to the emerging technologies related to the provision of IT services. As a result of technological developments, traditional outsourcing and external provision of cloud-based services, share common characteristics, but there are also some differences. This paper adapts MM-2GES to external provision of cloud-based services, from the point of view of the customer. This way, the applicability of the model can be implemented in organizations that have both models traditional IT outsourcing and cloud-based services provided externally, in order to achieve excellence in governance and management of all kind of IT services provided externally to organizations.
Authors and Affiliations
Dr. Victoriano García, Dr. Eugenio Vicente, Dr. Luis Aragonés
Debranding in Fantasy Realms: Perceived Marketing Opportunities within the Virtual World
This paper discusses the application of the concept of debranding within immersive virtual environments. In particular the issue of the media richness and vividness of experience is considered in these experience realms...
Modern Data Formats for Big Bioinformatics Data Analytics
Next Generation Sequencing (NGS) technology has resulted in massive amounts of proteomics and genomics data. This data is of no use if it is not properly analyzed. ETL (Extraction, Transformation, Loading) is an importan...
Securing Informative Fuzzy Association Rules using Bayesian Network
In business association rules being considered as important assets, play a vital role in its productivity and growth. Different business partnership share association rules in order to explore the capabilities to make ef...
TokenVote: Secured Electronic Voting System in the Cloud
With the spread of democracy around the world, voting is considered a way to collectively make decisions. Recently, many government offices and private organizations use voting to make decisions when the opinions of mult...
Evaluating Damage Potential in Security Risk Scoring Models
A Continuous Monitoring System (CMS) model is presented, having new improved capabilities. The system is based on the actual real-time configuration of the system. Existing risk scoring models assume damage potential is...