Professional Documents
Culture Documents
Tien-Chun Chen
I.
INTRODUCTION
18 | P a g e
www.ijacsa.thesai.org
LITERATURE REVIEW
Salesforce.com
force.com, VMforce
Amazon EC2
Microsoft Azure
Attenda RTI
IaaS
PaaS
providers
SaaS
On-demand CRM (e.g. Salesforce.com)
On-demand email (e.g. hosted Exchange.
Google Mail)
On-demand ERP (e.g. NetSuite)
Many other ISV offerings
19 | P a g e
www.ijacsa.thesai.org
High
(10)
Loss Prevention
Probability
Avoidance
II
(5, 5)
IV
Retention
Low
(1)
Low (1)
III
Transfer or
Insurance
Consequence
High (10)
20 | P a g e
www.ijacsa.thesai.org
(1)
21 | P a g e
www.ijacsa.thesai.org
(2)
where
wi = the weighted priority for component i,
J = index number of columns (components),
I = index number of rows (components).
comparisons
matrices
of
(3)
For example, the super-matrix representation of a hierarchy
with three levels is as shown in Fig. 4(a) is as follows
(Formula 4) [32]:
(4)
Where w21 is a vector that represents the impact of the goal
on the criteria; w32 is a matrix that represents the impact of
criteria on each of the alternatives; I is the identity matrix; and
entries of zero correspond to those elements that have no
influence. For the above example, if the criteria are interrelated
among themselves, the hierarchy is replaced by a network, as
shown in Fig. 4(b). The (2, 2) entry of wn given by w22 would
indicate the interdependency, and the super-matrix would be as
follows (Formula 5):
(b)
Goal
Goal
w21
Criteria
w21
Criteria
w32
Alternative
w32
Alternative
w22
(5)
Note that any zero in the super-matrix can be replaced by a
matrix if there is an interrelationship of the elements in a
component or between two components. Since there usually is
interdependence among clusters in a network, the columns of a
super-matrix usually sum to more than 1. The super-matrix
must first be transformed to make it stochastic; that is, each
column of the matrix sums to unity. An approach
recommended by Saaty [34] is to determine the relative
importance of the clusters in the super-matrix with the column
cluster (block) as the controlling component [33]. That is, the
row components with nonzero entries for their blocks in that
22 | P a g e
www.ijacsa.thesai.org
Goal
UD
SD
R2 R3 R2 R3 R2 R3 R2 R3 R2 R3
Criteria
Agreement or Contract
Privacy
Jurisdiction
Sub-Criteria
Figure 5. Network form for this paper.
Burglary
Damaged or spoiled by
employees result from intention
or accidental
Natural Disaster
System Vulnerability
Social Engineering
Cross-Cloud Compatibility
Sig.(2-tailed)
(=0.05)
0.000
-1.000
-1.000
-1.000
1.000
0.317
0.317
0.317
-1.732
0.083
-1.000
-1.342
-1.000
-1.000
0.317
0.180
0.317
0.317
-1.000
0.317
-1.732
0.083
23 | P a g e
www.ijacsa.thesai.org
Max
Min
Mean
Agreement or Contract
Privacy
Jurisdiction
Burglary
Damaged or spoiled by
employees result from
intention or accidental
Natural Disaster
Normal Wear and Tear or
Malfunction
System Vulnerability
Social Engineering
Mistakes are made by
employees intentionally or
accidentally
Cross-Cloud Compatibility
6
6
6
6
5
5
5
5
4
4
4
4
4.8
4.8
4.7
4.8
Std.
Dev.
0.4
0.4
0.5
0.4
4.8
0.4
5.0
0.0
5.0
0.0
6
6
5
5
5
5
5.0
5.0
0.0
0.0
4.7
0.5
4.8
0.4
3.1.2 Privacy
3.1.3 Jurisdiction
3.2.1 Burglary
Goal
2.2 Hardware
1/2
NonHardware
1/3
Weights
(e-Vector)
0.0938
1/4
0.1666
0.7396
Goal
Legality
Hardware
Legality
Hardware
NonHardware
2
3
24 | P a g e
www.ijacsa.thesai.org
Frequency
Agreement or Contract
0.4934
Privacy
0.3108
Jurisdiction
0.1958
Burglary
0.1936
0.3564
Natural Disaster
0.1243
0.3257
System Vulnerability
0.1906
Social Engineering
Jurisdiction
System Vulnerability
Burglary
Cross-Cloud Compatibility
Social Engineering
0.4182
0.1205
0.2707
Damaged or spoiled by
employees result from
intention or accidental
Natural Disaster
Mistakes are made by
employees intentionally
or accidentally
The inner dependence network maps of criteria and subcriteria were illustrated by experts as follows. (see Fig. 7 and
Fig. 8)
Legality
Criteria
Hardware
Agreement
or Contract
Non-Hardware
2.1 Legality
2.2Hardware
2.3 Non-Hardware
Geometric mean
Frequency
(Rank)
0.25 (2)
0.14645 (3)
0.60355 (1)
0.280617152
Severity
(Rank)
0.40702 (2)
0.06199 (3)
0.53099 (1)
0.237505995
25 | P a g e
www.ijacsa.thesai.org
Frequency
(Rank)
Severity
(Rank)
0.06947 (7)
0.07497 (7)
3.1.2 Privacy
0.07854 (4)
0.09689 (4)
3.1.3 Jurisdiction
0.06377 (8)
0.09575 (5)
3.2.1 Burglary
0.04295 (9)
0.03061 (9)
0.0723 (6)
0.04421 (8)
0.01007 (11)
0.01246 (10)
0.0264 (10)
0.00405 (11)
0.07274 (5)
0.09311 (6)
0.17236 (2)
0.09754 (3)
0.14337 (3)
0.19201 (2)
Geometric mean
0.067289379 0.057189441
26 | P a g e
www.ijacsa.thesai.org
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
27 | P a g e
www.ijacsa.thesai.org