Privacy and security issues in cloud computing: The role of institutions and institutional evolution

Telecommunications Policy - Tập 37 Số 4-5 - Trang 372-386 - 2013
Nir Kshetri1
1Bryan School of Business and Economics, The Univ. of North Carolina at Greensboro, Greensboro, NC 27402-6165, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Allen, 2011, Cloud computing: Heavenly solution or pie in the sky?, Pennsylvania CPA Journal, 82, 1

Antonelli, 1993, Investment and adoption in advanced telecommunications, Journal of Economic Behavior and Organizations, 20, 227, 10.1016/0167-2681(93)90092-4

Armbrust, 2010, A view of cloud computing, Communications of the ACM, 53, 50, 10.1145/1721654.1721672

Ashford, W. (2012, January 31). Proposed EC data protection rules help cloud adoption. Retrieved from 〈http://www.computerweekly.com/news/2240114617/Proposed-EC-data-protection-rules-help-cloud-adoption-says-Kroes〉.

Axelrod, 2001

Backoff, 1991, Historical perspectives: Development of the codes of ethics in the legal, medical and accounting professions, Journal of Business Ethics, 10, 99, 10.1007/BF00383613

Bailey, 2003, Trust in cyberspace, 311

Barnett, 1993, How institutional constraints affected the organization of early US telephonies, Journal of Law, Economics and Organization, 9, 98

Baumgartner, 1993

Bradley, T. (2010). Build your own private azure cloud with new Microsoft appliance. PC World. Retrieved from 〈http://www.pcworld.com/businesscenter/article/200988/build_your_own_private_azure_clouc_with_new_microsoft_appliance.html?tk=hp_blg〉.

Bradner, 2010, Internet privacy conflicts, Network World, 27, 15

Brodkin, 2010, 5 problems with SaaS security, Network World, 27, 1

Brynjolfsson, 2010, Cloud computing and electricity: Beyond the utility model, Communications of the ACM, 53, 32, 10.1145/1735223.1735234

Burns, 2006, How do embedded agents engage in institutional change?, Journal of Economic Issues, 40, 449, 10.1080/00213624.2006.11506923

Campbell, 2004

Cohen, 1991, Beyond bean counting: Establishing high ethical standards in the accounting profession, Journal of Business Ethics, 10, 45, 10.1007/BF00383692

Cooter, M. (2011). Strato launches competitor to Dropbox— with added privacy. Retrieved from 〈http://www.cloudpro.co.uk/iaas/cloud-storage/1641/strato-launches-competitor-dropbox-added-privacy〉.

Covaleski, 1988, An institutional perspective on the rise, social transformation and fall of a university budget category, Administrative Science Quarterly, 33, 562, 10.2307/2392644

Crosman, 2009, Securing the clouds, Wall Street & Technology, December, 23

Dean, 1996, Industry environments and new venture formations in U.S. manufacturing: A conceptual and empirical analysis of demand determinations, Journal of Business Venturing, 11, 107, 10.1016/0883-9026(95)00109-3

Dickson, 2004, The impact of societal culture and industry on organizational culture: Theoretical explanations

Edwards, 2009, Cutting through the fog of cloud security, Computerworld, 43, 26

Ely, A. (2011, March 7). 5 Steps to secure SaaS. Information Week, p. 17, 〈http://www.informationweek.com/news/security/management/showArticle.jhtml?articleID=229300176〉.

Emerson, 1962, Power-dependence relations, American Sociological Review, 27, 31, 10.2307/2089716

European Commission (2010). The future of cloud computing—Opportunities for European cloud computing beyond. Retrieved from 〈http://ec.europa.eu/information_society/newsroom/cf/itemdetail.cfm?item_id=6993〉.

Farrell, 1987, Cheap talk, coordination, and entry, The RAND Journal of Economics, 18, 34, 10.2307/2555533

Fligstein, 2007, The sociology of markets, Annual Review of Sociology, 33, 105, 10.1146/annurev.soc.33.040406.131736

gartner.com (2010, July 14). Gartner says SAS 70 is not proof of security, continuity or privacy compliance. Retrieved from 〈http://www.gartner.com/it/page.jsp?id=1400813〉.

Goodburn, 2011, The cloud transforms business, Financial Executive, 26, 34

Greengard, 2010, Cloud computing and developing nations, Communications of the ACM, 53, 18, 10.1145/1735223.1735232

Greenwood, 1996, Understanding radical organizational change: Bringing together the old and the new institutionalism, Academy of Management Review, 21, 1022, 10.5465/amr.1996.9704071862

Hall, 1993, Policy paradigms, social learning, and the state: The case of economic policymaking in Britain, Comparative Politics, 25, 275, 10.2307/422246

Henkin, 1979

Hoffman, 1999, Institutional evolution and change: Environmentalism and the US chemical industry, Academy of Management Journal, 42, 351, 10.2307/257008

Huff, 1990, Mapping strategic thought

Ingthorsson, O. (2011, August 29). Regulations a barrier to cloud growth in Europe. Retrieved from 〈http://www.datacenterknowledge.com/archives/2011/08/29/enhancing-cloud-development-in-europe/〉.

Katyal, 2001, Criminal law in cyberspace, University of Pennsylvania Law Review, 149, 1003, 10.2307/3312990

Kim, 2005, Power dynamics in negotiation, Academy of Management Review, 30, 799, 10.5465/AMR.2005.18378879

Kshetri, 2010

Kshetri, 2009, Professional and trade associations in a nascent and formative sector of a developing economy: A case study of the NASSCOM effect on the Indian offshoring industry, Journal of International Management, 15, 225, 10.1016/j.intman.2008.09.003

Larkin, 2010, Will cloud computing kill privacy?, PC World, 28, 44

Larsen, 2002, Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes, Simulation Model Practice and Theory, 10, 271, 10.1016/S1569-190X(02)00085-0

Lindblom, 1968

Lindbolm, 1959, The science of “muddling through”, Public Administration Review, 19, 79, 10.2307/973677

McCafferty, 2010, Cloudy skies: public versus private option still up in the air, Baseline, 103, 28

McCann, D. (2010). Posted in: accountants head to the cloud, CFO.com. Retrieved from 〈http://cfo.com/article.cfm/14484960/c_14485112?f=home_todayinfinance〉.

McCreary, 2008, What was privacy?, Harvard Business Review, 86, 123

Messmer, E. (2010). Secrecy of cloud computing providers raises IT security risks. Retrieved from 〈http://www.mis-asia.com/news/articles/secrecy-of-cloud-computing-providers-raises-it-security-risks〉.

Mitra, 1999, Endogenous lobby formation and endogenous protection: A long-run model of trade policy determination, American Economic Review, 89, 1116, 10.1257/aer.89.5.1116

Newman, 2000, Organizational transformation during institutional upheaval, The Academy of Management Review, 25, 602, 10.5465/amr.2000.3363525

Nguyen, A. (2011, September 7), Only seven percent of UK it services in the cloud, says survey, Computerworld. Retrieved from 〈http://www.itworld.com/cloud-computing/200657/only-seven-percent-uk-it-services-cloud-says-survey〉.

North, 1990

North, 1996, Epilogue: Economic performance through time

NW (Network World). (2010). Inside the cloud security risk, 27(13), 11.

Object Management Group. (2009). Cloud-standards.org, Major standards development organizations collaborate to further adoption of cloud standards. Retrieved from 〈http://www.omg.org/news/releases/pr2009/07-13-09.htm〉.

O'Brien, K. J. (2011, July 24). Europe turns to the cloud. Retrieved from 〈http://www.nytimes.com/2011/07/25/technology/europe-turns-to-the-cloud.html?pagewanted=all〉.

Olavsrud, T. (2012, February 18). Security in the cloud is all about visibility and control. Retrieved from 〈http://www.cso.com.au/article/415872/security_cloud_all_about_visibility_control/〉.

