نوع مقاله : مقاله پژوهشی
نویسندگان
1 گروه مهندسی فناوری اطلاعات، دانشگاه سیستان و بلوچستان، زاهدان، ایران.
2 کارشناسی ارشد مهندسی فناوری اطلاعات، دانشکده مهندسی برق و کامپیوتر دانشگاه سیستان و بلوچستان، زاهدان، ایران.
3 کارشناسی ارشد مهندسی کامپیوتر، مدیریت امور آموزشی دانشگاه سیستان و بلوچستان، زاهدان، ایران.
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
Abstract
Today, information and communication technology in the world has progressed at an unimaginable speed, this technology has caused synergy due to convergence, however, threats such as information security and privacy of people are related to these technologies. This research was conducted with a qualitative and quantitative combined approach in three stages of open coding, central coding and selective coding. In order to validate the model, the interpretive research criteria of trustworthiness, transferability, dependability, and verifiability were used, and in order to measure the reliability of the interview, the within-subject agreement method was used. Finally, a questionnaire was designed to prioritize the challenges and the challenges were prioritized using the AHP method. The results showed that two infrastructure challenges and management-security challenges were identified as cloud-based enterprise architecture adoption challenges, the infrastructure challenge includes three sub-components of communication infrastructure, processing infrastructure and software challenges. In general, 29 coders were obtained through interviews. Finally, among the challenges, the management-security challenge was recognized as the most important challenge. Also, the security challenge was introduced as the most important sub-component of the management-security challenge and the software challenge as the most important sub-component of the infrastructure challenge in small and medium-sized companies.
Introduction
Modern organizations require continuous changes in their business to stay competitive. Many face challenges in aligning business processes with technology, especially in response to environmental changes. Enterprise architecture serves as a tool for managing change and helps control this process, but a lack of awareness of its challenges can lead to wasted time and costs. The development of information technology and cloud computing approaches has added complexities to IT governance. Cloud computing offers companies an opportunity to increase their capacities and provide rental services without the need for investing in infrastructure. Cloud computing for small and medium-sized enterprises (SMEs) provides advanced technologies, high security, and enhanced capabilities, creating opportunities for growth and improved access to services, while adding strategic and operational value. Using cloud computing can help improve business operations and create real advantages for small and medium-sized enterprises (SMEs), but its adoption is still not satisfactory. Major challenges include the lack of specific standards, technological readiness, awareness, security issues, and trust concerns. In the literature, understanding the behavior of cloud computing adoption in SMEs—especially in developing countries—has not been sufficiently explored. Existing limited studies mainly focus on technical and initial aspects, and criticisms have been raised due to exploratory research and a focus on developed countries. Organizational architecture is also evolving and advancing; rich organizational architecture research describes the current state, but a comprehensive analysis of the challenges related to cloud architecture is necessary. Today, researchers have examined enterprise architecture from various perspectives, and numerous studies have been conducted regarding its frameworks and models. Additionally, success factors for enterprise architecture in organizations that have adopted it have been identified. Research highlights the benefits and challenges of adopting enterprise architecture, especially in small and medium-sized enterprises. The aim of this study is to understand and prioritize the challenges of adopting cloud-based enterprise architecture.
Case study
Numerous studies have been conducted related to enterprise architecture and cloud computing. Velayi and Mohemdi-Sefat (1400) designed a native cloud computing architecture model for the defense sector and provided frameworks for implementing local cloud computing. Farahi and Kardanian Maleki-Nejad (1399) emphasized the importance of cloud computing in human resource management and reducing maintenance costs. D’Pier and colleagues (1393) highlighted the significance of security architecture in cloud services, while Jafari (1392) examined various deployment models of cloud computing, such as public and private clouds. Alonso et al. (2023) provided a comprehensive overview of the challenges and multi-cloud architecture models in native application development and analyzed research trends in this field. Additionally, Achar (2022) demonstrated that cloud-based architecture can improve energy efficiency in software development and deployment processes, and Yu (2011) explored concepts and policies related to cloud computing architecture. Khalid Khan (2009), focusing on the impact of cloud computing features on enterprise architecture, identified challenges such as reduced organizational control over data and technology.
Although extensive research has been conducted in the field of enterprise architecture and cloud computing, there has yet to be a study specifically examining the challenges of adopting cloud-based enterprise architecture in small and medium-sized enterprises. Therefore, the aim of this research is to investigate and analyze the challenges of adopting this type of architecture in small and medium-sized companies.
Materials and Methods
This study is based on an applied categorization goal and, in terms of implementation, employs a mixed (qualitative-quantitative) exploratory approach. The statistical population for the qualitative part includes experts in the fields of management and information technology, such as IT engineers and managers, who were selected through purposive sampling; 11 faculty members in the field of information technology engineering were chosen as the sample. In evaluating the quality of qualitative research, scientific rigor and accuracy replace the traditional validity and reliability criteria used in quantitative studies, since there are no specific tests for validity in qualitative research, and validity has a different meaning. During data collection and interpretation, both processes should be evaluated and validated. For the reliability of interviews, an intra-coder agreement method was used with two coders, resulting in an overall reliability of 78%, which exceeds the minimum threshold of 60% and is therefore confirmed. In the quantitative section, a pairwise comparison questionnaire was used for data collection, with its validity confirmed by expert faculty members. Reliability was assessed using the inconsistency index; if the inconsistency is less than 0.1, the questionnaire is considered valid. To identify challenges related to the adoption of enterprise architecture, multi-criteria decision-making models and the AHP technique were employed. The analysis steps included constructing a decision tree, designing an expert questionnaire, determining the weights of criteria, conducting pairwise comparisons of options, calculating priorities, and measuring consistency ratio. The data were analyzed using SPSS21 and Excel software.
Discussion and Results
This text examines the growing trend of cloud technology adoption in companies within the country and emphasizes its importance in improving organizational architecture. Despite the numerous benefits of cloud computing, the lack of a native secure model has led companies to resort to non-indigenous models, which creates challenges related to security and management. Interviews indicate that the main challenges in implementing cloud architecture fall into two categories: infrastructural (such as communications, processing, and software) and managerial-security (such as service management, operations, and security). Additionally, issues like the risk of infiltration and malicious attacks have been identified as common security challenges in various studies. The development of communication networks, a revolution in access to information, and the creation of global communities have made the need for robust infrastructure, proper maintenance, and management within organizations and technical, military, and research centers increasingly essential. Consequently, rapid technological advancement and the importance of planning and control in utilizing computing technologies are key points to prevent potential crises in this field. In this study, the results obtained from the AHP method indicated that the most significant challenges in cloud technology adoption are related to management-security issues, with security ranking first. Infrastructure challenges are in second place, and within this category, software challenges hold the highest priority. Security, as one of the key components, plays an important role in building user trust, and neglecting security controls can pose serious threats to companies. The aim of the study is to examine the challenges of adopting cloud-based enterprise architecture in small and medium-sized enterprises, which, as a result of international developments and standards—especially in the fields of electronic services and risk management—have experienced an increase in the type and severity of these challenges. Small and medium-sized companies need to prepare themselves to face these challenges.
Conclusion
To increase customer satisfaction, small and medium-sized enterprises must go beyond their clients' economic needs and develop a deep understanding of their customers. Achieving this goal requires suitable technical and business infrastructure, including the integration of customer information across all communication channels and the use of advanced analytical tools. Strategic utilization of cloud computing technology enables quick and cost-effective investment evaluation, data sharing, and process improvement. As a result, developing and localizing information technology within a cloud computing ecosystem necessitates coordination between industry, academia, and government. Challenges such as security, infrastructure, and organizational architecture must be addressed through cultural promotion and training. Additionally, small and medium-sized companies should focus on overcoming challenges related to communication infrastructure, cloud-based organizational architecture, and security, and find appropriate solutions for managerial and security issues. Ultimately, developing a cloud-based organizational architecture and paying attention to software and security concerns are key to progress in the country's information exchange environment.
کلیدواژهها [English]