Cloud computing — The business perspective
Tài liệu tham khảo
Agarwal, 2005, The information systems identity crisis: focusing on high-visibility and high-impact research, MIS Quarterly, 29, 381, 10.2307/25148689
Alford, 2009
Armbrust, 2009
Baish, 2008
Bhoj, 2001, SLA management in federated environments, Computer Networks, 35, 5, 10.1016/S1389-1286(00)00149-3
Bloch, 2009, How CIOs should think about business value, McKinsey on Business Technology, 15, 28
Boulton, 2009, 11
Broderick, 2010
Buyya, 2008, Market-Oriented cloud computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities
Carr, 2005, The end of corporate computing, MIT Sloan Management Review, 46, 67
H.K. Cheng, S. Bandyopadhyay, and H. Guo, The Debate on Net Neutrality: A Policy Perspective. Information Systems Research (forthcoming): p. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=959944 (2009).
Christensen, 1997
Clarke
Cloud Security Alliance, 2009
Cody, 2008, Security in grid computing: a review and synthesis, Decision Support Systems, 44, 749, 10.1016/j.dss.2007.09.007
Cooper, 1994, The inertial impact of culture on IT implementation, Information Management, 27, 17, 10.1016/0378-7206(94)90099-X
Danek, 2009
Datta
Dubey, 2007, Delivering software as a service, The McKinsey Quarterly, 1
ENISA, 2009
Gomolski, 2005
Goo, 2008, Facilitating relational governance through service level agreements in IT outsourcing: an application of the commitment–trust theory, Decision Support Systems, 46, 216, 10.1016/j.dss.2008.06.005
Gray, 2003, 63
Hackett, 2008
Hamill, 2005, Evaluating information assurance strategies, Decision Support Systems, 39, 463, 10.1016/j.dss.2003.11.004
Harding, 1965, The Future Role of Western Union as a Nationwide Information Utility, Company Strategic Plans, 1965, 1
Horrigan, 2008
Huff, 2008, Information technology assessment and adoption: a field study, MIS Quarterly, 9, 10.2307/249233
Kim, 2009, cloud computing: Today and Tomorrow, Journal of Object Technology, 8, 65, 10.5381/jot.2009.8.1.c4
Knowledge@Wharton, 2009
Lai, 1998, The impact of transborder data flow restrictions on international information systems management, Decision Support Systems, 22, 121, 10.1016/S0167-9236(97)00049-3
Lasica, 2009
Lin, 2006, A cost-effective critical path approach for service priority selections in grid computing economy, Decision Support Systems, 42, 1628, 10.1016/j.dss.2006.02.010
Mayer, 1998, Future trends in model management systems: parallel and distributed extensions, Decision Support Systems, 22, 325, 10.1016/S0167-9236(98)00025-6
McCullagh
Mitchell, 1998, Sources of transparency: information systems in international regimes, International Studies Quarterly, 42, 109, 10.1111/0020-8833.00071
Mohammed, 2010, Cloud computing Value Chains: Understanding Businesses and Value Creation in the Cloud, 187
NIST, NIST Definitoon of cloud computing v15, NIST, Editor. 2009, National Institute of Standards and Technology: Gaithersburg, MD (2009).
Papazoglou, 2000, Integrated value chains and their implications from a business and technology standpoint, Decision Support Systems, 29, 323, 10.1016/S0167-9236(00)00081-6
Parrilli, 2010, Legal Issues in Grid and cloud computing, Grid and Grid Computing, 97
Ristenpart, 2009, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Roehrig, 2009
D.E. Sanger and J. Markoff, Obama Outlines Coordinated Cyber-Security Plan, in The New York Times. 2009: New York, NY. p. A10 (2009).
Sangroya, 2008
Son, 2004, An analysis of the optimal number of servers in distributed client/server environments, Decision Support Systems, 36, 297, 10.1016/S0167-9236(02)00142-2
Staten, 2009
Swabey, 2008, China to lead SaaS adoption
Tang, 2005, Optimal location and pricing of Web services intermediary, Decision Support Systems, 40, 129, 10.1016/j.dss.2004.04.007
Tucker, 2009
Tucker, 2009
VMWare, 2008
Vouk, 2008, Cloud computing — issues, research and implementations, Journal of Computing and Information Technology, 16, 235, 10.2498/cit.1001391
W3C
Westland, 1990, Assessing the Economic Benefits of Information Systems Auditing, Information Systems Research, 309, 10.1287/isre.1.3.309
Whitten, 2009, Yes: Google takes seriously its duty to safeguard your information, 1E
Wired.com
Woody
Zhang, 2008, Real option valuation on grid computing, Decision Support Systems, 46, 333, 10.1016/j.dss.2008.07.003