A Framework for the Evaluation of CloudSourcing Proposals
暂无分享,去创建一个
[1] Roger Clarke,et al. Evaluation Or Justification? The Application of Cost/benefit Analysis to Computer Matching Schemes , 1997, ECIS.
[2] Leslie P. Willcocks,et al. Business process outsourcing studies: a critical review and research directions , 2011, J. Inf. Technol..
[3] Ojelanki K. Ngwenyama,et al. How are Public Sector Organizations Managing is Outsourcing Risks? An Analysis of Outsourcing Guidelines from Three Jurisdictions , 2005, J. Comput. Inf. Syst..
[4] Anne C. Rouse,et al. Explaining I.T. Outsourcing Purchasers' Dissatisfaction , 2006, PACIS.
[5] Roger Clarke. How reliable is cloudsourcing? A review of articles in the technical media 2005-11 , 2012, Comput. Law Secur. Rev..
[6] R. Hirschheim,et al. Information systems outsourcing : myths, metaphors, and realities , 1993 .
[7] Roger Clarke. The Cloudy Future of Consumer Computing , 2011, Bled eConference.
[8] Dirk Neumann,et al. Bridging the Grid Adoption Gap - Developing a Roadmap for Trading Grids , 2007, Bled eConference.
[9] Dirk Neumann,et al. A Pay-as-Bid Mechanism for Pricing Utility Computing , 2007, Bled eConference.
[10] Leslie P. Willcocks,et al. Global Information Technology Outsourcing: In Search of Business Advantage , 2001 .
[11] Roger Clarke. Business Cases for Privacy-Enhancing Technologies , 2008 .
[12] Ralf Steinmetz,et al. European Conference on Information Systems ( ECIS ) Summer 10-6-2011 TAXONOMY OF TECHNOLOGICAL IT OUTSOURCING RISKS : SUPPORT FOR RISK IDENTIFICATION AND QUANTIFICATION , 2017 .
[13] Roger Clarke,et al. Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective , 2010, Bled eConference.
[14] N. Venkatraman,et al. An Empirical Study of Information Technology Outsourcing: Benefits, Risks, and Performance Implications , 1995, ICIS.
[15] Leslie P. Willcocks,et al. A review of the IT outsourcing empirical literature and future research directions , 2010, J. Inf. Technol..
[16] Fatemeh Zahedi,et al. The Next Phase of IT Outsourcing - Utility Computing: Understanding Utility Computing Acceptance , 2004, AMCIS.
[17] Roger Clarke,et al. User Requirements for Cloud Computing Architecture , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[18] Christian M. Messerschmidt,et al. Adoption of Grid Computing: an Empirical Verification of an Inter- and Intra-Organizational Approach , 2009, PACIS.
[19] Bandula Jayatilaka,et al. A Conjoint Approach to Understanding IT Application Services Outsourcing , 2009, J. Assoc. Inf. Syst..
[20] Odd Fredriksson,et al. European Conference on Information Systems ( ECIS ) 2008 Outsourcing Terms : A Literature Review from an ISD Perspective , 2017 .
[21] Anne C. Rouse,et al. Testing Some Myths About IT Outsourcing: A Survey of Australia's Top 1000 Firms , 2008, ECIS.
[22] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..