SlideShare uma empresa Scribd logo
1 de 18
(MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
“Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> 	supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367.  [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
(MC²)² Framework
Processdescribedby (MC²)² ,[object Object]
Useinformationresourcesto find alternatives, criteria, andrequirements
Choose an appropriate multi-criteriadecision-makingmethod
Configuremethodby e.g. definingweights, dependenciesofcriteria
ApplyMethod,[object Object]
Summary:  New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data.  Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees.  Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
C1. Security & Reliability C1.1. Data safety level of the infrastructure  C1.2. Reliability of the infrastructure  C1.3. Data security level in the infrastructure  C1.4. Security level of data transmissions from and to the infrastructure  C2. Benefits C2.1. Number of resources available  C2.2. Green IT: power consumption during usage  C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage  C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection  C3.6. Research costs for hardware  Example – criteria
R1. Trustworthiness of the provider  R2. Green IT: minimum power consumption per hour per server  Example - requirements
Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
Example – configure multi-criteriadecision-makingmethod
Example – evaluationmethod
Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
Example – evaluationmethod
Example - results ANP results: Indices formulas: Indices results:

Mais conteúdo relacionado

Mais procurados

sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
Kelly Moscrop
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
 

Mais procurados (9)

REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT ...
 
Aa31163168
Aa31163168Aa31163168
Aa31163168
 
Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016Recapitulation Workshop Cloud Reliability Resilience 2016
Recapitulation Workshop Cloud Reliability Resilience 2016
 
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET- Error Reduction in Data Prediction using Least Square Regression Method
IRJET- Error Reduction in Data Prediction using Least Square Regression Method
 
sumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_papersumerian_datacenter-consolidation-white_paper
sumerian_datacenter-consolidation-white_paper
 
Grid computing 12
Grid computing 12Grid computing 12
Grid computing 12
 
I1803035762
I1803035762I1803035762
I1803035762
 
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
 
Big Data For Flight Delay Report
Big Data For Flight Delay ReportBig Data For Flight Delay Report
Big Data For Flight Delay Report
 

Semelhante a (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
SimulationX
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
Anil Sharma
 

Semelhante a (MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing (20)

Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Models in the Cloud
Models in the CloudModels in the Cloud
Models in the Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard science
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

(MC²)²: A Generic Decision-Making Framework and its Application to Cloud Computing

