An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments
暂无分享,去创建一个
Jeffrey Soar | Jianming Yong | Omar Ali | J. Soar | J. Yong | Omar Ali
[1] David Moher,et al. Development of AMSTAR: a measurement tool to assess the methodological quality of systematic reviews , 2007, BMC medical research methodology.
[2] S. O. Kuyoro,et al. Cloud computing security issues and challenges , 2011 .
[3] Albert G. Greenberg,et al. The cost of a cloud: research problems in data center networks , 2008, CCRV.
[4] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[5] Gustaf Juell-Skielse,et al. Cloud enterprise resource planning adoption: Motives a barriers , 2012 .
[6] Marijn Janssen,et al. Challenges for adopting cloud-based software as a service (saas) in the public sector , 2011, ECIS.
[7] Hyokyung Chang,et al. Challenges and Security in Cloud Computing , 2010, FGIT-FGCN.
[8] Paul T. Jaeger,et al. Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .
[9] Peeyush Mathur,et al. Cloud computing: New challenge to the entire computer industry , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[10] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[11] Saudi Arabia,et al. Cloud Based E-Government: Benefits and Challenges , 2013 .
[12] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[13] John C. Henderson,et al. Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing , 2010, MIS Q. Executive.
[14] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[15] Dinesh Kumar Saini,et al. Cloud Computing and Enterprise Resource Planning Systems , 2011 .
[16] Petter Svärd,et al. Self-management Challenges for Multi-cloud Architectures (Invited Paper) , 2011 .
[17] Jimmy J. Lin,et al. Where is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing , 2009, First Monday.
[18] Jie Qiu,et al. The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[19] V. B. Singh,et al. E-Governance: Past, Present and Future in India , 2012, ArXiv.
[20] M. Patton. Qualitative research and evaluation methods , 1980 .
[21] Jun-jie Wang,et al. Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.
[22] Jeffrey Soar,et al. Anticipated Benefits of Cloud Computing Adoption in Australian Regional Municipal Governments: An Exploratory Study , 2015, PACIS.
[23] Shahryar Shafique Qureshi,et al. Cloud computing economics opportunities and challenges , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[24] Jeffrey L. Duffany. Cloud Computing Security and Privacy , 2012 .
[25] Mervat Adib Bamiah,et al. Challenges and Benefits for Adopting the Paradigm of Cloud Computing , 2011 .
[26] Michael Hall,et al. Security and Control in the Cloud , 2010, Inf. Secur. J. A Glob. Perspect..
[27] Mary Anne Kennan,et al. The State of the Nation: A Snapshot of Australian Institutional Repositories , 2009, First Monday.
[28] Rajkumar Buyya,et al. Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters , 2009, HPDC '09.
[29] Andrew E. Smith. Automatic Extraction of Semantic Networks from Text using Leximancer , 2003, NAACL.
[30] J. Bradley. Methodological Issues and Practices in Qualitative Research , 1993, The Library Quarterly.
[31] Seyyed Mohsen Hashemi,et al. Cloud computing: use cases & various applications , 2014 .
[32] Ruoshui Liu,et al. Opportunities and challenges of wireless sensor networks using cloud services , 2011, IoTSP '11.
[33] Sherif Sakr,et al. On understanding the economics and elasticity challenges of deploying business applications on public cloud infrastructure , 2012, Journal of Internet Services and Applications.
[34] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[35] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[36] N. K. de Vries,et al. Systematic review: School health promotion interventions targeting physical activity and nutrition can improve academic performance in primary‐ and middle school children , 2013 .
[37] Matt Bishop,et al. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[38] C. Perry,et al. Qualitative Marketing Research , 2001 .
[39] Ravishankar K. Iyer,et al. Toward a high availability cloud: Techniques and challenges , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[40] Christof Weinhardt,et al. Business Models in the Service World , 2009, IT Professional.
[41] Hervé Debar,et al. Challenges for Cloud Networking Security , 2010, MONAMI.
[42] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[43] Rajkumar Buyya,et al. Cloud Computing Principles and Paradigms , 2011 .
[44] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[45] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[46] Judith Kelner,et al. Resource allocation for distributed cloud: concepts and research challenges , 2011, IEEE Network.
[47] Michael Miller,et al. Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online , 2008 .
[48] Noël Crespi,et al. Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution , 2010, ISoLA.
[49] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[50] Nirupama Bhat Mundukur,et al. A Study on Scalability of Services and Privacy Issues in Cloud Computing , 2012, ICDCIT.
[51] A. B. M. Shawkat Ali,et al. Trust Issues that Create Threats for Cyber Attacks in Cloud Computing , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[52] Laurie J. Kirsch,et al. Deploying Common Systems Globally: The Dynamics of Control , 2004, Inf. Syst. Res..
[53] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[54] Matthew N. O. Sadiku,et al. Cloud Computing: Opportunities and Challenges , 2014, IEEE Potentials.
[55] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[56] Bruno Defude,et al. Document Provenance in the Cloud: Constraints and Challenges , 2010, EUNICE.
[57] Serge Abiteboul,et al. Searching Shared Content in Communities with the Data Ring , 2009, IEEE Data Eng. Bull..
[58] Xiaoping Wu,et al. Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[59] Chinyao Low,et al. Understanding the determinants of cloud computing adoption , 2011, Ind. Manag. Data Syst..
[60] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[61] Shyam Antony,et al. Data Management Challenges in Cloud Computing Infrastructures , 2010, DNIS.
[62] Jeffrey Soar,et al. Impact of Cloud Computing Technology on E-Government , 2014, ICIST.
[63] Andrew E. Smith,et al. Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping , 2006, Behavior research methods.
[64] Jianfeng Yang,et al. Cloud Computing Research and Security Issues , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[65] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[66] Ammar Rashid,et al. Toward the Trend of Cloud Computing , 2011 .
[67] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[68] G. G. Alcaide,et al. Fuentes de información bibliográfica (I). Fundamentos para la realización de búsquedas bibliográficas. , 2011 .
[69] Okgee Min,et al. Issues on supporting public cloud virtual machine provisioning and orchestration , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[70] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[71] Petter Svärd,et al. Self-management Challenges for Multi-cloud Architectures - (Invited Paper) , 2011, ServiceWave.
[72] D. Faust. A Needed Component in Prescriptions for Science , 1982 .
[73] R. Weber. Basic Content Analysis , 1986 .
[74] Imad M. Abbadi,et al. Toward Trustworthy Clouds' Internet Scale Critical Infrastructure , 2011, ISPEC.
[75] Lutz Kolbe,et al. Technology Acceptance of Cloud Computing: Empirical Evidence from German IT Departments , 2012, 2012 45th Hawaii International Conference on System Sciences.
[77] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[78] Franck Cappello,et al. Cost-benefit analysis of Cloud Computing versus desktop grids , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[79] C. Perry,et al. Convergent interviewing: a starting methodology for an enterprise research program , 2007 .
[80] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[81] Zheng Xiu-ping. Notice of RetractionStudy on the opportunities and challenges of the cloud computing for Chinese medium-sized and small enterprises , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[82] Murat Kantarcioglu,et al. Impact of security risks on cloud computing adoption , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[83] Pankaj Goyal,et al. Enterprise Usability of Cloud Computing Environments: Issues and Challenges , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[84] Ideguchi Tetsuo,et al. Queuing Theoretic Approach to Server Allocation Problem in Time-delay Cloud Computing Systems , 2011 .
[85] Mario Zagar,et al. Analysis of issues with load balancing algorithms in hosted (cloud) environments , 2011, 2011 Proceedings of the 34th International Convention MIPRO.
[86] Jeffrey Soar,et al. Challenges and Issues Within Cloud Computing Technology , 2014, CLOUD 2014.
[87] Avinash Sonule,et al. Development of servers in cloud computing to solve issues related to security and backup , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[88] Ammar Khalid,et al. Data Processing Issues in Cloud Computing , 2009, 2009 Second International Conference on Machine Vision.
[89] Nahid Shahmehri,et al. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[90] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[91] Xun Xu,et al. From cloud computing to cloud manufacturing , 2012 .
[92] Bhavani M. Thuraisingham,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[93] Laura Savu,et al. Cloud Computing: Deployment Models, Delivery Models, Risks and Research Challenges , 2011, 2011 International Conference on Computer and Management (CAMAN).
[94] M. Brian Blake,et al. Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.
[95] V. Talwar,et al. Cloud Management: Challenges and Opportunities , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.
[96] B MilesMatthew,et al. Qualitative Data Analysis , 2018, Approaches and Processes of Social Science Research.
[97] J. Steen,et al. Organizing time: Internationalization narratives of executive managers , 2011 .
[98] S. Cummings,et al. A Guide to the Future of Strategy? The History of Long Range Planning , 2009 .
[99] Mohit Mathur,et al. Elucidation of Upcoming Traffic Problems in Cloud Computing , 2010 .
[100] Subhas C. Misra,et al. Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding Return on Investment , 2011, Math. Comput. Model..
[101] S. S. Yadav,et al. CLOUD: A computing infrastructure on demand , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[102] Huanguo Zhang,et al. Toward enhancing trust in cloud computing enviroment , 2011, 2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA).
[103] Hsiu-Fang Hsieh,et al. Three Approaches to Qualitative Content Analysis , 2005, Qualitative health research.
[104] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[105] Sujit Dey,et al. Cloud Mobile Media: Opportunities, challenges, and directions , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[106] Kirit J. Modi,et al. Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[107] Jan Schilling. On the Pragmatics of Qualitative Assessment Designing the Process for Content Analysis , 2006 .
[108] Frank Maurer,et al. Emerging Issues & Challenges in Cloud Computing—A Hybrid Approach , 2012 .
[109] Zaigham Mahmood,et al. Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.
[110] Ilza Leite Lopes. Estratégia de busca na recuperação da informação: revisão da literatura , 2002 .
[111] Robert L. Grossman,et al. On the Varieties of Clouds for Data Intensive Computing , 2009, IEEE Data Eng. Bull..
[112] Aprna Tripathi,et al. E-Governance challenges and cloud benefits , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.
[113] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[114] Farhad Soleimanian Gharehchopogh,et al. Security Challenges In Cloud Computing With More Emphasis on Trust And Privacy , 2012 .
[115] Zhejiang Changzheng. Study on the Opportunities and Challenges of the Cloud Computing for Chinese Medium-sized and small Enterprises , 2011 .
[116] Emanouil I. Atanassov,et al. Security issues of the combined usage of Grid and Cloud resources , 2012, 2012 Proceedings of the 35th International Convention MIPRO.
[117] David C. Wyld. Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing , 2009, SCSS.
[118] Helen D. Karatza,et al. Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values , 2011, J. Syst. Softw..
[119] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[120] B. Jaya Chandrared,et al. Cloud Zones: Security and Privacy Issues in Cloud Computing , 2012 .
[121] Eric K. Clemons,et al. Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[122] Johnny Saldaña,et al. Qualitative Data Analysis: A Methods Sourcebook. Third Edition. , 2014 .
[123] Bo Ai,et al. The issues of cloud computing security in high-speed railway , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[124] Edwin Baker,et al. Hey, you, get off of that cloud? , 2009, Comput. Law Secur. Rev..
[125] Shahryar Shafique Qureshi,et al. Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[126] Jan Schilling. On the Pragmatics of Qualitative Assessment , 2006 .
[127] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[128] Sungyoung Lee,et al. Adoption issues for cloud computing , 2009, iiWAS.
[129] Brent Lagesse,et al. Challenges in securing the interface between the cloud and pervasive systems , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[130] Neal Leavitt,et al. Is Cloud Computing Really Ready for Prime Time? , 2009, Computer.
[131] Chuang Lin,et al. Evaluation of user behavior trust in cloud computing , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[132] J. Soar,et al. Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study , 2015 .
[133] Su Golder,et al. Comparison of search strategies in systematic reviews of adverse effects to other systematic reviews. , 2014, Health information and libraries journal.
[134] G. Gaskell,et al. Individual and Group Interviewing , 2000 .
[135] Sanjay Kumar Madria,et al. Challenges in Secure Sensor-Cloud Computing , 2011, Secure Data Management.