-
1
-
-
84905841495
-
-
Factors that affect the adoption of cloud computing: an exploratory study. In: Proceedings of European Conference on Information Systems, IAD Sesson 3. Cloud Adoption 2. Utrecht, Netherlands; June 2013.
-
Morgan L. Conboy K. Factors that affect the adoption of cloud computing: an exploratory study. In: Proceedings of European Conference on Information Systems, IAD Sesson 3. Cloud Adoption 2. Utrecht, Netherlands; June 2013.
-
-
-
Morgan, L.1
Conboy, K.2
-
3
-
-
84864960811
-
Business value from Clouds: learning from USers
-
Iyer B., Henderson J.C. Business value from Clouds: learning from USers. MISQ Executive 2012, 11(1):51-59.
-
(2012)
MISQ Executive
, vol.11
, Issue.1
, pp. 51-59
-
-
Iyer, B.1
Henderson, J.C.2
-
4
-
-
79952945712
-
Preparing for the future: understanding the seven capabilities of Cloud Computing
-
Iyer B., Henderson J.C. Preparing for the future: understanding the seven capabilities of Cloud Computing. MISQ Executive 2010, 9(2):117-131.
-
(2010)
MISQ Executive
, vol.9
, Issue.2
, pp. 117-131
-
-
Iyer, B.1
Henderson, J.C.2
-
5
-
-
84864951824
-
Assessing cloud readiness at continental AG
-
Loebecke C., Thomas B., Ullrich T. Assessing cloud readiness at continental AG. MISQ Executive 2012, 11(1):11-23.
-
(2012)
MISQ Executive
, vol.11
, Issue.1
, pp. 11-23
-
-
Loebecke, C.1
Thomas, B.2
Ullrich, T.3
-
6
-
-
84887193489
-
-
Japan is best prepared to capitalize on cloud computing
-
Martin R. Japan is best prepared to capitalize on cloud computing. 2012. http://www.techinasia.com/japan-cloud-cloud-computing/.
-
(2012)
-
-
Martin, R.1
-
7
-
-
84866373007
-
A critical review of cloud computing: researching desires and realities
-
Venters W., Whitley E. A critical review of cloud computing: researching desires and realities. Journal of Information Technology 2012, 27:179-197.
-
(2012)
Journal of Information Technology
, vol.27
, pp. 179-197
-
-
Venters, W.1
Whitley, E.2
-
8
-
-
84887134865
-
-
World Economic Forum and Accenture. Cloud computing survey;
-
World Economic Forum and Accenture. Cloud computing survey; 2009.
-
(2009)
-
-
-
10
-
-
84887193816
-
-
HIPPA. Federal Register on January 25, 2013
-
HIPPA. Federal Register on January 25, 2013. 2013. http://www.hipaa.com/2013/02/hipaa-final-rule-modification-of-business-associate-definition-part-3/.
-
(2013)
-
-
-
11
-
-
84887206906
-
-
European Commission
-
European Commission. 2013. http://ec.europa.eu/justice/data-protection/index_en.htm.
-
(2013)
-
-
-
12
-
-
84887134682
-
-
Cross-border data flow regulation and data privacy law. Oxford University press, Oxford
-
Kumar C. Cross-border data flow regulation and data privacy law. Oxford University press, Oxford, 2013.
-
(2013)
-
-
Kumar, C.1
-
14
-
-
84887164701
-
-
European Commission. Unleashing the potential of cloud computing. COM (2012) 529 final
-
European Commission. Unleashing the potential of cloud computing. COM (2012) 529 final. 2012a. http://ec.europa.eu/information_society/activities/cloudcomputing/docs/com/swd_com_cloud.
-
(2012)
-
-
-
15
-
-
84887191016
-
-
European Commission. Digital Agenda: tech CEOs and leaders kick start new EU cloud computing board. IP/12/1225
-
European Commission. Digital Agenda: tech CEOs and leaders kick start new EU cloud computing board. IP/12/1225. 2012b. http://www.euractiv.com/infosociety/brussels-unveils-cloud-computing-news-515057.
-
(2012)
-
-
-
16
-
-
84887162381
-
-
Proskauer Rose LLP, New York, [Chapter 28]
-
Wolf C, Tobin TP. Privacy Laws. In Proskauer on international litigation and arbitration: managing, resolving, and avoiding cross-border business or regulatory disputes 2007, Proskauer Rose LLP, New York, [Chapter 28].
-
(2007)
Privacy Laws. In Proskauer on international litigation and arbitration: managing, resolving, and avoiding cross-border business or regulatory disputes
-
-
Wolf, C.1
Tobin, T.P.2
-
19
-
-
84887209627
-
-
Department of Health & Human Services
-
Department of Health & Human Services. 2012. http://www.hhs.gov/ocr.
-
(2012)
-
-
-
20
-
-
79960738039
-
U.S. and E.U. privacy policy: comparison of regulatory approaches
-
Movius L.B., Krup N. U.S. and E.U. privacy policy: comparison of regulatory approaches. International Journal of Communication 2009, 3:169-187.
