The usage and adoption of cloud computing by small and medium businesses

[1]  Wallace Chigona,et al.  Synchronised smart phones: The collision of personal privacy and organisational data security , 2012 .

[2]  Louay Karadsheh,et al.  Applying security policies and service level agreement to IaaS service model to enhance security and transition , 2012, Comput. Secur..

[3]  Federico Etro The Economics of Cloud Computing , 2012 .

[4]  Manuel Stein,et al.  Quality of service provisioning for distributed data center inter-connectivity enabled by network virtualization , 2012, Future Gener. Comput. Syst..

[5]  Cheng Wang,et al.  Towards the business–information technology alignment in cloud computing environment: anapproach based on collaboration points and agents , 2011, Int. J. Comput. Integr. Manuf..

[6]  Chris Blees,et al.  Buyer be aware: positioning the company for maximum exit value , 2011 .

[7]  Miguel de Castro Neto,et al.  The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors , 2011 .

[8]  Kenneth R. Walsh,et al.  A Decision Table for the Cloud Computing Decision in Small Business , 2011, Inf. Resour. Manag. J..

[9]  Arto Ojala,et al.  Developing Cloud Business Models: A Case Study on Cloud Gaming , 2011, IEEE Software.

[10]  N. Sultan Reaching for the "cloud": How SMEs can manage , 2011, Int. J. Inf. Manag..

[11]  Aminul Islam,et al.  Factors that Influence Customers’ Buying Intention on Shopping Online , 2011 .

[12]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[13]  Michael S. Bernstein,et al.  Heads in the cloud , 2010, XRDS.

[14]  Dag I. K. Sjøberg,et al.  Confronting the myth of rapid obsolescence in computing research , 2010, Commun. ACM.

[15]  Anthony D. Miyazaki,et al.  Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility , 2010 .

[16]  Dave Durkee,et al.  Why cloud computing will never be free , 2010, ACM Queue.

[17]  Mache Creeger,et al.  CTO Roundtable , 2009, Commun. ACM.

[18]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[19]  Chris Ryan,et al.  Holiday users of the Internet - ease of use, functionality and novelty. , 2008 .

[20]  Nadim Jahangir,et al.  Effect of perceived usefulness, ease of use, security and privacy on customer attitude and adaptation in the context of E-Banking , 2007 .

[21]  A Ralph Henderson,et al.  The bootstrap: a technique for data-driven statistics. Using computer-intensive analyses to explore experimental data. , 2005, Clinica chimica acta; international journal of clinical chemistry.

[22]  Linda Low,et al.  Entrepreneurship Development in Ireland and Singapore , 2005 .

[23]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[24]  Edward W. N. Bernroider Factors in SWOT Analysis Applied to Micro, Small-to-Medium, and Large Software Enterprises:: an Austrian Study , 2002 .

[25]  John Hulland,et al.  Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .

[26]  Anthony C. Davison,et al.  Bootstrap Methods and their Application , 1997 .

[27]  Wynne W. Chin,et al.  Adoption intention in GSS: relative importance of beliefs , 1995, DATB.

[28]  R. Tibshirani,et al.  An Introduction to the Bootstrap , 1995 .

[29]  Albert H. Segars,et al.  Re-examining perceived ease of use and usefulness , 1993 .

[30]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[31]  M. Goldstein,et al.  Multivariate Analysis: Methods and Applications , 1984 .

[32]  M. Cowles,et al.  On the Origins of the .05 Level of Statistical Significance , 1982 .

[33]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[34]  R. Fisher Statistical methods for research workers , 1927, Protoplasma.

[35]  Shahriar Akter,et al.  Trustworthiness in mHealth information services: An assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS) , 2011, J. Assoc. Inf. Sci. Technol..

[36]  L. A. Hill,et al.  Are you a good boss--or a great one? , 2011, Harvard business review.

[37]  Schahram Dustdar,et al.  Cloud computing for small research groups in computational science and engineering: current status and outlook , 2010, Computing.

[38]  Emil Burtescu,et al.  Reliability and Security - Convergence or Divergence , 2010 .

[39]  J. Hair Multivariate data analysis : a global perspective , 2010 .

[40]  Muniruddeen Lallmahamood,et al.  An Examination of IndividualâÂÂs Perceived Security andPrivacy of the Internet in Malaysia and the Influence ofThis on Their Intention to Use E-Commerce: Using AnExtension of the Technology Acceptance Model , 2007 .

[41]  Robert S. Hanmer,et al.  Comparing reliability and security: Concepts, requirements, and techniques , 2007, Bell Labs Technical Journal.

[42]  Michel Tenenhaus,et al.  PLS path modeling , 2005, Comput. Stat. Data Anal..

[43]  Yoris A. Au Design Science I: The Role of Design Science in Electronic Commerce Research , 2001, Commun. Assoc. Inf. Syst..

[44]  David Gefen,et al.  Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .

[45]  Naresh K. Malhotra,et al.  Marketing Research: An Applied Orientation , 1993 .

[46]  John P. Robinson,et al.  CHAPTER 1 – Criteria for Scale Selection and Evaluation , 1991 .

[47]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .