Strategies For Resolving Employee Access And Identity Management Issues In Cloud Computing: A Case Study Of ABC Web Development Company

Organizational background

Describe about the Affective Commitment to Change and Innovation Implementation Behavior?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

There was a time when Information Technology was considered as a secondary function in the organization. With spread of technology, Information System has emerged as important business function. There was a time when Information Systems were used primarily by large organizations only. With time, the cost of Information Technology has reduced and today IT is being used by large as well as small organizations. Still today, small size companies do not find it easy to afford the high costs of Information Technology. One of the ways for small organizations to overcome the cost of Information Technology to use IT as a service through cloud computing. It can be said that cloud computing has emerged as a powerful way of operations in last decade or so. With the help of cloud computing even small organizations can use IT without installing hardware and software at their premises. Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources (Friedman, 2013). Clouds can be classified as public, private or hybrid. The companies like Google and Yahoo offer cloud solutions to end customers as well as individuals. In today’s world, Google Mail is one of the best example of cloud computing. In the case of cloud computing the data of company would be stored in a shared server. With cloud computing the employees if the firm would get the access through a server that could be located anywhere. One of the disadvantages of cloud computing is that employees can face certain access management issues.

The objective of this paper is to analyze and discuss the strategies for the resolution of employee access and identity management issues in a small IT organization dealing with Cloud computing. A brief organizational background and specific issues can be discussed as:

The organization is a small website development company by the name of ‘ABC Web Development Company’. The company operates in computer industry and it is into operations for last 20 years. The company is based out in Sydney and it has its presence in various parts of Australia. The company has small employee strength of 200 employees spread across its offices in Australia. The organizations used cloud computing as a service. The information of the organization is shared on a private and restricted cloud and only users with authorization can access the cloud. The objective of this research work would be to identify the access management issues for employees and develop the strategies to resolve these issues. The purpose, aims and specific research questions of this project can be discussed as:

This research would be done only for ABC Company. This research would be used to help ABC to overcome the access management issues. In the current scenario all the employees have to perform double authentication before accessing the computer systems of the company. Not all the employees are comfortable with the current cumbersome process. The specific research questions for this research project can be discussed as:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Purpose and aims

Identify all the access and identify management issues for ABC Company on their private cloud.

Develop strategies and policies to overcome the identify management issues.

Develop short term and long-term resolution strategies.

There has been a lot of work done in the field of cloud computing. The biggest benefit of cloud computing is that it helps organizations to save the cost. The process of controlling identity, access and delivery of services was relatively simple when employees only had one desktop computer to log in to every morning. Unfortunately, that is no longer the case for most organizations now. ABC Company has a network of computer systems and the employees of the company would login into the network of the company and not just a computer system. Different computer systems of the company are on a single network and this network can be accessed through a cloud system.

This research work would be most significant for small size and mid size companies. This research work should help the small companies, which want to make decisions about the use of cloud computing in their environment. This research work should be able to answer the doubts and issues of small companies who are anxious about the use of cloud computing.

This project would include a mixed method of research. The mixed method of research would use a combination of both primary and secondary research. Any project is executed best when both primary and secondary research are used (McCalman, 2008). The primary and secondary research that would be used for this project can be discussed as:

The primary research for this project would use the information that would be collected directly from the management and employees of ABC Company. As a part of primary research, two questionnaires would be developed. One of the questionnaires would be developed specifically for management and other questionnaire would be developed for the employees of ABC. The question in the survey would be both open ended and close ended in nature. The ratio between close ended and open-ended questions would be 80% to 20%. It is always good to use more of close-ended questions so that respondents find it easy to answer (Armenakis, 2007). The management of the company would be asked certain open-ended questions but it is better to avoid open-ended questions to employees of ABC. The questionnaires would be mailed to management and employees of the company through emails. The respondents would be asked to fill the questions and mail back.

As a part of this research, a sample size of 100 participants would be considered. It would include 90 employees of the company and 10 people from management. A sample of the questions for management and employees of the company can be discussed as:

The secondary research for this research work would consists of study on Internet and other sources. The websites on Internet and online library would act as great source of information for this research project. It would be important to mention that secondary research would include studying only the reliable websites. Not all the websites on the Internet has genuine content. It is important to refer only the peer-reviewed journals (Seatter, 2014). The secondary research for this project would continue along with primary research.

Project approach and design

The secondary research for this research work would also include the literature review of vast literature. A brief literature review for this research can be discussed as:

(Byrne & Lynn, 2007) have highlighted the benefits of cloud computing for small and mid-size organizations. It is important that organizations must have both short term and long-term plans for the use of Information Technology. An important part of IT strategy of small organization is the emphasis on cloud computing. Along with the benefits of cloud computing, organizations must also focus on the risks of cloud computing. A risk assessment plan would help organizations to avoid the risks in short term and mitigate the risks in long term.

(Stegmaier & Sontagg, 2009) discussed the various resolution strategies for access management system for organizations that uses cloud computing. It can be said that employee involvement should be high in order to overcome the risks of access management issues. It is important that employees should be provided adequate training in order to help them to overcome the access and identification management issues. The support from senior stakeholders is also required to ensure that the issues of employees can be overcome. It is important that management should also develop a strategic plan to overcome the issues. The issues of access management and identification management can also bring in certain chain management issues. It is important that management should have polices and strategies to overcome the change management issues that may come up with access management and identification issues (Zhang & Xu, 2011).

Any research work should starts with the ‘issues identification’ phase. This phase should thought of a phase where the underlying issues to conduct the issues would be decided. The detailed project plan for this research work can be discussed as:

Phase

Timelines

Comments

Issue identification

2 weeks

It would be the phase where issues would be identified and foundation of research work would be done

Research objective and background

2 weeks

It would be the phase where specific research objectives would be laid down and research questions would be formulated

Primary research

6 weeks

It would be the phase where the questionnaire would be emailed to participants

Secondary research

6 weeks

It would be the phase research would be done on Internet. This phase would start along with primary research and would end with primary research

Data Collection

5 weeks

It would be the phase in which data would be collected from various respondents

Data Analysis

4 weeks

It would be the phase where data would be analyzed. The tools like SPSS and Microsoft Excel would be used to analyze the data

Research Output

3 weeks

It would be the phase where research would be concluded and research output would be formulated

Reporting

2 weeks

It would be the phase where the results of the research would be made public.

There would be various risks that would surround this research project. The risks for this project would include social risks as well as technological risks. Another important risk is the delay in the execution of the project or time slippage issues. A risk mitigation plan for different risk can be discussed as:

Risk

Probability

Impact

Mitigation strategy

Timeline slippage (This risk would occur if the project plan is not followed)

High

Medium

It is important there should be a check point at each of the milestone and a buffer should be added to the timelines

Primary research risks (There is always a risk if the participants would provide true and unbiased information or not)

Medium

High

It is important that data should be filtered to remove the bias and it is also important that simple questions should be asked to participants so that they can provide true information

Secondary research risks (There is always a risk if some false information is collected from a website)

Low

Medium

It is important that only reliable websites should be referred and only peer reviewed journals should be used as part of this research

Legal risks (It is important that all the legal guidelines should be followed)

Low

Medium

It is important that researcher should take the services of a legal council that would guide researcher

Ethical risks (It is important that none of the unethical practices should be followed)

Medium

Medium

It is important that researcher should remain motivated through out the research duration

One of an important part for any research project is the ethical consideration. In this research project there would be ethical considerations form the side of researcher as well as from the side of participants. It is expected that the participants would show high ethical standards while answering the questions. It is important that the participants would not provide any false information. At the end of research, it is expected that he would not use the data and information for any other purposes. The information that would be collected with primary research would be kept truly confidential and would not be shared with any other individuals or agency (Frattini, 2011). It is important the researcher should sign the contract wherein he would be legally abided to not to share the data collection part. In addition, the personal information of the employees and managers who would participate in this research work would also be kept confidential.

Primary research

The success or failure of any research work would not only depend on the way project is executed but it would also depend on the way the results of the project are communicated to the outside world. It is expected that a research project would be developed that would be shared with the audience (Schroth, 2008). It is important the researcher should consent with all the members of the research before publishing the research report.

For this research work, a well-structured report would be developed as a document file. The document would also have a section of executive summary that would detail down the research results. In addition to a document, a small presentation using Microsoft PPT would also be made that would highlight the research work and research results in 10 slides. This presentation would be helpful for those who just want to get a high-level idea of the research.

References

Akgün, A. E., Byrne, J. C., Lynn, G. S., & Keskin, H. (2007). Organizational unlearning as changes in beliefs and routines in organizations. Journal of Organizational Change Management, 20(6), 794-812.

Anderson, D., & Anderson, L. A. (2010). Beyond change management: How to achieve breakthrough results through conscious change leadership. John Wiley & Sons.

Chiaroni, D., Chiesa, V., & Frattini, F. (2011). The open innovation journey: how firms dynamically implement the emerging innovation management paradigm.Technovation, 31(1), 34-43.

Michaelis, B., Stegmaier, R., & Sonntag, K. (2009). Affective commitment to change and innovation implementation behavior: The role of charismatic leadership and employees’ trust in top management. Journal of Change Management, 9(4), 399-417.

Paton, R. A., & McCalman, J. (2008). Change management: A guide to effective implementation. Sage.

Oakland, J. S., & Tanner, S. (2007). Successful change management. Total Quality Management and Business Excellence, 18(1-2), 1-19.

Walker, H. J., Armenakis, A. A., & Bernerth, J. B. (2007). Factors influencing organizational change efforts: an integrative investigation of change content, context, process and individual differences. Journal of Organizational Change Management, 20(6), 761-773.

Feng, D. G., Zhang, M., Zhang, Y., & Xu, Z. (2011). Study on cloud computing security. Journal of Software, 22(1), 71-83.

Friedman, B., Kahn Jr, P. H., Borning, A., & Huldtgren, A. (2013). Value sensitive design and information systems. In Early engagement and new technologies: Opening up the laboratory (pp. 55-95). Springer Netherlands.

Poole, B. J., & Sky-McIlvain, E. (2014). Education for an information age.

Grabner, I. (2014). Incentive system design in creativity-dependent firms. The Accounting Review, 89(5), 1729-1750.

Jiménez-Jiménez, D., & Sanz-Valle, R. (2008). Could HRM support organizational innovation?. The International Journal of Human Resource Management, 19(7), 1208-1221.

Kenrick, D. T., Neuberg, S. L., Griskevicius, V., Becker, D. V., & Schaller, M. (2010). Goal-Driven Cognition and Functional Behavior The Fundamental-Motives Framework. Current Directions in Psychological Science, 19(1), 63-67.

Lozano, R., Ceulemans, K., & Seatter, C. S. (2014). Teaching organisational change management for sustainability: designing and delivering a course at the University of Leeds to better prepare future sustainability change agents.Journal of Cleaner Production.

Schroth, H. A. (2008). Helping you is helping me: Improving students’ ethical behaviors in a negotiation by appealing to ethical egoism and the reputation effect. Negotiation and Conflict Management Research, 1(4), 389-407.

Talke, K., & Heidenreich, S. (2014). How to Overcome Proâ€ÂChange Bias: Incorporating Passive and Active Innovation Resistance in Innovation Decision Models. Journal of Product Innovation Management, 31(5), 894-907.

Thom, J., Millen, D., & DiMicco, J. (2012, February). Removing gamification from an enterprise SNS. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (pp. 1067-1070). ACM.

Van den Heuvel, M., Demerouti, E., Bakker, A. B., & Schaufeli, W. B. (2013). Adapting to change: The value of change information and meaning-making.Journal of Vocational Behavior, 83(1), 11-21.

Yuan, K., Le, V. N., McCaffrey, D. F., Marsh, J. A., Hamilton, L. S., Stecher, B. M., & Springer, M. G. (2012). Incentive Pay Programs Do Not Affect Teacher Motivation or Reported Practices Results From Three Randomized Studies.Educational Evaluation and Policy Analysis, 0162373712462625.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP