SOURCES OF IMPROVEMENT OF USERS' COMPETENCIES WHILE CLOUD SOLUTIONS ARE BEING INTRODUCED INTO MANUFACTURING COMPANIES
DOI:
https://doi.org/10.12775/JPM.2019.008Keywords
cloud computing, competencies, manufacturing companiesAbstract
Purpose: The research question posed for this study concerns ways of acquiring new competencies by employees, necessary in the new situation and necessary in the face of a change in the organization which is the implementation of cloud solutions for everyday work.
Methodology: The questionnaire in the form of CATI survey (computer-assisted telephone interviewing) were directed to 50 212 companies, the return was from 400 firms.
Findings: The results of the conducted research indicate that the most commonly used method is the training of key users (used in 59.25% of the 400 companies surveyed). Moreover, according to this study the dependence between company size and method used by the company of gaining a competences while introducing cloud computing to daily routines does not exist.
Limitations: Respondents only in 9 out of 400 cases indicated other sources of acquiring competences than those indicated by researchers. If may be either a poor repertoire of methods used by companies for raising qualifications or reluctance in filling in the questionnaire. Further research is needed.
Value of the paper: Cloud computing (ICT) offers companies new opportunities and introduces a change in the way they conduct business. This change, although it seems to be only a technological change, influences the change of the company's processes and organization itself. The competences of the employees must also change. Answering the question about their source helps to determine whether the transfer to the cloud was prepared.
Paper type: Research paperReferences
Abdel-Basset, M., Mohamed, M., & Chang, V. (2018). NMCDA: A framework for evaluating cloud computing services. Future Generation Computer Systems, 86, 12-29.
Balco, P., Law, J., & Drahošová, M. (2017). Cloud market analysis from customer perspective. Procedia Computer Science, 109, 1022-1027.
Beloglazov A., Abawajy J., Buyya R., (May 2012) Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing, Future Generation Computer Systems, vol. 28, issue 5, pp. 755-768.
Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 27-33). Ieee.
Jones, S. (2015). Cloud computing procurement and implementation: Lessons learnt from a United Kingdom case study. International journal of information management, 35(6), 712-716.
Li, P., Li, J., Huang, Z., Gao, C. Z., Chen, W. B., & Chen, K. (2018). Privacy-preserving outsourced classification in cloud computing. Cluster Computing, 21(1), 277-286.
Lian, J.W., Yen, D.C., Wang, Y.T., 2014, An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital, International Journal of Information Management,34 (1), pp. 28–36.
Lynn, T., Liang, X., Gourinovitch, A., Morrison, J. P., Fox, G., & Rosati, P. (2018, January). Understanding the determinants of cloud computing adoption for high performance computing. In 51st Hawaii International Conference on System Sciences (HICSS-51). University of Hawai'i at Manoa.
Mitchelmore, S., & Rowley, J. (2010). Entrepreneurial competencies: a literature review and development agenda. International journal of entrepreneurial Behavior & Research, 16(2), 92-111.
Pearson, S. (2013, September). On the relationship between the different methods to address privacy issues in the cloud. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems" (pp. 414-433). Springer, Berlin, Heidelberg.
Penzel, D., Kryvinska, N., & Strauss, C. (2017). Cloud Market – Analysis of Potentials and Challenges for Service Providers.
Puthal, D., Sahoo, B. P., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In 2015 International Conference on Computational Intelligence and Networks (pp. 116-123). IEEE.
Qiu, C., Shen, H., & Chen, L. (2018). Towards green cloud computing: Demand allocation and pricing policies for cloud service brokerage. IEEE Transactions on Big Data, 5(2), 238-251.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.
Ranjbarfard, M., & Heidari Sureshjani, M. (2018). Offering a framework for value co-creation in virtual academic learning environments. Interactive Technology and Smart Education, 15(1), 2-27.
Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47-54.
Saini, H., Upadhyaya, A., & Khandelwal, M. K. (2019). Benefits of Cloud Computing for Business Enterprises: A Review. Available at SSRN 3463631.
Senarathna, I., Wilkin, C., Warren, M., Yeoh, W., & Salzman, S. (2018). Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs. Australasian Journal of Information Systems, 22.
Shuaib, M., Samad, A., Alam, S., & Siddiqui, S. T. (2018). Why Adopting Cloud Is Still a Challenge?—A Review on Issues and Challenges for Cloud Migration. Ambient Communications and Computer Systems: RACCCS-2018, 904, 387.
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018a). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964-975.
Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018b). Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and Systems, 19, 174-184.
Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, 79, 849-861.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 2.
Downloads
Published
How to Cite
Issue
Section
License
Copyright
Articles submitted to the journal should not have been published before in their current or substantially similar form, or be under consideration for publication with another journal. Authors submitting articles for publication warrant that the work is not an infringement of any existing copyright and will indemnify the publisher against any breach of such warranty. For ease of dissemination and to ensure proper policing of use, papers and contributions become the legal copyright of the publisher unless otherwise agreed.
Plagiarism and ghostwriting
In response to the issue of plagiarism and ghostwriting the editors of the Journal of Positive Management has introduced the following rules to counteract these phenomena:
1. Contributors should be aware of their responsibility for a content of manuscripts.
2. Collective authors are obliged to reveal the contribution and an affiliation of each author (i.e. who is an author of specified part of a paper).
3. Any act of dishonesty will be denounced, the editors will inform appropriate institutions about the situation and give evidence of all cases of misconduct and unethical behaviour.
4. The editors may ask contributors for financial disclosure (i.e. contribution of specified institutions).
Stats
Number of views and downloads: 373
Number of citations: 0