The usage and adoption of cloud computing by small and medium businesses
暂无分享,去创建一个
[1] Wallace Chigona,et al. Synchronised smart phones: The collision of personal privacy and organisational data security , 2012 .
[2] Louay Karadsheh,et al. Applying security policies and service level agreement to IaaS service model to enhance security and transition , 2012, Comput. Secur..
[3] Federico Etro. The Economics of Cloud Computing , 2012 .
[4] Manuel Stein,et al. Quality of service provisioning for distributed data center inter-connectivity enabled by network virtualization , 2012, Future Gener. Comput. Syst..
[5] Cheng Wang,et al. Towards the business–information technology alignment in cloud computing environment: anapproach based on collaboration points and agents , 2011, Int. J. Comput. Integr. Manuf..
[6] Chris Blees,et al. Buyer be aware: positioning the company for maximum exit value , 2011 .
[7] Miguel de Castro Neto,et al. The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors , 2011 .
[8] Kenneth R. Walsh,et al. A Decision Table for the Cloud Computing Decision in Small Business , 2011, Inf. Resour. Manag. J..
[9] Arto Ojala,et al. Developing Cloud Business Models: A Case Study on Cloud Gaming , 2011, IEEE Software.
[10] N. Sultan. Reaching for the "cloud": How SMEs can manage , 2011, Int. J. Inf. Manag..
[11] Aminul Islam,et al. Factors that Influence Customers’ Buying Intention on Shopping Online , 2011 .
[12] Subhajyoti Bandyopadhyay,et al. Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.
[13] Michael S. Bernstein,et al. Heads in the cloud , 2010, XRDS.
[14] Dag I. K. Sjøberg,et al. Confronting the myth of rapid obsolescence in computing research , 2010, Commun. ACM.
[15] Anthony D. Miyazaki,et al. Reducing online privacy risk to facilitate e‐service adoption: the influence of perceived ease of use and corporate credibility , 2010 .
[16] Dave Durkee,et al. Why cloud computing will never be free , 2010, ACM Queue.
[17] Mache Creeger,et al. CTO Roundtable , 2009, Commun. ACM.
[18] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[19] Chris Ryan,et al. Holiday users of the Internet - ease of use, functionality and novelty. , 2008 .
[20] Nadim Jahangir,et al. Effect of perceived usefulness, ease of use, security and privacy on customer attitude and adaptation in the context of E-Banking , 2007 .
[21] A Ralph Henderson,et al. The bootstrap: a technique for data-driven statistics. Using computer-intensive analyses to explore experimental data. , 2005, Clinica chimica acta; international journal of clinical chemistry.
[22] Linda Low,et al. Entrepreneurship Development in Ireland and Singapore , 2005 .
[23] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[24] Edward W. N. Bernroider. Factors in SWOT Analysis Applied to Micro, Small-to-Medium, and Large Software Enterprises:: an Austrian Study , 2002 .
[25] John Hulland,et al. Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .
[26] Anthony C. Davison,et al. Bootstrap Methods and their Application , 1997 .
[27] Wynne W. Chin,et al. Adoption intention in GSS: relative importance of beliefs , 1995, DATB.
[28] R. Tibshirani,et al. An Introduction to the Bootstrap , 1995 .
[29] Albert H. Segars,et al. Re-examining perceived ease of use and usefulness , 1993 .
[30] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[31] M. Goldstein,et al. Multivariate Analysis: Methods and Applications , 1984 .
[32] M. Cowles,et al. On the Origins of the .05 Level of Statistical Significance , 1982 .
[33] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[34] R. Fisher. Statistical methods for research workers , 1927, Protoplasma.
[35] Shahriar Akter,et al. Trustworthiness in mHealth information services: An assessment of a hierarchical model with mediating and moderating effects using partial least squares (PLS) , 2011, J. Assoc. Inf. Sci. Technol..
[36] L. A. Hill,et al. Are you a good boss--or a great one? , 2011, Harvard business review.
[37] Schahram Dustdar,et al. Cloud computing for small research groups in computational science and engineering: current status and outlook , 2010, Computing.
[38] Emil Burtescu,et al. Reliability and Security - Convergence or Divergence , 2010 .
[39] J. Hair. Multivariate data analysis : a global perspective , 2010 .
[40] Muniruddeen Lallmahamood,et al. An Examination of IndividualâÂÂs Perceived Security andPrivacy of the Internet in Malaysia and the Influence ofThis on Their Intention to Use E-Commerce: Using AnExtension of the Technology Acceptance Model , 2007 .
[41] Robert S. Hanmer,et al. Comparing reliability and security: Concepts, requirements, and techniques , 2007, Bell Labs Technical Journal.
[42] Michel Tenenhaus,et al. PLS path modeling , 2005, Comput. Stat. Data Anal..
[43] Yoris A. Au. Design Science I: The Role of Design Science in Electronic Commerce Research , 2001, Commun. Assoc. Inf. Syst..
[44] David Gefen,et al. Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .
[45] Naresh K. Malhotra,et al. Marketing Research: An Applied Orientation , 1993 .
[46] John P. Robinson,et al. CHAPTER 1 – Criteria for Scale Selection and Evaluation , 1991 .
[47] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .