SlideShare una empresa de Scribd logo
1 de 18
(MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
“Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> 	supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367.  [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
(MC²)² Framework
Processdescribedby (MC²)² ,[object Object]
Useinformationresourcesto find alternatives, criteria, andrequirements
Choose an appropriate multi-criteriadecision-makingmethod
Configuremethodby e.g. definingweights, dependenciesofcriteria
ApplyMethod,[object Object]
Summary:  New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data.  Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees.  Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
C1. Security & Reliability C1.1. Data safety level of the infrastructure  C1.2. Reliability of the infrastructure  C1.3. Data security level in the infrastructure  C1.4. Security level of data transmissions from and to the infrastructure  C2. Benefits C2.1. Number of resources available  C2.2. Green IT: power consumption during usage  C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage  C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection  C3.6. Research costs for hardware  Example – criteria
R1. Trustworthiness of the provider  R2. Green IT: minimum power consumption per hour per server  Example - requirements
Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
Example – configure multi-criteriadecision-makingmethod
Example – evaluationmethod
Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
Example – evaluationmethod
Example - results ANP results: Indices formulas: Indices results:

Más contenido relacionado

La actualidad más candente

sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
Kelly Moscrop
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
 

La actualidad más candente (9)

REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Aa31163168
Aa31163168Aa31163168
Aa31163168
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
 
sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
 
Grid computing 12
Grid computing 12Grid computing 12
Grid computing 12
 
I1803035762
I1803035762I1803035762
I1803035762
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
 
Big Data For Flight Delay Report
Big Data For Flight Delay ReportBig Data For Flight Delay Report
Big Data For Flight Delay Report
 

Similar a (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
SimulationX
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
Anil Sharma
 

Similar a (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing (20)

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard science
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

(MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

  • 1. (MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
  • 2. “Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367. [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
  • 4.
  • 6. Choose an appropriate multi-criteriadecision-makingmethod
  • 8.
  • 9. Summary: New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data. Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees. Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
  • 10. A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
  • 11. C1. Security & Reliability C1.1. Data safety level of the infrastructure C1.2. Reliability of the infrastructure C1.3. Data security level in the infrastructure C1.4. Security level of data transmissions from and to the infrastructure C2. Benefits C2.1. Number of resources available C2.2. Green IT: power consumption during usage C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection C3.6. Research costs for hardware Example – criteria
  • 12. R1. Trustworthiness of the provider R2. Green IT: minimum power consumption per hour per server Example - requirements
  • 13. Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
  • 14. Example – configure multi-criteriadecision-makingmethod
  • 16. Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
  • 18. Example - results ANP results: Indices formulas: Indices results:
  • 19. A3. IaaS > A1. in-house But, bybenefitsonly: A1 > A3 ! Bycosts: A3 < A1 (smallermeansbetter) Example – results – ctd. IaaS
  • 20. (MC²)² canbeimprovedandextended in manyaspects: More IT supportwithintheframework List ofsuitableinformationsystemsthatcansupportthedefinitionof alternatives, criteria, andrequirements Prototype of a systemthatoffers (MC²)² decisionmakingandintegrationwithinformationresources Inclusionofsensitivityanalysisandgroupdecisionaspects Support withthechoiceof MCDM methods … Future work
  • 23.
  • 24. Apply MCDM method on theappropriate alternatives usingdefinedcriteria (+ weights, dependencies)
  • 25.
  • 26. To find alternatives, criteria, requirements, and MCDM method Expert searchandsurveycreationsystems Internal knowledgeordatabaseswith Experiencesfromearlierevaluations Guidelinedocumentsofdepartments Collaborationsystems Data miningtools Literature … Toexternalizeyourexperiencesmadeduringtheuseoftheframework Useofinformationresources…
  • 27. Qualitative vs. Quantitative (non-measurable vs. measurable) Scalesofmeasurement Rules toconsider Completeness and Exhaustiveness Mutually exclusive items only Restrict to criteria of highest degree of importance Examples: Criteria
  • 28. Constraintsfor alternatives A minimumormaximumvalue Examples: Requirements
  • 29. Manymethodsavailable* Outranking: ELECTRE, PROMETHEE TOPSIS, AHP/ANP Bayesian Analysis MAUT, SMART … Chooseoneandconsider Not everymethodresults in a value Not everymethodfitsyourneedsto model criteriadependencies Not everymethodsupports qualitative (non-measurable) criteria well Multi-criteriadecision-makingmethod * Yoon and Hwang (1995), ‘Multi Attribute Decision Making: An Introduction‘, Sage University Paper series on Quantitative Applications in theSocialSciences. Keun Tae Cho (2003), ‘Multicriteria Decision Methods: An Attempt To Evaluate and Unify’, Mathematicaland Computer Modelling. Fülöp (2004), ‘Introduction to Decision Making Methods’, Paper developed for the BDEI-3 Workshop, The Evergreen State College.