iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/S13198-021-01461-9
Risk management of project information system operation and maintenance based on Cloud Computing | International Journal of System Assurance Engineering and Management Skip to main content

Advertisement

Log in

Risk management of project information system operation and maintenance based on Cloud Computing

  • Original article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

In this experiment, according to the actual situation and content of the project information system operation and maintenance project, combined with the systematic research of relevant literature, the paper proposes to combine the coupling matrix method with the expert survey method to identify the risk factors in the operation and maintenance of engineering project information system. According to the results of risk factors identification, the risk evaluation system is established, and the corresponding risk matrix is constructed, and the risk organization structure is established to complete the risk control. The results show that the top three factors of occupation risk occurrence probability are spare parts arrival and damage (95%), cloud platform data backup and archiving (91%), change control process (90%); the top three factors of occupation risk value are cloud platform data backup and archiving (86.45%), spare parts and arrival (84.55%), change control process (83.70%); the above results show that the operation and maintenance risk of project information system Management should focus on spare parts arrival and damage, cloud platform data backup and archiving, change control process, and other risk factors in high-risk areas. At the same time, the risk management and control measures should be targeted, and the measures taken are different according to the degree of risk; the establishment of the project information system operation and maintenance risk management organization based on the management team structure is conducive to the operation and maintenance risk management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  • Abdulrahman Almutairi, Sarfraz MI, Ghafoor A (2018) Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Trans Cloud Comput 6:168–181

    Article  Google Scholar 

  • Akhilesh Mahesh et al (2019) Cloud risk resilience: investigation of audit practices and technology advances–a technical report. Int J Risk Conting Manag 8:66–92

    Article  Google Scholar 

  • Alghamdi BS et al (2019) A context establishment framework for cloud computing information security risk management based on the STOPE view. Int J Netw Secur 21:166–176

    Google Scholar 

  • Ali et al (2018) Development of a context-aware framework for the integration of internet of things and cloud computing for remote monitoring services. Procedia Manuf 16:31–38

    Article  Google Scholar 

  • Al-Rousan T (2017) Cloud computing for global software development: opportunities and challenges. IEEE Trans Cloud Comput 5(2):19–30

    Google Scholar 

  • Antoinette L. Smith, Zhang YJ, Kipp PC (2019) Cloud-computing risk disclosure and icfr material weakness: the moderating role of accounting reporting complexity. J Inf Syst 33(3):1–17

    Google Scholar 

  • Bedi SK (2017) Security measures to protect sensitive customer data in cloud computing. Asian J Manag 8(1):12–18

    Article  Google Scholar 

  • Colombo-Mendoza Luis Omar et al (2020) A knowledge-based multi-criteria collaborative filtering approach for discovering services in mobile cloud computing platforms. J Intell Inf Syst 54(1):179–203

    Article  Google Scholar 

  • Gupta S (2017) Modeling trust based risk management in cloud adoption using fuzzy inference system. Int J Technol Diffus 8(1):52–60

    Article  Google Scholar 

  • Maniah et al (2019) Survey on threats and risks in the cloud computing environment. Procedia Comput Sci 161:1325–1332

    Article  Google Scholar 

  • Marnewick C (2017) Information system project’s sustainability capabality levels. Int J Project Manag 35(6):1151–1166

    Article  Google Scholar 

  • Masky Mackita, Shin SY, Choe TY (2019) ERMOCTAVE: a risk management framework for IT systems which adopt cloud computing. Future Internet 11(9):1–20

    Google Scholar 

  • Ruilong Deng et al (2017) Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things J 3:1171–1181

    Google Scholar 

  • Samer Alhawari, Jarrah MAA, Hadi W (2017) Implementing risk management processes into a cloud computing environment. Int J Web Portals 9:1–12

    Article  Google Scholar 

  • Soofi Aized Amin, Irfan Khan M (2017) A review on data security in cloud computing. Int J Comput Appl 96:95–96

    Google Scholar 

  • Wei Wei et al (2018) Imperfect information dynamic stackelberg game based resource allocation using hidden markov for cloud computing. IEEE Trans Serv Comput 11:78–89

    Article  Google Scholar 

  • Yahya Al-Dhuraibi et al (2018) Elasticity in cloud computing: state of the art and research challenges. IEEE Trans Serv Comput 11:430–447

    Article  Google Scholar 

  • Yuli Tian, Tian J, Li N (2020) Cloud reliability and efficiency improvement via failure risk based proactive actions. J Syst Softw 163:110524.1-1105241.2

    Google Scholar 

  • Zhihua Xia et al (2017) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics & Secur 11:2594–2608

    Google Scholar 

Download references

Funding

There is no project fund to support the work of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qunying Mao.

Ethics declarations

Conflict of interest

We declare that there is no conflict of interest.

Informed consent

Informed consent was obtained from all individual participants included in the study references.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mao, Q. Risk management of project information system operation and maintenance based on Cloud Computing. Int J Syst Assur Eng Manag 14, 176–187 (2023). https://doi.org/10.1007/s13198-021-01461-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-021-01461-9

Keywords

Navigation