The Next Phase of IT Outsourcing - Utility Computing: Understanding Utility Computing Acceptance

نویسندگان

  • Peter Haried
  • Fatemeh Zahedi
چکیده

Information Technology (IT) outsourcing is a major issue facing IT management. IT outsourcing has evolved from outsourcing IT functions externally, to Application Service Provider’s (ASP’s) and now to the next phase of IT outsourcing: utility computing (UC). UC as defined in this research turns computing infrastructure into a flexible, on demand pay per use service. Drawing on theories in trust, production economics, IT chargeback, transaction cost economics, and business strategy, this research proposes a conceptual model, in which UC providers’ trustworthiness, budgeting advantages, transaction costs, and organization strategies are identified as the salient antecedents of UC acceptance. This research is one of the first to examine the antecedents of UC acceptance and could provide early insights for potential UC adopter firms and UC providers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Unregulated IT - Beyond Utility Computing

The concept of buying an organization's computing needs on a pay-as-you-go basis is known as Utility Computing. In this model, organizations pay for the usage of applications, either to Information Technology (IT) departments or to an external technology vendor. This approach is similar to the way consumers pay for utility services like electricity, gas, and water. Though the Utility Computing ...

متن کامل

Preparing for utility computing: The role of IT architecture and relationship management

In this paper we examine the likely impact of utility computing on information technology (IT) outsourcing. Drawing on a set of eleven outsourcing cases and on IT outsourcing literature, we identify four risks that lessen the potential benefits of IT outsourcing. We consider two approaches to outsourcing: selectively managing a network of outsourcing partners and managing large-scale exclusive ...

متن کامل

Energy Aware Resource Management of Cloud Data Centers

Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004