Purpose The university social responsibility (USR) is still in embryonic stage compared to corporate social responsibility (CSR) which is still debatable by researchers. The purpose of this paper is to propose the contemporary dimension (on top of teaching and research dimensions) of USR in most educational institutes. Based on this new definition, a proposal of a mechanism to quantify USR sustainability was presented. Design/methodology/approach Based on a review of the theme of the CSR with the inter-related recent research on USR with researchers perspectives, characteristics of USR were identified and incorporated in the proposed newly definition of USR. The new definition takes into account the interrelationship of university–corporate communication and create shared value (CSV) principle, as well as the knowledgeability and sustainability. Findings Based on the review of most active research in the USR development and the concluded contemporary definition of USR, this paper proposes a new extended version of sustainability suitable for educational institutes, where it is composed of different zones, and each zone was defined in terms of value of sustainability with associated knowledgeability in each zone. The Green Cloud project was taken as a vehicle to demonstrate collaboration between a university and cloud service provider located in Middle East (Dubai). Sustainability quantification was provided with hypothetical numbers to illustrate the technique. Research limitations/implications This paper is focused on University-specific social responsibility rather than general CSR. The proposed contemporary definition of the USR is a hybrid of a mutated latest research on CSR as well as cascaded recent development on USR. The view of this new definition can have different arguments depending on the ideology (communitarianism as opposed to individualism) adopted by specific university admiration of the objective of social responsibility which is sometimes driven by the political and strategic views of countries and the regions. However, the proposed sustainability zone-split between the CSV type of projects and the reputation values (described via hypothetical example) can minimize the gap between the two ideologies. Originality/value This paper attempts to provide a universally acceptable definition of the USR based on different points of views of researchers and tries to accommodate both ideologies toward social responsibility into one coherent framework. The sustainability Venn diagram was extended and made suitable for educational institutes. This approach facilitates the mechanism of quantifying the value of sustainability of a university or educational institutes. Hypothetical “Green Cloud” project was used as a mechanism to show the quantification process.
Purpose Cloud computing is relatively a new type of technology demanding a new method of management techniques to attain security and privacy leading to customer satisfaction regarding “Business Protection” measure. As cloud computing businesses are usually composed of multiple colocation sites/departments, the purpose of this paper is to propose a benchmark operation to measure and compare the overall integrated people-process-performance (PPP) among different departments within cloud computing organization. The purpose of this paper is to motivate staff/units to improve the process performance and meet the standards in a competitive approach among business units. Design/methodology/approach The research method was conducted at Cirrus Ltd, which is a cloud computing service provider where a focus group consists of six IT professionals/managers. The objective of the focus group was to investigate the proposed technique by selecting the best practices relevant criteria, with the relevant sub-criteria as a benchmarking performance tool to measure PPP via an analytic hierarchy processing (AHP) approach. The standard pairwise comparative AHP scale was used to measure the performance of three different teams defined as production team, user acceptance testing team and the development team. Findings Based on best practice performance measurement (reviewed in this paper) of cloud computing, the proposed AHP model was implemented in a local medium-sized cloud service provider named “Cirrus” with their single site data center. The actual criteria relevant to Cirrus was an adaptation of the “Best practice” described in the literature. The main reason for the adaptation of criteria was that the principle of PPP assumes multiple departments/datacenters located in a different geographical area in large service providers. As Cirrus is a type of SMEs, the adaptation of performance measurement was based on teams within the same data center location. Irrelevant of this adaptation, the objective of measuring vendors KPI using the AHP technique as a specific output of PPP is also a valid situation. Practical implications This study provides guidance for achieving cloud computing performance measurement using the AHP technique. Hence, the proposed technique is an integrated model to measure the PPP under monitored cloud environment. Originality/value The proposed technique measures and manages the performance of cloud service providers that also implicitly act as a catalyst to attain trust in such high information-sensitive environment leading to organizational effectiveness of managing cloud organizations.
Purpose – The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud. Design/methodology/approach – A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific. Findings – After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s). Practical implications – Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them. Originality/value – A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.