Price, 2011, Pinning down the cloud, The Wall Street Journal, R3

Purdy, 2009, Conflicting logics, mechanisms of diffusion, and multilevel dynamics in emerging institutional fields, Academy of Management Journal., 52, 355, 10.5465/AMJ.2009.37308255

Reay, 2006, Legitimizing a new role: Small wins and microprocesses of change, Academy of Management Journal, 49, 977, 10.5465/AMJ.2006.22798178

Regan, K. (2006). FBI: cybercrime causes financial pain for many businesses, technewsworld. Retrieved from 〈http://www.technewsworld.com/story/48417.html〉.

Ricadela, A. (2011, September 1). Cloud security is looking overcast. Retrieved from 〈http://www.businessweek.com/magazine/cloud-security-is-looking-overcast-09012011.html〉.

Rogers, 1995

Russell, J. (2011, June 25), China to develop $154m tech centre free of web restrictions. Retrieved from 〈http://asiancorrespondent.com/58249/china-to-develop-154m-tech-centre-free-of-web-restrictions/〉.

Ryan, 2011, Cloud computing privacy concerns on our doorstep, Communications of the ACM, 54, 36, 10.1145/1866739.1866751

SAS 70 Overview, (2011). Retrieved from 〈http://sas70.com/sas70_overview.html〉.

Schroeder, D. (2011, July 5), SAS 70 Is dead: Hello better cloud governance?. Retrieved from 〈http://www.informationweek.com/news/global-cio/compliance/231000966〉.

Schumpeter, 1939

Scott, 1995

Scott, 2001

Scott, 2000

Seo, 2002, Institutional contradictions, praxis, and institutional change: A dialectical perspective, Academy of Management Review, 27, 222, 10.5465/amr.2002.6588004

Smith, 2005, The uneven geography of global civil society: National and global influences on transnational association, Social Forces, 84, 621, 10.1353/sof.2006.0036

Snidal, 1996, Political economy and international institutions, International Review of Law and Economics, 16, 121, 10.1016/0144-8188(95)00051-8

Sosna, 2010, Business model innovation through trial-and-error learning: The naturhouse case, Long Range Planning, 43, 383, 10.1016/j.lrp.2010.02.003

Talbot, 2010, Security in the ether, Technology Review, 113, 36

Thiel, S., & Valpuesta, R., (2011, September 13). U.K. Trails U.S. in public cloud adoption, Sales force CEO Says. Retrieved from 〈http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/09/13/bloomberg1376-LRILRH0YHQ0×01-3L8HOVDU01DK87C6RGOVTSL63E.DTL〉.

Tillery, S. (2010). How safe is the cloud? Retrieved from 〈http://www.baselinemag.com/c/a/Security/How-Safe-Is-the-Cloud-273226〉.

TR (Telecommunications Reports). (2010). Microsoft urges policymakers to help secure cloud computing, 76(3), 18-19.

Vizard, M. (2010). Assessing the risks of cloud computing. Retrieved from 〈http://www.itbusinessedge.com/cm/blogs/vizard/assessing-the-risks-of-cloud-computing/?cs=43712〉.

Weber, T. (2011). Cloud computing: How to get your business ready. Retrieved from 〈http://www.bbc.co.uk/news/business-12779201〉.

Whitcomb, 1998, Business ethical values in China and the U.S, Journal of Business Ethics, 17, 839, 10.1023/A:1005793424492

Wilshusen, 2010, Information security federal guidance needed to address control issues with implementing cloud computing, GAO Reports, preceding, 1

Wittow, 2010, Cloud computing: Emerging legal issues for access to data, anywhere, anytime, Journal of Internet Law, 14, 1

Worth, D. (2011, June 16), European Parliament calls for stronger data protection rules. Retrieved from 〈http://www.v3.co.uk/v3-uk/news/2079420/european-parliament-calls-stonger-protection-rules〉.

Zielinski, 2009, Be clear on cloud computing contracts, HRMagazine, 54, 63

Zittrain, 2009, Lost in the cloud, The New York Times, A 19

Zucker, 1986, Production of trust: Institutional sources of economic structure 1840–1920, Research in Organizational Behaviour, 8, 3