The Role of Knowledge Business Analysis in management of Cloud Computing Data (Case study: Knowledge-Based Companies of Tehran University)

Document Type : Case study

Authors

1 Assistant Professor, School of Management, Imam Hussein University, Tehran, Iran

2 Master of Information Technology Management, Islamic Azad University, Central Tehran Branch, Tehran, Iran

Abstract

Cloud computing is the latest technology response to meet the human need for heavy calculations. This study examines the impact of business analysis of knowledge -based management of cloud computing data due to the mediating role of data -oriented culture and rationality decision-making of cloud computing data; therefore, the present study was an applied study in terms of the purpose of the data and has been used by a descriptive survey method. The statistical population of the present study, the experts of the cloud computing field of knowledge -based companies in Tehran Science and Technology Park (University of Tehran) were 135. In the present study, the census method was used to collect data because of the limited number of members of the statistical population (135).The Standard Questionnaires as the data collection were from Wang et al. (2020), Kao (2015), Dylan and Demirkan (2013), Kayern et al., Kayern and Shokli (2011),and  Chang and Lynn (2007). The validity and reliability was reviewed and approved. Data analysis was also performed in both descriptive and inferential statistics. To test the hypotheses and fit of the model, the modeling technique of structural equation and minimum square minimum and Smart Pls2 software were used. The results showed that business analysis had a positive and significant effect on data -based culture and data culture on rationality of cloud computing data. Also, the rationality of cloud computing data has a significant positive effect on the management of cloud computing data.

Keywords


Agarwal, M., & Srivastava, G. (2019). “Big” Data Management in Cloud Computing Environment. Harmony Search and Nature Inspired Optimization Algorithms, 707-716.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.
Almolhis, N., Haney, M., & Alqhtani, F. (2019). Discovering and Understanding The Security Issues In IoT Cloud. International Journal of Computer Science and Security, 13(6), 255-265.
Armbrust, M., Fox, A., Griffith, R., & al, e. (2010). A view of cloud computing. Communications of the ACM, (4), 50–58.
Azam, A., Boari, C., & Bertolotti, F. (2018). Top management team international experience and strategic decision-making. Multinational Business Review, 26(1), 50-70.
Brunner, M., Sillaber, C., Demetz, L., & Manhart, M. (2019). Towards data-driven decision support for organizational it security audits. Information Technology, 60(4), 207–217.
Cao, G. (2015). The affordances of business analytics for strategic decision-making and their impact on organisational performance. Pacific Asia Conference on Information Systems, 1–17.
Cao, G., & Duan, Y. (2014). A path model linking business analytics, data- driven culture,and competitive advantage. European Conference on Information Systems, 1–17.
Cerreia-Vioglio, S., Giarlotta, A., Greco, S., & Maccheroni, F. (2020). Rational preference and rationalizable choice. Economic Theory, 69, 61–105.
Chang, S. E., & Lin, C. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438–458.
Chiang, R., Grover, V., Liang, T., & Zhang, D. (2018). Strategic value of big data and business analytics. Journal of Management Information Systems, 35(2), 383-387.
Choi, M., & Park, E. (2016). The influences of enterprise management strategy on information security effectiveness. International Journal of Applied Engineering Research and Development, 11(15), 8686–8694.
Davenport, T. J. (2006). Competing on analytics. Harvard Business Review, 84(1), 98–107.
Dhami, M. K., & Thomson, M. E. (2012). On the relevance of cognitive continuum theory and quasirationality for understanding management judgment and decision making. European Management Journal, 30(4), 316–326.
Dremel, C., Herterich, M., & Wulf, J. (2020). Actualizing big data analytics affordances: A revelatory case study. Information & Management, 57(1).
Duan, Y., Cao, G., & Edwards, J. (2020). Understanding the impact of business analytics on innovation. European Journal of Operational Research, 281(3), 673-686.
Edwin, E., Umamaheswari, P., & Thanka, M. (2019). An efficient and improved multi-objective optimized replication management with dynamic and cost aware strategies in cloud computing data center. Cluster Computing, 22, 119-128.
Esposito, C., De Santis, A., & Tortora, G. (2018). Blockchain: A panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing, 5(1), 31-37.
Karaboğa, T., Zehir, C., & Karaboğa, H. (2019). Big Data analytics and firm innovativeness: the moderating effect of data-driven culture. The European Proceedings of Social & Behavioural Sciences, 526-535.
Kiron, D., Prentice, P. K., & Ferguson, R. B. (2012). Innovating with analytics. Mit Sloan. Management Review, 54(1), 47-52.
Kumar, P., Raj, P., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
Loske, A., Widjaja, T., & Buxmann, P. (2013). Cloud computing providers’ unrealistic optimism regarding it security risks: A threat to users?. Thirty Fourth International Conference on Information Systems, 1–20.
Rao, B. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92, 128-135.
Tim, Y., Hallikainen, P., Pan, S., & Tamm, T. (2020). Actualizing business analytics for organizational transformation: A case study of Rovio Entertainment. European Journal of Operational Research, 281(3), 642-655.
Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387-394.
Winkel, O. (2007). Electronic government and network security: A viewpoint. Transforming Government People Process and Policy, 1(3), 220–229.