473
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

IT controls in the public cloud: Success factors for allocation of roles and responsibilities

, &

References

  • Alborz, S., Seddon, P., & Scheepers, R. (2003, July). A model for studying IT outsourcing relationships. Paper presented at the 7th Pacific Asia Conference on Information Systems, Adelaide, Australia.
  • Alrajeh, A. M., Fearfull, A., & Monk, E. (2012). Qualitative research process using abductive approach. Rochester, NY: Social Science Research Network.
  • Anthes, G. H. (2004). Quality model Mania. Computerworld: Framingham. Retrieved from http://www.computerworld.com/developmenttopics/development/story/0%2C10801%2C90797%2C00.html
  • Aubert, B. A., Rivard, S., & Patry, M. (2004). A transaction cost model of IT outsourcing. Information & Management, 41(7), 921–932. doi:10.1016/j.im.2003.09.001
  • Becker, J., & Bailey, E. (2014, August). A comparison of IT governance & control frameworks in cloud computing. Paper presented at the Twentieth Americas Conference on Information Systems, Savannah, GA.
  • Benbasat, I., Goldstein, D. K., & Mead, M. (1987). The case research strategy in studies of information systems. MIS Quarterly, 11, 369–386. doi:10.2307/248684
  • Beserra, P. V., Camara, A., Ximenes, R., Albuquerque, A. B., & Mendonca, N. C. (2012, September). Cloudstep: A step-by-step decision process to support legacy application migration to the cloud. Paper presented at the IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), Riva del Garda, Italy.
  • Bittman, T. (2015). Problems Encountered by 95% of Private Clouds. Retrieved from http://blogs.gartner.com/thomas_bittman/2015/02/05/why-are-95-of-private-clouds-failing/
  • Bostrom, R. P., & Heinen, J. S. (1977). MIS problems and failures: A socio-technical perspective, Part II: The application of socio-technical theory. MIS Quarterly, 1, 11–28. doi:10.2307/249019
  • Carley, K. M., Prietula, M. J., & Lin, Z. (1998). Design versus cognition: The interaction of agent cognition and organizational design on organizational performance. Journal of Artificial Societies and Social Simulation, 1(3), 1–19.
  • Chaudhury, A., Nam, K., & Rao, H. R. (1995). Management of information systems outsourcing: A bidding perspective. Journal of Management Information Systems, 12, 131–159. doi:10.1080/07421222.1995.11518084
  • Cherrayil, N. K. (2016). Middle East’s information and communications technology spending to cross $103b this year. Gulf News. Retrieved from http://gulfnews.com/business/sectors/technology/middle-east-s-information-and-communications-technology-spending-to-cross-103b-this-year-1.1663874
  • Coelho, A. M., & Rupino da Cunha, P. (2009, August). IT service management diagnosis at Grefusa group and ITIL implementation proposal. Paper presented at the 15th Americas Conference on Information Systems, San Francisco, CA.
  • Columbus, L. (2015). Roundup of cloud computing forecasts and market estimates, 2015. Forbes Magazine. Retrieved from http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloud-computing-forecasts-and-market-estimates-2015/#523e2967740c
  • Cooke-Davies, T. (2002). The “real” success factors on projects. International Journal of Project Management, 20(3), 185–190. doi:10.1016/S0263-7863(01)00067-9
  • Dartnell, J. (2015). UAE managed and outsourcing services ‘$972m’ by 2018 [Press release]. Retrieved from http://www.cnmeonline.com/news/uae-managed-and-outsourcing-services-972m-by-2018/
  • Das, S., & Dayal, M. (2016). Exploring determinants of cloud-based enterprise resource planning (ERP) selection and adoption: A qualitative study in the Indian education sector. Journal of Information Technology Case and Application Research, 18(1), 11–36. doi:10.1080/15228053.2016.1160733
  • Davies, J. (2002). Models of governance—A viable systems perspective. Australasian Journal of Information Systems, 9(2), 57–66.
  • DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30.
  • Deschamps, J.-P. (2005). Different leadership skills for different innovation strategies. Strategy & Leadership, 33(5), 31–38. doi:10.1108/10878570510616861
  • Desk, T. N. (2015). 23% UAE organisations inclined to deploy advanced hybrid cloud models for IT [Press release]. Retrieved from http://techchannelmea.com/research-and-surveys/23-uae-organisations-inclined-deploy-advanced-hybrid-cloud-models-it
  • Dhar, S. (2012). From outsourcing to cloud computing: Evolution of IT services. Management Research Review, 35(8), 664–675. doi:10.1108/01409171211247677
  • D’Mello, S. (2015). Tech firms spearheading cloud solutions adaptation in UAE. Khaleej Times. Retrieved from http://www.khaleejtimes.com/business/technology/tech-firms-spearheading-cloud-solutions-adaptation-in-uae
  • Dowse, A., & Lewis, E. (2009). Applying organizational theories to realize adaptive IT governance and service management. In A. Cater-Steel (Ed.), Information Technology Governance and Service Management: Frameworks and Adaptations (313–332). Hershey, PA: Information Science Reference.
  • Dubé, L., & Paré, G. (2003). Rigor in information systems positivist case research: Current practices trends and recommendations. MIS Quarterly, 27(4), 597–635.
  • Eisenhardt, K. M., & Graebner, M. E. (2007). Theory building from cases: Opportunities and challenges. Academy of Management Journal, 50(1), 25–32. doi:10.5465/AMJ.2007.24160888
  • EMC. (2011). Cloud infrastructure and services. Hopkinton, MA: Author.
  • Endeavor Management. (2011). Aligning the Organization for Effective Outsourcing. Retrieved from http://endeavormgmt.com/wp-content/uploads/2012/01/Aligning-the-Organization-for-Effective-Outsourcing.pdf?e68d31
  • Feeny, D. F., & Willcocks, L. P. (1998). Core IS capabilities for exploiting information technology. Sloan Management Review, 39(3), 9–21.
  • Feltus, C., Petit, M., & Dubois, E. (2009). Strengthening employee’s responsibility to enhance governance of IT – COBIT RACI chart case study. Paper presented at the Information Security Governance, Chicago, Illinois, ACM Workshop, ACM
  • Fitzgerald, G., & Willcocks, L. (2009). Contracting and relationships in IT outsourcing. In M. Lacity & L. Willcocks (Eds.), The Practice of Outsourcing: From Information Systems to BPO and Offshoring (pp. 59–78). Basingstoke, UK: Palgrave Macmillan.
  • Galbraith, J. R. (1995). Designing organizations: An executive briefing on strategy, structure, and process. San Francisco, CA: Jossey-Bass.
  • Galbraith, J. R. (2011). The star model. Denver, CO: Galbraith Management Consultants.
  • Gama, N., Sousa, P., & da Silva, M. M. (2013). Integrating enterprise architecture and IT service management. In H. Linger, J. Fisher, A. Barnden, C. Barry, M. Lang, & C. Schneider (Eds.), Building Sustainable Information Systems: Proceedings of the 2012 International Conference on Information Systems Development (pp. 153–165). New York, NY: Springer.
  • Gefen, D., Ragowsky, A., McLean, E. R., Markus, M. L., Rivard, S., & Rossi, M. (2012). ICIS 2011 panel report: Are we on the wrong track and do MIS curricula need to be reengineered? Communications of the Association for Information Systems, 30(1), 11.
  • Glaser, B. G., & Strauss, A. L. (2009). The discovery of grounded theory: Strategies for qualitative research. New Brunswick, NJ: Aldine Transaction.
  • Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly, 19, 213–236. doi:10.2307/249689
  • Gordon, S. R., Blake, R. H., & Shankaranarayanan, G. (2013). Case-based research in information systems: Gaps and trends. Journal of Information Technology Theory and Application (JITTA), 14(2), 3.
  • Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611–642.
  • Grembergen, W. V., Haes, S. D., & Guldentops, E. (2004). Structures, processes and relational mechanisms for IT governance. Strategies for Information Technology Governance, 2(004), 1–36.
  • Haes, S. D., & Grembergen, W. V. (2008). An exploratory study into the design of an IT governance minimum baseline through Delphi research. The Communications of the Association for Information Systems, 22, 443–458.
  • Henderson, J. C., & Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32(1), 4–16. doi:10.1147/sj.382.0472
  • Hilder, T. (1995). The Viable System Model. Retrieved June, 28, 2005.
  • Ho, V. T., Ang, S., & Straub, D. (2003). When subordinates become IT contractors: Persistent managerial expectations in IT outsourcing. Information Systems Research, 14(1), 66–86. doi:10.1287/isre.14.1.66.14764
  • Hodosi, G., & Rusu, L. (2013). How do critical success factors contribute to a successful IT outsourcing: A study of large multinational companies. Journal of Information Technology Theory and Application (JITTA), 14(1), 3.
  • ISACA. (2009). COBIT Case Study: Government of Dubai Financial Audit Department. Retrieved from http://www.isaca.org/Knowledge-Center/cobit/Pages/Government-of-Dubai.aspx
  • ISACA. (2010). Implementing and continually improving IT governance. Rolling Meadows, IL: Author.
  • ISACA. (2011). IT control objectives for cloud computing: Controls and assurance in the cloud. Rolling Meadows, IL: Author.
  • ISACA. (2012). COBIT 5 enabling processes. Rolling Meadows, IL: Author.
  • ISACA. (2014). ISACA very large chapter growth award—Honorable mention. Retrieved from http://www.isacauae.org/public/en/en/blog/isaca-very-large-chapter-growth-award-honorable-mention
  • Iyer, B., & Henderson, J. C. (2010). Preparing for the future: Understanding the seven capabilities of cloud computing. MIS Quarterly Executive, 9(2), 117–131.
  • Johnston, W. J., Leach, M. P., & Liu, A. H. (1999). Theory testing using case studies in business-to-business research. Industrial Marketing Management, 28(3), 201–213. doi:10.1016/S0019-8501(98)00040-6
  • Kaplan, B., & Maxwell, J. A. (1994). Qualitative research methods for evaluating computer information systems. In J. G. Anderson, C. E. Aydin, & S. J. Jay ( Eds.), Qualitative research methods for evaluating computer information systems (pp. 45–68). Thousand Oaks, California: Sage Publications.
  • Karayilan, Y. (2013). Operational level IT governance model for partnering and value co-creation in an ecosystem (Master’s thesis). Helsinki Metropolia University of Applied Sciences, Helsinki, Finland.
  • Khan, S. N. (2012). Impact of cloud computing on the IT Portfolio management: UAE case study. Paper presented at the 9th IBIMA Conference, Barcelona, Spain.
  • Khan, S., Nicho, M., & Cooper, G. (2015). A role allocation model for IT controls in a cloud environment. The Review of Business Information Systems (Online), 19(1), 5. doi:10.19030/rbis.v19i1.9253
  • Kim, G., Shin, B., Kim, K. K., & Lee, H. G. (2011). IT capabilities, process-oriented dynamic capabilities, and firm financial performance. Journal of the Association for Information Systems, 12(7), 487–517.
  • Laabs, J. (1993). Why HR is turning to outsourcing. Personnel Journal, 72(9), 92–101.
  • Lacity, M. C., & Reynolds, P. (2014). Cloud services practices for small and medium-sized enterprises. MIS Quarterly Executive, 13(1), 31–44.
  • LeCompte, M. D. (2000). Analyzing qualitative data. Theory into Practice, 39(3), 146–154. doi:10.1207/s15430421tip3903_5
  • Leech, N. L., & Onwuegbuzie, A. J. (2007). An array of qualitative data analysis tools: A call for data analysis triangulation. School Psychology Quarterly, 22(4), 557–584. doi:10.1037/1045-3830.22.4.557
  • Leech, N. L., & Onwuegbuzie, A. J. (2011). Beyond constant comparison qualitative data analysis: Using NVivo. School Psychology Quarterly, 26(1), 70. doi:10.1037/a0022711
  • Lei, X., Liao, X., Huang, T., & Heriniaina, F. (2014). Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Information Sciences, 280, 205–217. doi:10.1016/j.ins.2014.05.014
  • Leon, L. A., Abraham, D. M., & Kalbers, L. (2010). Beyond regulatory compliance for spreadsheet controls: A Tutorial to assist practitioners and a call for research. Communications of the Association for Information Systems, 27(28), 541–560.
  • Lepak, D. P., & Snell, S. A. (1999). The human resource architecture: Toward a theory of human capital allocation and development. Academy of Management Review, 24(1), 31–48.
  • Lewin, K. (1945). The research center for group dynamics at Massachusetts institute of technology. Sociometry, 8, 126–136. doi:10.2307/2785233
  • Lewis, E., & Millar, G. (2009). The viable governance model: A theoretical model for the governance of IT. Paper presented at the 42nd Hawaii International Conference on System Sciences, Waikoloa, HI.
  • Linthicum, D. S. (2013). The top 5 ways cloud computing projects failed in 2012, and how to avoid them in 2013. Cloud Connect. Retrieved February 28, 2015, from http://www.slideshare.net/Linthicum/why-cloud-computing-projects-fail
  • Loeser, F. (2013). Green IT and green IS: Definition of constructs and overview of current practices. Paper presented at the Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois.
  • Marquis, H. (2015, March 17). How cloud computing changes IT job roles [Blog post]. Exin. Retrieved from https://www.exin.com/NL/zh/blog/blog-articles/2015/how-cloud-computing-changes-it-job-roles&target=candidate
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing [SP 800-145]. doi:10.6028/NIST.SP.800-145
  • Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561–592. doi:10.1007/s11227-012-0831-5
  • Mohrman, S. A. (2007). Designing organizations for growth: The human resource contribution. People and Strategy, 30(4), 34.
  • Nadler, D., & Tushman, M. (1997). Competing by design: The power of organizational architecture. New York, NY: Oxford University Press.
  • Othman, M. F. I., Chan, T., & Foo, E. (2011). IT governance adoption in Malaysia: A preliminary investigation. Paper presented at the Australasian Conference on Information Systems (ACIS 2011), Sydney, Australia.
  • Palvia, S., & Vemuri, V. (2016). Forecasts of jobless growth: Facts and myths. Journal of Information Technology Case and Application Research, 18, 1–7. doi:10.1080/15228053.2016.1175276
  • Parkes, H. (2004). IT Governance and outsourcing. Information Systems Control Journal, 5, 17–22.
  • Pearson, S., Tountopoulos, V., Catteddu, D., Südholt, M., Molva, R., Reich, C., … Jaatun, M. G. (2012, December). Accountability for cloud and other future Internet services. Paper presented at Cloudcom 2012, Taipei, Taiwan.
  • Peterson, R. R. (2004). Integration strategies and tactics for information technology governance. In W. V. Grembergen (Ed.), Strategies for Information Technology Governance (pp. 37–80). Hershey, PA: Idea Group.
  • Prasad, A., Heales, J., & Green, P. (2009, December). Towards a deeper understanding of information technology governance effectiveness: A capabilities-based approach. Paper presented at the International Conference on Information Systems 2009, Phoenix, AZ.
  • Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: A big picture. Paper presented at the International Conference on Computational Intelligence and Networks (CINE), Bhubaneswar, India.
  • Ramel, D. (2014). New Research Shows ‘Staggering’ Failure Rates for Cloud Projects. Retrieved February 29, 2015, from http://esj.com/articles/2014/06/26/cloud-projects-fail.aspx
  • Rashmi, M. S., & Sahoo, G. (2012). A five-phased approach for the cloud migration. International Journal of Emerging Technology and Advanced Engineering, 2(4), 286–291.
  • Rivard, S., & Aubert, B. A. (Eds.). (2007). Information technology outsourcing. Armonk, NY: ME Sharpe.
  • Rowland, P., & Parry, K. (2009). Consensual commitment: A grounded theory of the meso-level influence of organizational design on leadership and decision-making. The Leadership Quarterly, 20(4), 535–553. doi:10.1016/j.leaqua.2009.04.004
  • Rudd, C., & Lloyd, V. (2007). ITIL: Service design. London, UK: The Stationery Office.
  • Sambamurthy, V., & Zmud, R. W. (1999). Arrangements for information technology governance: A theory of multiple contingencies. MIS Quarterly, 23(2), 261–290. doi:10.2307/249754
  • Schuster, M., & Kesler, G. (2011). Aligning reward systems in organization design: How to activate the orphan star point. People and Strategy, 34(4), 38.
  • Shang, S. S. C., & Lin, S.-F. (2010). Barriers to Implementing ITIL-A multi-case study on the service-based industry. Contemporary Management Research, 6(1), 53–70. doi:10.7903/cmr.1131
  • Sharma, S., & Vredenburg, H. (1998). Proactive corporate environmental strategy and the development of competitively valuable organizational capabilities. Strategic Management Journal, 19(8), 729–753. doi:10.1002/(ISSN)1097-0266
  • Simonova, S., & Zavadilova, I. (2011). Modeling of process of system changes under conditions of IT applications outsourcing. International Journal of Systems Applications, Engineering & Development, 5(3), 314–323.
  • Smith, H. A., & McKeen, J. D. (2009). Developments in practice XXXIII: A holistic approach to managing IT-based risk. Communications of the Association for Information Systems, 25, 519–530.
  • Spradley, J. P. (1979). The ethnographic interview. New York, NY: Waveland Press.
  • Stafford, B. (1985). Diagnosing the system for organizations. Chichester, UK: John Wiley & Sons.
  • Stevens, F. (2011). Frameworks for IT governance implementation. In N. S. Shi & G. Silvius (Eds.), Enterprise IT Governance, Business Value and Performance Measurement (pp. 1–18). Hershey, PA: Information Science Reference.
  • Suo, S., Techatassanasoontorn, A. A., & Purao, S. (2011, August). The interplay between cloud-based SOA and IT departments: Research directions. Paper presented at the 17th Americas Conference on Information Systems, Detroit, MI.
  • Ulrich, D. (1998). A new mandate for human resources. Harvard Business Review, 76, 124–135.
  • Venkatraman, A. (2014). Why some cloud projects fail? Ahead in the Clouds. Retrieved from http://www.computerweekly.com/blogs/Ahead-in-the-clouds/2014/06/why-some-cloud-projects-fail.html
  • Vicente, P., & da Silva, M. M. (2011, June). A conceptual model for integrated governance, risk and compliance. Paper presented at the Advanced Information Systems Engineering Workshop, London, UK.
  • Weill, P., & Ross, J. W. (2004). IT governance: How top performers manage IT decision rights for superior results. Brighton, MA: Harvard Business Press.
  • Winkler, T. J., & Brown, C. V. (2013). Horizontal allocation of decision rights for on-premise applications and software-as-a-service. Journal of Management Information Systems, 30(3), 13–48. doi:10.2753/MIS0742-1222300302
  • World, N. (2015). Most private clouds don’t meet their expectations, here’s why. Network World. Retrieved February 28, 2015, from http://www.networkworld.com/article/2881794/cloud-computing/gartner-why-private-clouds-fail.html
  • Yin, R. K. (2014). Case study research: Design and methods. Los Angeles, CA: Sage publications.
  • Zhang, S., & Le, F. H. (2013). An examination of the practicability of COBIT framework and the proposal of a COBIT-BSC model. Journal of Economics, 1, 5.
  • Zhao, W., & Watanabe, C. (2008). A comparison of institutional systems affecting software advancement in China and India: The role of outsourcing from Japan and the United States. Technology in Society, 30(3), 429–436. doi:10.1016/j.techsoc.2008.04.020
  • Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28, 583–592. doi:10.1016/j.future.2010.12.006

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.