Abstract:Cloud computing and cloud applications are emerging as the latest technology.Cloud applications are developing very fast and adopted by most of the firms around the globe. The cloud applications are widely accepted and considered as a notion of the digitized era, but the cloud product lifecycle management (PLM) is not adopted much in Indian firms. Cloud PLM is an upcoming cloud application, but its adoption entails various challenges. Considering this fact, the paper aims to empirically investigate the critica… Show more
“…However, project management in interestingly discussed in one paragraph, providing precious insight about the management of such projects: Even if led by equal rights between the business unit and IT, PLM upgrade still had been perceived as a pure IT project. Singh [11] challenges only the transition to the cloud and does not address data migration itself. It is understood that this is an isomorphic migration and that systems are unlikely to evolve between on-premise PLM and cloud PLM.…”
As product lifecycle management is starting to be a standard information system in most companies, a data manipulation issue starts to emerge. Indeed, the information contained in a system often needs to be accessible or even transferred to another one to exploit a new software's functionalities. With the Big Data era, new methods of analysis start to emerge, and the graph visualisation of data enables a better human understanding of the data itself. We propose to address the PLM migration issues with a new approach based on analysis of information system and data topology. The data is passed onto a graph and bundles are made thanks to clustering algorithms; this bundling enables a better understanding of the data and ease migration. However, PLM has links between links which complicate the transition to graphs. Finally, the described use-case proves that data bundling eases the data migration and prevents some usual pitfalls and delays.
“…However, project management in interestingly discussed in one paragraph, providing precious insight about the management of such projects: Even if led by equal rights between the business unit and IT, PLM upgrade still had been perceived as a pure IT project. Singh [11] challenges only the transition to the cloud and does not address data migration itself. It is understood that this is an isomorphic migration and that systems are unlikely to evolve between on-premise PLM and cloud PLM.…”
As product lifecycle management is starting to be a standard information system in most companies, a data manipulation issue starts to emerge. Indeed, the information contained in a system often needs to be accessible or even transferred to another one to exploit a new software's functionalities. With the Big Data era, new methods of analysis start to emerge, and the graph visualisation of data enables a better human understanding of the data itself. We propose to address the PLM migration issues with a new approach based on analysis of information system and data topology. The data is passed onto a graph and bundles are made thanks to clustering algorithms; this bundling enables a better understanding of the data and ease migration. However, PLM has links between links which complicate the transition to graphs. Finally, the described use-case proves that data bundling eases the data migration and prevents some usual pitfalls and delays.
“…- Chemane et al (2005) address the security mechanisms selection problem by proposing a multi-criteria decision-making model for structuring the VPN selection decision problem. - Singh and Misra (2018) empirically investigate the critical challenges encountered by many firms for migration to cloud PLM. A multi-criteria decision-making method, grey Decision Making Trial and Evaluation Laboratory (DEMATEL) along with interpretive structural modelling are employed to identify the causal challenges and their hierarchy to cloud PLM adoption.…”
Section: Multi-criteria Decision-making and Its Usage In The Securitymentioning
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors. A condensed information in information security management framework is very important to a small and medium enterprise as this type of enterprise usually lacks resources for information security expertise and deep analysis. Despite the fact, the information security management process and its frameworks, on the other hand, are very complex and require a big number of different elements. At the moment the comparison it is very shallow, as all properties of the comparison are treated equally important. In real life, the importance of different criteria of information security management framework and their suitability for small and medium enterprise vary. Therefore we use the Analytic Hierarchy Process to construct a hierarchy of information security management frameworks quality and applicability in small and medium enterprise and define the weights for each of the criteria. Weighted criteria express the importance of the criteria and executed the final comparison of alternatives (five information security management frameworks) is more realistic (similar to experts opinion) comparing to existing comparisons.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.