Reference: | Adiga, N.R., Almasi, G., … Almasi, G.S. (2002). An Overview of the BlueGene/L Supercomputer. Supercomputing, ACM/IEEE 2002 Conference.
Berman, F., Fox, G., Hey, A. J. G. (2003). Grid computing: Making the global infrastructure a reality. US: Wiley.
Buyya, R. (1999). High Performance Cluster Computing: Programming and Applications Volume 2. US: Prentice Hall.
Brancheau, J. C., & Wetherbe, J. C. (1987). Key issues in information systems management. MIS Quarterly, 11(1), 23-45.
Byrne, A., Boon, H., Austin, Z., Jurgens, T., & Raman-Wilms, L. (2010). Core competencies in natural health products for Canadian pharmacy students. American Journal of Pharmaceutical Education, 74(3), 45.
Carr, N. G. (2003, May). IT Doesn’t Matter. Harvard Business Review.
Clouser, G. (2002, June). Why outsource. Oil & Gas Investor, 1-3.
Chitu Okoli, & Suzanne D Pawlowski. (2004). The Delphi method as a research tool: an example, design considerations and applications. Information & Management, 42(1), 15-29.
Chaudhary, S., & Kishore, R. (2010). Determinants and impacts of governance forms on outsourcing performance: evidence from a case study. Journal of Information Technology Case and Application Research, 12(1), 39-56.
Couger, J. D. (1988a) Key human resource issues in IS in the 1990s. Proceedings of the Hawaii International Conference on Systems Sciences, 162-170.
Couger, J. D. (1988b) Key human resources issues in IS in the 1990s: Views of IS executives versus human resource executives. Information and Management, 14(4), 161-174.
Coronel, C., Morris, S., Rob, P. (2010). Database systems: design, implementation, and management, 9th Edition. US: South-Western.
Deen, S. M.. (2005). An engineering approach to cooperating agents for distributed information systems. Journal of Intelligent Information Systems, 25(1), 5-45.
Duffield, C. (1988). The Delphi technique. The Australiam Journal of Advanced Nursing, 2(2), 41-45.
Geringer, J. Michael (1988). Partner selection criteria for developed country joint ventures. Business Quarterly, London, vol. 53, 55-63.
Grisham, T. (2009). The Delphi technique: a method for testing complex and multifaceted topics. International Journal of Managing Projects in Business, 2(1), 112-130.
Motahari-Nezhad, H. R., Stephenson, B., Singhal, S. (February, 2009). Outsourcing business to cloud computing services: opportunities and challenges. IEEE Internet Computing, 10(4), 1-17.
Hintzbergen, J.; Hintzbergen, K.; Baars, H.; Smulders, A. (2010). Foundations of Information Security Based on ISO27001 and ISO27002. US: Van Haren Publishing.
Ilbery, B., Maye, D., Kneafsey, M., Jenkins, T. and Walkley, C. (2004). Forecasting food supply chain developments in lagging rural regions: evidencefrom the UK. Journal of Rural Studies, Vol. 20, 331-344.
O’Brien, J., Marakas, G. (2010). Management Information Systems, 10th. US:McGraw-Hill Companies.
Johnson, A. (2009). Business and security executives views of information security investment drivers: results from a Delphi study. Journal of Information Privacy & Security, 5(1), 3-27.
Katzan, H. (2010). On an ontological view of cloud computing. Journal of Service Science, 3(1), 1-6.
Katzan, H.. (2010). On the privacy of cloud computing. International Journal of Management and Information Systems, 14(2), 1-12.
Kralovetz, R. G. (1996, Oct). A guide to successful outsourcing. Management Accounting, 32-38.
Kendall, M. G., & Gibbons, J. D. (1990). Rank correlation methods. London: Edward Arnold.
Kobielus (1996). Evaluation Time. Network World, vol.11, pp48.
Laudon & Laudon (2008). Management Information Systems, 11/e. US: PEARSON.
Lundquist, C.; Frieder, O.; Holmes, D. O.; & Grossman, D. (1999). A parallel relational database management system approach to relevance feedback in information retrieval. Journal of the American Society for Information Science, 50(5), 413-426.
Ma, Q., Schmidt, M., & Pearson, J.. (2009). An integrated framework for information security management. Review of Business, 30(1), 58-69.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I.& Zaharia, M. (2010). A View of Cloud Computing. Communications of the ACM, 53(4).
Murry J. W. & Hommons, J. O. (1995). Delphi: A versatile methodology for conducting qualitative research. The Review of Higher Education, 18(4), 423-436.
Niederman, F., Brancheau, J. C., & Wetherbe, J. C.. (1991). Information systems management issues for the 1990s. MIS Quarterly, 15(4), 474.
Bobroff, N., & Mummert,L. (2005). Design and implementation of a resource manager in a distributed database system. Journal of Network and Systems Management, 13(2), 151-174.
Drucker P. F. (1994). Post-capitalism Society. US: Harper Paperbacks.
Quinn, J. B. & Hilmer, F. G. (1994). Strategic outsourcing. Sloan Management Review, 43-45.
Buyya, R.; Chee Shin Yeo; Venugopal, S. (2008). Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. 10th IEEE International Conference, 5-13.
Rappa, M. A.(2004). The utility business model and the future of computing services. IBM Systems Journal, 43(1), 32-42.
King, R. P. & Halim, N. (1991). Management of a remote backup copy for disaster recovery. ACM Transaction on Database Systems, 16(2), 338-368.
Rick L. Click & Thomas N. Duening (2004). Business Process Outsourcing – the Competitive Advantage. US: John Wiley & Sons.
Schmidt, R. C. (1997). Managing Delphi surveys using nonparametric statistical techniques. Decision Sciences, 28(3), 763-774.
Satty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.
Satty, T. L. (1990). How to make a decision:The analytic hierarchy process, European Journal of Operational Research, 48(1), 9-26. Tang, C., Lin, M., Huang, E. (2010). The intention of selecting agile System development methodology among new Generation of software developer. 20th International Conference on Pacific Rim Management, ACME.
Thain, D., Tannenbaum, T., & Livny, M. (2005). Distributed computing in practice: The condor experience. Concurrency and Computation: Practice and Experience, 17(2‐4), 323-356.
Truong, D.. (2010). How cloud computing enhances competitive advantages: A research model for small businesses. The Business Review, Cambridge, 15(1), 59-65.
Vaidya, O. S.,& Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1-29.
Darlagiannis V.,& Mauthe, A., & Steinmetz, R. (2004). Overlay Design Mechanisms for Heterogeneous, Large-Scale, Dynamic P2P Systems. Journal of Network and Systems Management, 12(3), 371-396.
Young, R. (2009). Growth Perspective of Information Security. Journal of Information Privacy & Security, 5(4), 51-67.
Defining SaaS, PaaS, IaaS, etc. Retrieved from http://cloudfeed.net/2008/06/03/defining-saas-paas-iaas-etc/
Cluster (computing). Retrieved from http://en.wikipedia.org/wiki/Cluster_(computing)
Grid computing. Retrieved from http://en.wikipedia.org/wiki/Grid_computing
Langley, K. (2008, April 24). Cloud Computing: Get Your Head in the Clouds Retrieved from http://www.productionscale.com/home/2008/4/24/cloud-computing-get-your-head-in-the-clouds.html
Distributed computing. Retrieved from http://en.wikipedia.org/wiki/Distributed_computing
IBM.com. Retrieved from http://www.ibm.com/ibm/cloud/
Salesforce.com. Retrieved from: http://www.salesforce.com/cloudcomputing
Supercomputer. Retrieved from http://en.wikipedia.org/wiki/Supercomputer
Utility computing. Retrieved from http://en.wikipedia.org/wiki/Utility_computing
Wikipedia: Cloud computing. Retrieved from http://en.wikipedia.org/wiki/Cloud_computing
Whatis.com. Retrieved from http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.html
Angwin, J. & Valentino-Devries, J. (2011, April 22). Apple, Google Collect User Data. Retrieved from http://online.wsj.com/article/SB10001424052748703983704576277101723453610.html |