-
1
-
-
78650558794
-
Secure virtualization for cloud computing
-
March
-
F. Lombardi and R. Di Pierto, "Secure virtualization for cloud computing". Journal of Network and Computer Applications, Vol. 34, No. 4, pp.1113-1122, March, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pierto, R.2
-
2
-
-
77950347409
-
A View of Cloud Computing
-
November
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz,A.A. Konwinski, G. Lee, D. Patterson, A. Rabin, I. Stoica, M. Zaharia, "A View of Cloud Computing". Communications of ACM, Vol. 53, No. 4, November, 2010
-
(2010)
Communications of ACM
, vol.53
, Issue.4
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.A.6
Lee, G.7
Patterson, D.8
Rabin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
January
-
S. Subashini, and V. Kavitha, "A survey on security issues in service delivery models of cloud computing". Journal of Network and Computer Applications, Vol. 34, pp.1-11, January, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
5
-
-
84883296817
-
Cloud control
-
March
-
C. Davidson, "Cloud control". Risk, Vol. 23, No. 10, pp. 70-78, March, 2010.
-
(2010)
Risk
, vol.23
, Issue.10
, pp. 70-78
-
-
Davidson, C.1
-
6
-
-
84883290690
-
Identity and privacy services
-
Feb
-
H. Katzan, "Identity and privacy services". Journal of Service Science, Vol. 3, No. 2, pp. 1-13, Feb, 2010.
-
(2010)
Journal of Service Science
, vol.3
, Issue.2
, pp. 1-13
-
-
Katzan, H.1
-
7
-
-
84855662661
-
Guidelines on security and privacy in public cloud computing
-
November
-
W. Jansen, T. Grance, "Guidelines on security and privacy in public cloud computing". NIST, Vol. 800, No. 144, pp. 1-60, November, 2011.
-
(2011)
NIST
, vol.800
, Issue.144
, pp. 1-60
-
-
Jansen, W.1
Grance, T.2
-
8
-
-
84866430111
-
Cloud computing, accounting, auditing, and beyond certified public accountant
-
January
-
H. Du and Y. Cong, "Cloud computing, accounting, auditing, and beyond certified public accountant". The CPA Journal, Vol.8, No. 10, pp. 66-70, January, 2010.
-
(2010)
The CPA Journal
, vol.8
, Issue.10
, pp. 66-70
-
-
Du, H.1
Cong, Y.2
-
9
-
-
84883274044
-
Using COBIT to manage the benefits, risks and security of outsourcing cloud computing
-
June, 2011
-
A. Ahmed,(2011). Using COBIT to manage the benefits, risks and security of outsourcing cloud computing. COBIT Focus, Vol. 2011, No. 2, pp.1-9, June, 2011.
-
(2011)
COBIT Focus
, vol.2011
, Issue.2
, pp. 1-9
-
-
Ahmed, A.1
-
10
-
-
84883265598
-
Cloud computing: Will commodity services benefit users long term?
-
April, 2009
-
H. Miller and J. Veiga, (2009). «Cloud computing: Will commodity services benefit users long term?» IEE Computer Society, Vol.1520-9202, No. 09, pp. 57-64, April, 2009.
-
(2009)
IEE Computer Society
, vol.1520
, Issue.9202
, pp. 57-64
-
-
Miller, H.1
Veiga, J.2
-
11
-
-
84883296357
-
Diffusing the cloud: Cloud computing and implications for public policy
-
July
-
K. Kushida, J. Murray, J. Zysman, «Diffusing the cloud: Cloud computing and implications for public policy», J Ind Compet Trade, 5(5), 1-30. July, 2010.
-
(2010)
J Ind Compet Trade
, vol.5
, Issue.5
, pp. 1-30
-
-
Kushida, K.1
Murray, J.2
Zysman, J.3
-
12
-
-
78049490220
-
It's unwritten in the cloud: The technology enablers for realising the promise of cloud computing
-
January
-
Y. Dwivedi, and N. Mustafee, «It's unwritten in the cloud: The technology enablers for realising the promise of cloud computing». Journal of Enterprise Information Management, Vol. 23, No. 6, pp. 673-679, January, 2010.
-
(2010)
Journal of Enterprise Information Management
, vol.23
, Issue.6
, pp. 673-679
-
-
Dwivedi, Y.1
Mustafee, N.2
-
15
-
-
70449597835
-
Exploratory factor analysis with small sample sizes
-
March, 2009
-
J.C. De Winter, D. Dodou, and A.P. Wieringa, (2009). «Exploratory factor analysis with small sample sizes». Multivariate Behavioral Research, Vol. 44, pp.147-181, March, 2009.
-
(2009)
Multivariate Behavioral Research
, vol.44
, pp. 147-181
-
-
De Winter, J.C.1
Dodou, D.2
Wieringa, A.P.3
-
16
-
-
43949170577
-
User acceptance of information technology, system characteristics, user perceptions and behavioral impacts
-
August
-
D.F. Davis, P.R. Bagozzi, and R.P. Warshaw, «User acceptance of information technology, system characteristics, user perceptions and behavioral impacts». International Journal of Man-Machine Studies, Vol. 38, No. 3, pp. 475-487, August, 1993.
-
(1993)
International Journal of Man-Machine Studies
, vol.38
, Issue.3
, pp. 475-487
-
-
Davis, D.F.1
Bagozzi, P.R.2
Warshaw, R.P.3
-
17
-
-
43649087245
-
Technology acceptance model 3 and a research agenda on interventions
-
September
-
V. Venkatesh and H. Bala, «Technology acceptance model 3 and a research agenda on interventions», Decision Sciences, Vol. 39, No. 2, pp. 273-315, September, 2008.
-
(2008)
Decision Sciences
, vol.39
, Issue.2
, pp. 273-315
-
-
Venkatesh, V.1
Bala, H.2
-
18
-
-
34547145165
-
G*Power 3: A flexible statistical power analysis for the social, behavioral, and biomedical sciences
-
November
-
F. Faul, E. Erdfelder, G.A. Lang, and A. Buchner, «G*Power 3: A flexible statistical power analysis for the social, behavioral, and biomedical sciences». Behavior Research Methods, Vol. 39, No. 1, pp.175-191, November, 2007.
-
(2007)
Behavior Research Methods
, vol.39
, Issue.1
, pp. 175-191
-
-
Faul, F.1
Erdfelder, E.2
Lang, G.A.3
Buchner, A.4
-
19
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
L. May, 1957
-
L. Cronbach, L. (1957). «Coefficient alpha and the internal structure of tests». Psychometrika, Vol.16, No. 3, pp. 297-334, May, 1957.
-
(1957)
Psychometrika
, vol.16
, Issue.3
, pp. 297-334
-
-
Cronbach, L.1
-
20
-
-
33745472352
-
Reliability, validity and true values in surveys
-
DOI 10.1007/s11205-005-5372-3
-
A. Wikman, A. (2006). «Reliability, validity and true values in surveys». Social Indicators Research, Vol. 78, No. 1, pp. 85-110, May, 2006. (Pubitemid 43950793)
-
(2006)
Social Indicators Research
, vol.78
, Issue.1
, pp. 85-110
-
-
Wikman, A.1
-
21
-
-
62949203110
-
Contemporary trends and issues in IT adoption and diffusion research
-
January
-
M.D. Williams, Y.K. Dwivedi, B. Lal and A. Schwarz «Contemporary trends and issues in IT adoption and diffusion research». Journal of Information Technology, Vol. 2009, No. 24, pp. 1-10, January, 2009.
-
(2009)
Journal of Information Technology
, vol.2009
, Issue.24
, pp. 1-10
-
-
Williams, M.D.1
Dwivedi, Y.K.2
Lal, B.3
Schwarz, A.4
-
22
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
December
-
D.F Davis, P.R. Bagozzi and R.P. Warshaw, «Perceived usefulness, perceived ease of use, and user acceptance of information technology». MIS Quarterly, Vol.13, No. 3, pp. 319-339, December, 1989.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, D.F.1
Bagozzi, P.R.2
Warshaw, R.P.3
-
25
-
-
76649142802
-
It's written in the cloud: The hype and promise of cloud computing
-
May, doi: 10.1108/17410391011019732
-
M.A. Sharif, «It's written in the cloud: The hype and promise of cloud computing». Journal of Enterprise Information Management, Vol. 23, No. 2, pp.131-134, May, 2010. doi: 10.1108/17410391011019732
-
(2010)
