Privacy and security issues in cloud computing: The role of institutions and institutional evolution
Tóm tắt
Từ khóa
Tài liệu tham khảo
Allen, 2011, Cloud computing: Heavenly solution or pie in the sky?, Pennsylvania CPA Journal, 82, 1
Antonelli, 1993, Investment and adoption in advanced telecommunications, Journal of Economic Behavior and Organizations, 20, 227, 10.1016/0167-2681(93)90092-4
Armbrust, 2010, A view of cloud computing, Communications of the ACM, 53, 50, 10.1145/1721654.1721672
Ashford, W. (2012, January 31). Proposed EC data protection rules help cloud adoption. Retrieved from 〈http://www.computerweekly.com/news/2240114617/Proposed-EC-data-protection-rules-help-cloud-adoption-says-Kroes〉.
Axelrod, 2001
Backoff, 1991, Historical perspectives: Development of the codes of ethics in the legal, medical and accounting professions, Journal of Business Ethics, 10, 99, 10.1007/BF00383613
Bailey, 2003, Trust in cyberspace, 311
Barnett, 1993, How institutional constraints affected the organization of early US telephonies, Journal of Law, Economics and Organization, 9, 98
Baumgartner, 1993
Bradley, T. (2010). Build your own private azure cloud with new Microsoft appliance. PC World. Retrieved from 〈http://www.pcworld.com/businesscenter/article/200988/build_your_own_private_azure_clouc_with_new_microsoft_appliance.html?tk=hp_blg〉.
Bradner, 2010, Internet privacy conflicts, Network World, 27, 15
Brodkin, 2010, 5 problems with SaaS security, Network World, 27, 1
Brynjolfsson, 2010, Cloud computing and electricity: Beyond the utility model, Communications of the ACM, 53, 32, 10.1145/1735223.1735234
Burns, 2006, How do embedded agents engage in institutional change?, Journal of Economic Issues, 40, 449, 10.1080/00213624.2006.11506923
Campbell, 2004
Cohen, 1991, Beyond bean counting: Establishing high ethical standards in the accounting profession, Journal of Business Ethics, 10, 45, 10.1007/BF00383692
Cooter, M. (2011). Strato launches competitor to Dropbox— with added privacy. Retrieved from 〈http://www.cloudpro.co.uk/iaas/cloud-storage/1641/strato-launches-competitor-dropbox-added-privacy〉.
Covaleski, 1988, An institutional perspective on the rise, social transformation and fall of a university budget category, Administrative Science Quarterly, 33, 562, 10.2307/2392644
Crosman, 2009, Securing the clouds, Wall Street & Technology, December, 23
Dean, 1996, Industry environments and new venture formations in U.S. manufacturing: A conceptual and empirical analysis of demand determinations, Journal of Business Venturing, 11, 107, 10.1016/0883-9026(95)00109-3
Dickson, 2004, The impact of societal culture and industry on organizational culture: Theoretical explanations
Edwards, 2009, Cutting through the fog of cloud security, Computerworld, 43, 26
Ely, A. (2011, March 7). 5 Steps to secure SaaS. Information Week, p. 17, 〈http://www.informationweek.com/news/security/management/showArticle.jhtml?articleID=229300176〉.
European Commission (2010). The future of cloud computing—Opportunities for European cloud computing beyond. Retrieved from 〈http://ec.europa.eu/information_society/newsroom/cf/itemdetail.cfm?item_id=6993〉.
Farrell, 1987, Cheap talk, coordination, and entry, The RAND Journal of Economics, 18, 34, 10.2307/2555533
Fligstein, 2007, The sociology of markets, Annual Review of Sociology, 33, 105, 10.1146/annurev.soc.33.040406.131736
gartner.com (2010, July 14). Gartner says SAS 70 is not proof of security, continuity or privacy compliance. Retrieved from 〈http://www.gartner.com/it/page.jsp?id=1400813〉.