-
(2009)
International Journal of Communication
, vol.3
, pp. 169-187
-
-
Movius, L.B.1
Krup, N.2
-
21
-
-
80053489634
-
Reconciliation of the Cloud computing model with US federal electronic health record regulations
-
Schweitzer E.J. Reconciliation of the Cloud computing model with US federal electronic health record regulations. Journal of the Medical Information Association 2013, 19:161-165. http://www.euractiv.com/infosociety/brussels-unveils-cloud-computing-news-515057, 10.1136/amiajnl-2011-000162.
-
(2013)
Journal of the Medical Information Association
, vol.19
, pp. 161-165
-
-
Schweitzer, E.J.1
-
22
-
-
84887155445
-
-
BMA
-
BMA. 2012. http://bma.org.uk/.
-
(2012)
-
-
-
23
-
-
84887137297
-
-
Guardian. Google facing legal threat from six European countries over privacy
-
Guardian. Google facing legal threat from six European countries over privacy. 2013. http://www.guardian.co.uk/technology/2013/apr/02/google-privacy-policy-legal-threat-europe.
-
(2013)
-
-
-
24
-
-
74049093526
-
-
Controlling data in the Cloud: outsourcing computation without outsourcing control, CCSW'09. Chicago, Illinois, USA. ACM 978-1-60558-784-4/09/11; November 13
-
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R. et al. Controlling data in the Cloud: outsourcing computation without outsourcing control, CCSW'09. Chicago, Illinois, USA. ACM 978-1-60558-784-4/09/11; November 13, 2009.
-
(2009)
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
-
25
-
-
84869084982
-
Digital divide across the European Union
-
Cruz-Jesus F., Oliveira T., Bacao F. Digital divide across the European Union. Information & Management 2012, 46(6):278-291. http://dx.doi.org/10.1016/j.im.2012.09.003.
-
(2012)
Information & Management
, vol.46
, Issue.6
, pp. 278-291
-
-
Cruz-Jesus, F.1
Oliveira, T.2
Bacao, F.3
-
26
-
-
77951081440
-
A multi-dimensional analysis of the disability digital divide: some evidence for internet use
-
Vicente M.R., Lopez A.J. A multi-dimensional analysis of the disability digital divide: some evidence for internet use. The Information Society: An international journal 2010, 26:48-64.
-
(2010)
The Information Society: An international journal
, vol.26
, pp. 48-64
-
-
Vicente, M.R.1
Lopez, A.J.2
-
27
-
-
84887163100
-
-
European Commission. Fighting cyber crime and protecting privacy in the cloud, Citizens Rights and Constitutional Affairs.
-
European Commission. Fighting cyber crime and protecting privacy in the cloud, Citizens Rights and Constitutional Affairs. 2012c. http://www.Europarl.europa.eu/studies.
-
(2012)
-
-
-
28
-
-
84870445814
-
Knowledge management in the age of cloud computing and Web 2.0: experiencing the power of disruptive innovations
-
Sultan N. Knowledge management in the age of cloud computing and Web 2.0: experiencing the power of disruptive innovations. International Journal of Information Management 2013, 22:160-165.
-
(2013)
International Journal of Information Management
, vol.22
, pp. 160-165
-
-
Sultan, N.1
-
29
-
-
77953221164
-
Securing elasticity in the cloud
-
Owens D. Securing elasticity in the cloud. Communications of the ACM 2009, 53(6):48-51.
-
(2009)
Communications of the ACM
, vol.53
, Issue.6
, pp. 48-51
-
-
Owens, D.1
-
30
-
-
84887144460
-
-
Securing the E-Health Cloud, IHI'10. Arlington, Virginia, USA. ACM 978-1-4503-0030-8/10/11; November 11-12, 2010.
-
Lohr H, Sadhegi AR, Winandy M. Securing the E-Health Cloud, IHI'10. Arlington, Virginia, USA. ACM 978-1-4503-0030-8/10/11; November 11-12, 2010.
-
-
-
Lohr, H.1
Sadhegi, A.R.2
Winandy, M.3
-
31
-
-
78650837743
-
Viewpoint: cloud computing privacy concerns on our doorstep
-
Ryan M. Viewpoint: cloud computing privacy concerns on our doorstep. Communications of the ACM 2010, 54(1):36-38.
-
(2010)
Communications of the ACM
, vol.54
, Issue.1
, pp. 36-38
-
-
Ryan, M.1
-
32
-
-
79955664610
-
From promise to reality achieving the value of an EHR
-
Bell B, Thornton K. From promise to reality achieving the value of an EHR. Healthcare Financial Management 2011, 65(2):51-56.
-
(2011)
Healthcare Financial Management
, vol.65
, Issue.2
, pp. 51-56
-
-
Bell, B.1
Thornton, K.2
-
33
-
-
84855226627
-
Information Security Policies in the UK Healthcare Sector: a critical evaluation
-
Stahl B.C., Doherty N.F., Shaw M. Information Security Policies in the UK Healthcare Sector: a critical evaluation. Information Systems Journal 2011, 22:77-94.
-
(2011)
Information Systems Journal
, vol.22
, pp. 77-94
-
-
Stahl, B.C.1
Doherty, N.F.2
Shaw, M.3
|