Journal of Enterprise Information Management
, vol.23
, Issue.2
, pp. 131-134
-
-
Sharif, M.A.1
-
26
-
-
84883290690
-
Identity and privacy services
-
May
-
H. Katzan, «Identity and privacy services». Journal of Service Science, Vol. 3, No. 2, 1-13, May, 2010.
-
(2010)
Journal of Service Science
, vol.3
, Issue.2
, pp. 1-13
-
-
Katzan, H.1
-
27
-
-
15844405077
-
Information security threats and practices in small businesses
-
S. Keller and A. Powell, B. Horstmann, C. Predmore, and M. Crawford, «Information security threats and practices in small businesses», Information Systems Management, Vol. 22, No. 2, pp.7-19, July, 2005. (Pubitemid 40420689)
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 7-19
-
-
Keller, S.1
Powell, A.2
Horstmann, B.3
Predmore, C.4
Crawford, M.5
-
28
-
-
46249093378
-
Ontologies for information security management and governance
-
July, 2008
-
S. Edson, M.F. Luciana Andréia, B. Antonio José dosSantos and B. Mauro César, (2008). «Ontologies for information security management and governance». Information Management & Computer Security, Vol. 16, No. 2, pp. 150-165, July, 2008.
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.2
, pp. 150-165
-
-
Edson, S.1
Luciana Andréia, M.F.2
Antonio José DosSantos, B.3
Mauro César, B.4
-
29
-
-
78650558794
-
Secure virtualization for cloud computing
-
October, 2011
-
F. Lombardi, R. Di Pierto, R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, Vol. 34, No. 4, pp. 1113-1122, October, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pierto R, R.2
-
30
-
-
78049491132
-
Exploiting grid computing, desktop grids and cloud computing for e-science
-
May
-
S. Mustafee, «Exploiting grid computing, desktop grids and cloud computing for e-science». Transforming Government: People, Process and Policy, 4 (4), 288-298, May, 2010
-
(2010)
Transforming Government: People, Process and Policy
, vol.4
, Issue.4
, pp. 288-298
-
-
Mustafee, S.1
-
31
-
-
76149130791
-
Understanding technology adoption: Theory and future directions for informal learning
-
February
-
E. Straub, «Understanding technology adoption: Theory and future directions for informal learning». Review of Educational Research, Vol. 79, No. 2, pp. 625-730, February, 2009.
-
(2009)
Review of Educational Research
, vol.79
, Issue.2
, pp. 625-730
-
-
Straub, E.1
-
32
-
-
84883268034
-
Maximizing the return on innvestment of information security programs: Program governance and Metrics
-
March
-
C. Drugescu, and R. Etges, «Maximizing the return on innvestment of information security programs: Program governance and Metrics». Information Systems Security, Vo. 15, No. 6, pp. 30-40, March, 2009.
-
(2009)
Information Systems Security
, vol.15
, Issue.6
, pp. 30-40
-
-
Drugescu, C.1
Etges, R.2
-
34
-
-
84857586286
-
State of the art and research challenges of new services architecture technologies: Virtualization, SOA and cloud computing
-
May
-
A. Letaifa, A. Haji, M. Jebalia, & S. Tabbane, «State of the art and research challenges of new services architecture technologies: Virtualization, SOA and cloud computing». International Journal of Grid & Distributed Computing, 3 (4), 69-87, May, 2010.
-
(2010)
International Journal of Grid & Distributed Computing
, vol.3
, Issue.4
, pp. 69-87
-
-
Letaifa, A.1
Haji, A.2
Jebalia, M.3
Tabbane, S.4
-
35
-
-
84860720046
-
Why cloud computing matters to finance
-
June
-
R. Gill, «Why cloud computing matters to finance». Strategic Finance, Vol. 92, No. 7, pp. 43-67, June, 2011.
-
(2011)
Strategic Finance
, vol.92
, Issue.7
, pp. 43-67
-
-
Gill, R.1
-
36
-
-
80053577353
-
A service-oriented web application framework
-
M. July, 2011
-
H. Demirkan, R.R. Harmon, and M. Goul, M. (2011). «A service-oriented web application framework». IT Professional Magazine, Vol. 13, No. 5, 15-21, July, 2011.
-
(2011)
IT Professional Magazine
, vol.13
, Issue.5
, pp. 15-21
-
-
Demirkan, H.1
Harmon, R.R.2
Goul, M.3
-
37
-
-
84882959129
-
Non-Profit Organizations'need to Address Security for Effective Government Contracting
-
(Shawon); July
-
Rice, Lee and Rahman, Syed (Shawon); "Non-Profit Organizations'need to Address Security for Effective Government Contracting"; International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.4, July 2012
-
(2012)
International Journal of Network Security & Its Applications (IJNSA)
, vol.4
, Issue.4
-
-
Rice, L.1
Rahman, S.2
|