References A., Stoica, I. and Zaharia, M., 2009. Above

References

Adekunle, Y.A., Maitanmi, S.O., Malasowe,
B.O. and Osundina, S.A., 2012. Economics of cloud computing. International
Journal of Engineering and Innovative Technology (IJEIT), 1(4).

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Adelmeyer, M., Walterbusch, M., Seifert,
K. and Teuteberg, F., 2016, June. Does the Augmentation of Service Level
Agreements Affect User Decisions in Cloud Adoption Scenarios?-an Experimental
Approach. In ECIS (p. ResearchPaper95).

Alliance, C., 2011. Security guidance for
critical areas of focus in cloud computing v3. 0. Cloud Security
Alliance, p.15.

Almorsy, M., Grundy, J. and Müller, I.,
2016. An analysis of the cloud computing security problem. arXiv
preprint arXiv:1609.01107

Armbrust, M., Fox, A., Griffith, R.,
Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A.,
Stoica, I. and Zaharia, M., 2010. A view of cloud computing. Communications
of the ACM, 53(4), pp.50-58.

Armbrust, M., Fox, A., Griffith, R.,
Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A.,
Stoica, I. and Zaharia, M., 2009. Above the clouds: A berkeley view of
cloud computing (Vol. 17). Technical Report UCB/EECS-2009-28, EECS
Department, University of California, Berkeley.

Avram, M.G., 2014. Advantages and
challenges of adopting cloud computing from an enterprise perspective. Procedia
Technology, 12, pp.529-534.

Bhat, M.A., Shah, R.M., Ahmad, B. and
Bhat, I.R., 2010. Cloud computing: A solution to information support systems
(ISS). International Journal of Computer Applications, 11(5).

Bojanova, I., Zhang, J. and Voas, J.,
2013. Cloud computing. It Professional, 15(2),
pp.12-14.

Bradshaw, D., Folco, G., Cattaneo, G. and
Kolding, M., 2012. Quantitative estimates of the demand for cloud computing in
Europe and the likely barriers to up-take. IDC Analize de Future.

Busch, P., Smith, S., Gill, A., Harris,
P., Fakieh, B. and Blount, Y., 2014. A study of government cloud adoption: The
Australian context. ACIS.

Buyya, R., Yeo, C.S., Venugopal, S.,
Broberg, J. and Brandic, I., 2009. Cloud computing and emerging IT platforms:
Vision, hype, and reality for delivering computing as the 5th utility. Future
Generation computer systems, 25(6), pp.599-616.

Cardenas, A., Amin, S., Sinopoli, B.,
Giani, A., Perrig, A. and Sastry, S., 2009, July. Challenges for securing cyber
physical systems. In Workshop on future directions in cyber-physical
systems security (Vol. 5).

Chandrasekaran, K., 2015. Essentials
of cloud computing. CRC Press. Check book

Chang, V., Walters, R.J. and Wills, G.,
2013. The development that leads to the Cloud Computing Business
Framework. International Journal of Information Management, 33(3),
pp.524-538.

Chen, D. and Zhao, H., 2012, March. Data
security and privacy protection issues in cloud computing. In Computer
Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol.
1, pp. 647-651). IEEE.

Choo, K.K.R., 2010. Cloud computing: challenges
and future directions. Trends and Issues in Crime and Criminal justice,
(400), p.1.

Chou, T., 2010. Introduction to
Cloud Computing. Cloudbook.

Choudhary, V., 2016. Adopting Cloud at
Liberty Global.

Chow, R., Golle, P., Jakobsson, M., Shi,
E., Staddon, J., Masuoka, R. and Molina, J., 2009, November. Controlling data
in the cloud: outsourcing computation without outsourcing control. In Proceedings
of the 2009 ACM workshop on Cloud computing security (pp. 85-90). ACM.

Cisco,
“Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update,
2015 – 2020,” Cisco Whitepaper, 2016.

Cisco, C.G.C.I., Forecast and
Methodology, 2013–2018 (2014). Cited on, p.23.

Creeger, M. (2009). CTO roundtable. Communications of the ACM, 52, 50.

Cusumano, M. (2010). Cloud computing and SaaS as new computing
platforms. Communications of the ACM, 53, 27–29.