Goodburn, 2011, The cloud transforms business, Financial Executive, 26, 34
Greengard, 2010, Cloud computing and developing nations, Communications of the ACM, 53, 18, 10.1145/1735223.1735232
Greenwood, 1996, Understanding radical organizational change: Bringing together the old and the new institutionalism, Academy of Management Review, 21, 1022, 10.5465/amr.1996.9704071862
Hall, 1993, Policy paradigms, social learning, and the state: The case of economic policymaking in Britain, Comparative Politics, 25, 275, 10.2307/422246
Henkin, 1979
Hoffman, 1999, Institutional evolution and change: Environmentalism and the US chemical industry, Academy of Management Journal, 42, 351, 10.2307/257008
Huff, 1990, Mapping strategic thought
Ingthorsson, O. (2011, August 29). Regulations a barrier to cloud growth in Europe. Retrieved from 〈http://www.datacenterknowledge.com/archives/2011/08/29/enhancing-cloud-development-in-europe/〉.
Katyal, 2001, Criminal law in cyberspace, University of Pennsylvania Law Review, 149, 1003, 10.2307/3312990
Kim, 2005, Power dynamics in negotiation, Academy of Management Review, 30, 799, 10.5465/AMR.2005.18378879
Kshetri, 2010
Kshetri, 2009, Professional and trade associations in a nascent and formative sector of a developing economy: A case study of the NASSCOM effect on the Indian offshoring industry, Journal of International Management, 15, 225, 10.1016/j.intman.2008.09.003
Larkin, 2010, Will cloud computing kill privacy?, PC World, 28, 44
Larsen, 2002, Representing change: A system model of organizational inertia and capabilities as dynamic accumulation processes, Simulation Model Practice and Theory, 10, 271, 10.1016/S1569-190X(02)00085-0
Lindblom, 1968
Lindbolm, 1959, The science of “muddling through”, Public Administration Review, 19, 79, 10.2307/973677
McCafferty, 2010, Cloudy skies: public versus private option still up in the air, Baseline, 103, 28
McCann, D. (2010). Posted in: accountants head to the cloud, CFO.com. Retrieved from 〈http://cfo.com/article.cfm/14484960/c_14485112?f=home_todayinfinance〉.
McCreary, 2008, What was privacy?, Harvard Business Review, 86, 123
Messmer, E. (2010). Secrecy of cloud computing providers raises IT security risks. Retrieved from 〈http://www.mis-asia.com/news/articles/secrecy-of-cloud-computing-providers-raises-it-security-risks〉.
Mitra, 1999, Endogenous lobby formation and endogenous protection: A long-run model of trade policy determination, American Economic Review, 89, 1116, 10.1257/aer.89.5.1116
Newman, 2000, Organizational transformation during institutional upheaval, The Academy of Management Review, 25, 602, 10.5465/amr.2000.3363525
Nguyen, A. (2011, September 7), Only seven percent of UK it services in the cloud, says survey, Computerworld. Retrieved from 〈http://www.itworld.com/cloud-computing/200657/only-seven-percent-uk-it-services-cloud-says-survey〉.
North, 1990
North, 1996, Epilogue: Economic performance through time
Object Management Group. (2009). Cloud-standards.org, Major standards development organizations collaborate to further adoption of cloud standards. Retrieved from 〈http://www.omg.org/news/releases/pr2009/07-13-09.htm〉.
O'Brien, K. J. (2011, July 24). Europe turns to the cloud. Retrieved from 〈http://www.nytimes.com/2011/07/25/technology/europe-turns-to-the-cloud.html?pagewanted=all〉.
Olavsrud, T. (2012, February 18). Security in the cloud is all about visibility and control. Retrieved from 〈http://www.cso.com.au/article/415872/security_cloud_all_about_visibility_control/〉.