  • 1. (MC²)²: A GenericDecision-Making Framework anditsApplicationtoCloud Computing Michael Menzel1, Marten Schönherr2, Jens Nimis1, Stefan Tai31FZI Karslruhe, 2T-Labs Berlin, 3KIT Karslruhe
  • 2. “Which IT infrastructure?“ iscomplex Existingapproachesonlyconsidercostaspects! Operationsresearch: Ngwenyama/Bryson[1] proposetransactioncosts Cloudspecific Armbrust2:cpuhourcostsofcloud vs. Datacenter Cloudspecific Walker3: netpresentvalueofleasingorbuying CPU Considering also non-costfactorsrequiresextensionofexistingapproaches => multi-criteriadecision-making (MCDM): Multi-criteriadecision-makingaloneisnot sufficient !=> supportandcustomizationof multi-criteriadecision-making in a framework Motivation of (MC²)² [1] Ngwenyama, O. & Bryson, N. (1999), 'Making the information systems outsourcing decision: A transaction cost approach to analyzing outsourcing decision problems', European Journal of Operational Research 115(2), 351-367. [2] Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I. & others (2009), 'Abovetheclouds: A berkeleyviewofcloudcomputing', EECS Department, University ofCalifornia, Berkeley, Tech. Rep. UCB/EECS-2009-28. [3] Walker, E. (2009), 'The Real Cost of a CPU Hour', Computer 42, 35-41.
  • 4.
  • 6. Choose an appropriate multi-criteriadecision-makingmethod
  • 8.
  • 9. Summary: New CRM softwareforExamChoccompany Mustbecostefficient Mustbeverysecure Loadprofileknown (roughly) Support green IT Example – scenario The scenario of this example shall address the widely articulated IT infrastructure decision-making problem. Consider a chocolate producing company called ―ExamChoc‖, which needs to make an IT infrastructure decision on the deployment of a new Customer Relationship Management (CRM) software system. After a long analysis by the company’s chair it is decided that the solution has to be cost efficient and very secure at the same time. The chair based the decision on the current economic situation the organization has to cope with and on the company’s regulations that require a high security level for customer data. Due to the nature of ExamChoc’s business the usage statistics of the CRM software are forecasted to be very seasonally varying. Also, the software will not be in use between 6 pm and 8 am as very strict policies for working hours are set upon the employees. Additionally, the company cares about its corporate responsibility strongly and, thus, is supporting green IT approaches whenever possible.
  • 10. A1. In-housedatacenterinstallation A2. 3rd-party provider A3. IaaSprovider Example – alternatives
  • 11. C1. Security & Reliability C1.1. Data safety level of the infrastructure C1.2. Reliability of the infrastructure C1.3. Data security level in the infrastructure C1.4. Security level of data transmissions from and to the infrastructure C2. Benefits C2.1. Number of resources available C2.2. Green IT: power consumption during usage C3. CloudTCOcriteria C3.1. Uptime costs for dynamic usage C3.2. Costsforsecurity C3.3. Initial upfrontcosts C3.4. Administration costs C3.5. Costs for internet connection C3.6. Research costs for hardware Example – criteria
  • 12. R1. Trustworthiness of the provider R2. Green IT: minimum power consumption per hour per server Example - requirements
  • 13. Wechoose: ANP – Analytic Network Process Supports complexcriteriadependencies Considers qualitative criteria Results on absolute scale (0-1) in othercasesothermethodsmight fit better MAUT Promethée … Example – choose multi-criteriadecision-makingmethod
  • 14. Example – configure multi-criteriadecision-makingmethod
  • 16. Requirementsfulfilledby in-house, IaaS Apply ANP Pairwisecomparisonsof in-house, IaaSregardingcriteria Calculateresultsforcriterianetworks Applyindices Example – evaluationmethod
  • 18. Example - results ANP results: Indices formulas: Indices results:
  • 19. A3. IaaS > A1. in-house But, bybenefitsonly: A1 > A3 ! Bycosts: A3 < A1 (smallermeansbetter) Example – results – ctd. IaaS
  • 20. (MC²)² canbeimprovedandextended in manyaspects: More IT supportwithintheframework List ofsuitableinformationsystemsthatcansupportthedefinitionof alternatives, criteria, andrequirements Prototype of a systemthatoffers (MC²)² decisionmakingandintegrationwithinformationresources Inclusionofsensitivityanalysisandgroupdecisionaspects Support withthechoiceof MCDM methods … Future work
  • 23.
  • 24. Apply MCDM method on theappropriate alternatives usingdefinedcriteria (+ weights, dependencies)
  • 25.
  • 26. To find alternatives, criteria, requirements, and MCDM method Expert searchandsurveycreationsystems Internal knowledgeordatabaseswith Experiencesfromearlierevaluations Guidelinedocumentsofdepartments Collaborationsystems Data miningtools Literature … Toexternalizeyourexperiencesmadeduringtheuseoftheframework Useofinformationresources…
  • 27. Qualitative vs. Quantitative (non-measurable vs. measurable) Scalesofmeasurement Rules toconsider Completeness and Exhaustiveness Mutually exclusive items only Restrict to criteria of highest degree of importance Examples: Criteria
  • 28. Constraintsfor alternatives A minimumormaximumvalue Examples: Requirements
  • 29. Manymethodsavailable* Outranking: ELECTRE, PROMETHEE TOPSIS, AHP/ANP Bayesian Analysis MAUT, SMART … Chooseoneandconsider Not everymethodresults in a value Not everymethodfitsyourneedsto model criteriadependencies Not everymethodsupports qualitative (non-measurable) criteria well Multi-criteriadecision-makingmethod * Yoon and Hwang (1995), ‘Multi Attribute Decision Making: An Introduction‘, Sage University Paper series on Quantitative Applications in theSocialSciences. Keun Tae Cho (2003), ‘Multicriteria Decision Methods: An Attempt To Evaluate and Unify’, Mathematicaland Computer Modelling. Fülöp (2004), ‘Introduction to Decision Making Methods’, Paper developed for the BDEI-3 Workshop, The Evergreen State College.