Dashora, L., Jain, A., Savner, G.,
Patidar, A. and Singh, V., (2016) CLOUD COMPUTING AND SECURITY ISSUES IN CLOUD.
International Journal of research in
computer applications and robotics.vol 4 issue 5 pg 6-13

de Bruin, B. and Floridi, L., 2017. The
ethics of cloud computing. Science and engineering ethics, 23(1),
pp.21-39.

Deelman, E., Singh, G., Livny, M.,
Berriman, B. and Good, J., 2008, November. The cost of doing science on the
cloud: the montage example. In Proceedings of the 2008 ACM/IEEE
conference on Supercomputing (p. 50). IEEE Press.

Dillon, T., Wu, C. and Chang, E., 2010,
April. Cloud computing: issues and challenges. In Advanced Information
Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp.
27-33). Ieee.

Ellinger, R.
S. (2013). Governance in SOA Patterns (white paper). In The Northrop Grumman
Corporation for Consideration by OASIS SOA Reference Architecture Team (pp. 1–11)

Espadas, J., Molina, A., Jiménez, G.,
Molina, M., Ramírez, R. and Concha, D., 2013. A tenant-based resource
allocation model for scaling Software-as-a-Service applications over cloud
computing infrastructures. Future Generation Computer Systems, 29(1),
pp.273-286

Everett, C., 2009. Cloud computing–A
question of trust. Computer Fraud & Security, 2009(6),
pp.5-7.

Fogarty, K. (2009). Cloud Computing definitions and solutions.
Retrieved February 11, 2013 from http://www.cio.com/ article/print/501814.

Gai, K. and Li, S., 2012, November.
Towards cloud computing: a literature review on cloud computing and its
development trends. In Multimedia Information Networking and Security
(MINES), 2012 Fourth International Conference on (pp. 142-146). IEEE.

Garrison, G., Kim, S. and Wakefield,
R.L., 2012. Success factors for deploying cloud computing. Communications
of the ACM, 55(9), pp.62-68.

Ghalimi, I.C., 2010. Benefits of Cloud
Computing. An Intalio White Paper, Palo Alto, CA, Intalio, Inc. Last
retrieved on December, 1, p.2016.

Gill, A.Q., Bunker, D. and Seltsikas, P.,
2011, December. An empirical analysis of cloud, mobile, social and green
computing: Financial services it strategy and enterprise architecture. In Dependable,
Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference
on (pp. 697-704). IEEE.

Grossman, R.L., 2009. The case for cloud
computing. IT professional, 11(2), pp.23-27.

Harding, R.S. and Oswald, A., 1965. The
Future Role of Western Union as a Nationwide Information Utility, Company
Strategic Plans, 1965, Western Union Telegraph Company Records 1820–1995,
National Museum of American History. Smithsonian Institution,
Washington, DC, pp.1-16.

Hayes, B. (2008). Cloud computing. Communications of the ACM, 51, 9–11.

Hoberg, P., Wollersheim, J., & Krcmar, H. (2012). The business
perspective on Cloud Computing: A literature review of research on Cloud
Computing. In Proceedings of the AMCIS.

Hogan, M., Liu, F., Sokol, A. and Tong,
J., 2011. Nist cloud computing standards roadmap. NIST Special
Publication, 35.

https://www.idc.com: https://www.idc.com/getdoc.jsp?containerId=prUS40960516

https://www.wired.com/2009/05/efh/

IDC. (2016, Jan 21). https://www.idc.com/getdoc.jsp?containerId=prUS40960516

Iyer, B., & Henderson, J. C. (2010). Preparing for the future—
understanding the seven capabilities of Cloud Computing. MIS Quarterly
Executive (pp. 117–131).

Jula, A., Sundararajan, E. and Othman,
Z., 2014. Cloud computing service composition: A systematic literature
review. Expert Systems with Applications, 41(8),
pp.3809-3824.

K. Poulsen.
Ex-employee fingered in texas power company hack. Retrieved from

Kaisler, S., Money, W. H., & Cohen, S. J. (2012). A decision
framework for Cloud Computing. In Proceedings of the HICSS (pp. 1553–1562).

Katz, R. (2009). Tech titans building boom. IEEE Spectrum (pp. 40–54).
Global Journal of Flexible Systems Management (March 2014) 15(1):59–68 67 123

Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE
Security & Privacy, 61-64.

Koehler, P., Anandasivam, A., Dan, M.A.
and Weinhardt, C., 2010, August. Cloud Services from a Consumer Perspective.
In AMCIS (p. 329).

Kondo, D., Javadi, B., Malecot, P.,
Cappello, F. and Anderson, D.P., 2009, May. Cost-benefit analysis of cloud
computing versus desktop grids. In Parallel & Distributed Processing,
2009. IPDPS 2009. IEEE International Symposium on (pp. 1-12). IEEE.

KPMG. (2013). Cloud Monitor 2013: Cloud Computing in Deutschland—Status
quo und Perspektiven.

Kurzweil, R., Richter, R., Kurzweil, R.
and Schneider, M.L., 1990. The age of intelligent machines (Vol.
579). Cambridge: MIT press.

Lageschulte, P., Babb, S., Cano, J.,
Davis, J., Fischer, U., Gadia, S., Gallego, R., Kalwerisky, J., Kelson, N.,
Khanapurkar, N. and Lundin, M., 2011. IT Control Objectives for Cloud
Computing: Controls and Assurance in the Cloud

Leavitt, N., 2009. Is cloud computing
really ready for prime time. Growth, 27(5), pp.15-20.

Leimeister, S., Bo¨hm, M., Riedl, C., & Krcmar, H. (2010). The
business perspective of Cloud Computing: Actors, roles and value networks. In
Proceedings of the ECIS.

Li, B., Li, J., Huai, J., Wo, T., Li, Q.
and Zhong, L., 2009, September. Enacloud: An energy-saving application live
placement approach for cloud computing environments. In Cloud
Computing, 2009. CLOUD’09. IEEE International Conference on (pp.
17-24). IEEE.

Linthicum, D. (2009). Defining the Cloud Computing framework: Refining
the concept. Retrieved February 21, 2013, from http://cloudcomputing.sys-con.com/node/811519.

Marinescu, D.C., 2013. Cloud
computing: theory and practice. Morgan Kaufmann. Check book

Marston, S., Li, Z., Bandyopadhyay, S.,
Zhang, J. and Ghalsasi, A., 2011. Cloud computing—The business
perspective. Decision support systems, 51(1),
pp.176-189

Mell, P., & Grance, T. (2011). The NIST definition of Cloud
Computing (NIST Special Publication 800-145).

Miller, M., 2008. Cloud
computing: Web-based applications that change the way you work and collaborate
online. Que publishing.

Motahari-Nezhad, H.R., Stephenson, B. and
Singhal, S., 2009. Outsourcing business to cloud computing services:
Opportunities and challenges. IEEE Internet Computing, 10(4),
pp.1-17.

Opitz, N., Langkau, T. F., Schmidt, N. H., & Kolbe, L. M. (2012).
Technology acceptance of Cloud Computing: Empirical evidence from German IT
Departments. In Proceedings of the HICSS (pp. 1593–1602).

Pearson, S., 2013. Privacy, security and
trust in cloud computing. In Privacy and Security for Cloud Computing (pp.
3-42). Springer London.

Perry, R., Hatcher, E., Mahowald, R.P.
and Hendrick, S.D., 2009. Force. com cloud platform drives huge time to market
and cost savings. IDC White Paper, International Data Corporation,
Framingham, Massachusetts (thecloud. appirio. com/rs/appirio/images/IDC Force.
com ROI Study. pdf).

Petcu, D. and Vasilakos, A.V., 2014.
Portability in clouds: approaches and research opportunities. Scalable
Computing: Practice and Experience, 15(3), pp.251-270.

Pro¨hl, T., Repschla¨ger, J., Erek, K., & Zarnekow, R. (2012).
ITServicemanagement im Cloud Computing. HMD—Praxis der Wirtschaftsinformatik
(pp. 6–14).

Qian, L., Luo, Z., Du, Y. and Guo, L.,
2009. Cloud computing: An overview. Cloud computing, pp.626-631.

Raveendranath, R., Rajamani, V., Babu,
A.J. and Datta, S.K., 2014, July. Android malware attacks and countermeasures:
Current and future directions. In Control, Instrumentation,
Communication and Computational Technologies (ICCICCT), 2014 International
Conference on (pp. 137-143). IEEE.

Raza, M.H., Adenola, A.F., Nafarieh, A.
and Robertson, W., 2015. The slow adoption of cloud computing and IT
workforce. Procedia Computer Science, 52, pp.1114-1119.

Repschla¨ger, J., Wind, S., Zarnekow, R., & Turowski, K. (2012). A
reference guide to Cloud Computing dimensions: Infrastructure as a service
classification framework. In Proceedings of the HICSS (pp. 2178–2188).

Schryen, G. (2010). Preserving knowledge on IS business value. Business
and Information Systems Engineering, 2, 233–244.

Son, I., Lee, D., Lee, J.-N., & Chang, Y.-B. (2011). Understanding
the impact of it service innovation on firm performance: The case of Cloud
Computing. In Proceedings of the PACIS.

Stankov, I., Datsenka, R. and Kurbel, K.,
2012. Service level agreement as an instrument to enhance trust in cloud
computing–An analysis of infrastructure-as-a-service providers.

Stieninger, M., Nedbal, D., Wetzlinger,
W., Wagner, G. and Erskine, M.A., 2014. Impacts on the organizational adoption
of cloud computing: A reconceptualization of influencing factors. Procedia
Technology, 16, pp.85-93.

Subashini, S. and Kavitha, V., 2011. A
survey on security issues in service delivery models of cloud computing. Journal
of network and computer applications, 34(1), pp.1-11.

Subbiah, S., Muthukumaran, S., & Ramkumar, T.(2013) Enhanced survey
and proposal to secure the data in cloud computing environment. International Journsal of Engineering
Science and Technology. Vol 5 (1) :49-53

Sultan, N.A., 2011. Reaching for the
“cloud”: How SMEs can manage. International journal of information
management, 31(3), pp.272-278.

Tarmidi, M., Rasid, S.Z.A., Alrazi, B.
and Roni, R.A., 2014. Cloud computing awareness and adoption among accounting
practitioners in Malaysia. Procedia-Social and Behavioral Sciences, 164,
pp.569-574.

Thomas, O. (2005). Das Modellversta¨ndnis in der Wirtschaftsinformatik:
Historie, Literaturanalyse und Begriffsexplikation. Vero¨ffentlichungen des
Instituts fu¨r Wirtschaftsinformatik (pp. 184).

Tsaravas, C., & Themistocleous, M. (2011). Cloud Computing and
egovernment: A literature review. In European, Mediterranean & Middle
Eastern Conference on Information Systems (pp. 154–164).

Vaquero, L.M., Rodero-Merino, L.,
Caceres, J. and Lindner, M., 2008. A break in the clouds: towards a cloud
definition. ACM SIGCOMM Computer Communication Review, 39(1),
pp.50-55.

Walterbusch, M., & Teuteberg, F. (2012). Vertrauen im Cloud
Computing. HMD—Praxis der Wirtschaftsinformatik (pp. 50–59).

Wang, C., Chow, S.S., Wang, Q., Ren, K.
and Lou, W., 2013. Privacy-preserving public auditing for secure cloud
storage. IEEE transactions on computers, 62(2),
pp.362-375.

Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare
for the future: Writing a literature review. MIS Quarterly (Vol. 26, pp.
xiii–xxiii).

Weinhardt, C., Anandasivam, A., Blau, B., Borissov, N., Meinl, T.,
Michalk, W., et al. (2009). Cloud Computing: A classification, business models
and research directions. Business and Information Systems Engineering, 1,
391–399.

Wischik, D., Handley, M. and Braun, M.B.,
2008. The resource pooling principle. ACM SIGCOMM Computer
Communication Review, 38(5), pp.47-52.

Yang, H.,
& Tate, M. (2012). A descriptive literature review and classification of
Cloud Computing Research. Communications
of the Association for Information Systems (pp. 35–60).

Zhang, Q., Cheng, L. and Boutaba, R.,
2010. Cloud computing: state-of-the-art and research challenges. Journal
of internet services and applications, 1(1), pp.7-18.

Zissis, D. and Lekkas, D., 2012.
Addressing cloud computing security issues. Future Generation computer
systems, 28(3), pp.583-592.