Price, 2011, Pinning down the cloud, The Wall Street Journal, R3
Purdy, 2009, Conflicting logics, mechanisms of diffusion, and multilevel dynamics in emerging institutional fields, Academy of Management Journal., 52, 355, 10.5465/AMJ.2009.37308255
Reay, 2006, Legitimizing a new role: Small wins and microprocesses of change, Academy of Management Journal, 49, 977, 10.5465/AMJ.2006.22798178
Regan, K. (2006). FBI: cybercrime causes financial pain for many businesses, technewsworld. Retrieved from 〈http://www.technewsworld.com/story/48417.html〉.
Ricadela, A. (2011, September 1). Cloud security is looking overcast. Retrieved from 〈http://www.businessweek.com/magazine/cloud-security-is-looking-overcast-09012011.html〉.
Rogers, 1995
Russell, J. (2011, June 25), China to develop $154m tech centre free of web restrictions. Retrieved from 〈http://asiancorrespondent.com/58249/china-to-develop-154m-tech-centre-free-of-web-restrictions/〉.
Ryan, 2011, Cloud computing privacy concerns on our doorstep, Communications of the ACM, 54, 36, 10.1145/1866739.1866751
SAS 70 Overview, (2011). Retrieved from 〈http://sas70.com/sas70_overview.html〉.
Schroeder, D. (2011, July 5), SAS 70 Is dead: Hello better cloud governance?. Retrieved from 〈http://www.informationweek.com/news/global-cio/compliance/231000966〉.
Schumpeter, 1939
Scott, 1995
Scott, 2001
Scott, 2000
Seo, 2002, Institutional contradictions, praxis, and institutional change: A dialectical perspective, Academy of Management Review, 27, 222, 10.5465/amr.2002.6588004
Smith, 2005, The uneven geography of global civil society: National and global influences on transnational association, Social Forces, 84, 621, 10.1353/sof.2006.0036
Snidal, 1996, Political economy and international institutions, International Review of Law and Economics, 16, 121, 10.1016/0144-8188(95)00051-8
Sosna, 2010, Business model innovation through trial-and-error learning: The naturhouse case, Long Range Planning, 43, 383, 10.1016/j.lrp.2010.02.003
Talbot, 2010, Security in the ether, Technology Review, 113, 36
Thiel, S., & Valpuesta, R., (2011, September 13). U.K. Trails U.S. in public cloud adoption, Sales force CEO Says. Retrieved from 〈http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/09/13/bloomberg1376-LRILRH0YHQ0×01-3L8HOVDU01DK87C6RGOVTSL63E.DTL〉.
Tillery, S. (2010). How safe is the cloud? Retrieved from 〈http://www.baselinemag.com/c/a/Security/How-Safe-Is-the-Cloud-273226〉.
TR (Telecommunications Reports). (2010). Microsoft urges policymakers to help secure cloud computing, 76(3), 18-19.
Vizard, M. (2010). Assessing the risks of cloud computing. Retrieved from 〈http://www.itbusinessedge.com/cm/blogs/vizard/assessing-the-risks-of-cloud-computing/?cs=43712〉.
Weber, T. (2011). Cloud computing: How to get your business ready. Retrieved from 〈http://www.bbc.co.uk/news/business-12779201〉.
Whitcomb, 1998, Business ethical values in China and the U.S, Journal of Business Ethics, 17, 839, 10.1023/A:1005793424492
Wilshusen, 2010, Information security federal guidance needed to address control issues with implementing cloud computing, GAO Reports, preceding, 1
Wittow, 2010, Cloud computing: Emerging legal issues for access to data, anywhere, anytime, Journal of Internet Law, 14, 1
Worth, D. (2011, June 16), European Parliament calls for stronger data protection rules. Retrieved from 〈http://www.v3.co.uk/v3-uk/news/2079420/european-parliament-calls-stonger-protection-rules〉.
Zielinski, 2009, Be clear on cloud computing contracts, HRMagazine, 54, 63
Zittrain, 2009, Lost in the cloud, The New York Times, A 19
Zucker, 1986, Production of trust: Institutional sources of economic structure 1840–1920, Research in Organizational Behaviour, 8, 3