{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:14:33Z","timestamp":1747282473597,"version":"3.40.5"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319146089"},{"type":"electronic","value":"9783319146096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14609-6_3","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T06:35:31Z","timestamp":1419316531000},"page":"36-51","source":"Crossref","is-referenced-by-count":4,"title":["An Agency Perspective to Cloud Computing"],"prefix":"10.1007","author":[{"given":"Frank","family":"Pallas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"issue":"3","key":"3_CR1","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/1879431","volume":"84","author":"GA Akerlof","year":"1970","unstructured":"Akerlof, G.A.: The market for \u201cLemons\u201d: quality uncertainty and the market mechanism. Q. J. Econ. 84(3), 488\u2013500 (1970)","journal-title":"Q. J. Econ."},{"issue":"5799","key":"3_CR2","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610\u2013613 (2006)","journal-title":"Science"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Aubert, B.A., Patry, M., Rivard, S.: Assessing the risk of IT outsourcing. In: Proceedings of 31st HICSS, vol. 6, pp. 685\u2013692 (1998)","DOI":"10.1109\/HICSS.1998.654830"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Bless, R., Flittner, M.: Towards corporate confidentiality preserving auditing mechanisms for clouds. In: Proceedings of 3rd International Conference on Cloud Networking (CloudNet), (2014). doi: 10.1109\/CloudNet.2014.6969025","DOI":"10.1109\/CloudNet.2014.6969025"},{"issue":"1","key":"3_CR5","doi-asserted-by":"crossref","first-page":"57","DOI":"10.5465\/amr.1989.4279003","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K.M.: Agency theory: an assessment and review. Acad. Manag. Rev. 14(1), 57\u201374 (1989)","journal-title":"Acad. Manag. Rev."},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.omega.2011.06.005","volume":"40","author":"R Elitzur","year":"2012","unstructured":"Elitzur, R., Gavious, A., Wensley, A.K.: Information systems outsourcing projects as a double moral hazard problem. Omega 40(3), 379\u2013389 (2012)","journal-title":"Omega"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10723-008-9101-4","volume":"6","author":"T Eymann","year":"2008","unstructured":"Eymann, T., Knig, S., Matros, R.: A framework for trust and reputation in grid environments. J. Grid Comput. 6(3), 225\u2013237 (2008)","journal-title":"J. Grid Comput."},{"key":"3_CR8","first-page":"180","volume-title":"The Philosophy of Economics - An Anthology","author":"M Friedman","year":"1994","unstructured":"Friedman, M.: The methodology of positive economics. In: Hausman, D.M. (ed.) The Philosophy of Economics - An Anthology, 2nd edn, pp. 180\u2013213. Cambridge University Press, Cambridge (1994)","edition":"2"},{"key":"3_CR9","unstructured":"Friedman, A.A., West, D.M.: Privacy and Security in Cloud Computing. Center for Technology Innovation at Brookings (2010)"},{"key":"3_CR10","doi-asserted-by":"crossref","DOI":"10.3998\/mpub.6715","volume-title":"Institutions & Economic Theory: The Contribution of the New Institutional Economics","author":"EG Furubotn","year":"2005","unstructured":"Furubotn, E.G., Richter, R.: Institutions & Economic Theory: The Contribution of the New Institutional Economics, 2nd edn. The University of Michigan Press, Ann Arbor (2005)","edition":"2"},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2012.02.001","volume":"35","author":"KW Hamlen","year":"2013","unstructured":"Hamlen, K.W., Thuraisingham, B.: Data security services, solutions and standards for outsourcing. Comput. Stand. Interfaces 35(1), 1\u20135 (2013)","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s11573-014-0719-3","volume":"84","author":"S Hauff","year":"2014","unstructured":"Hauff, S., Huntgeburth, J., Veit, D.: Exploring uncertainties in a marketplace for cloud computing: a revelatory case study. J. Bus. Econ. 84(3), 441\u2013468 (2014)","journal-title":"J. Bus. Econ."},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1257\/jep.12.4.73","volume":"12","author":"B Holmstr\u00f6m","year":"1998","unstructured":"Holmstr\u00f6m, B., Roberts, J.: The boundaries of the firm revisited. J. Econ. Perspect. 12(4), 73\u201394 (1998)","journal-title":"J. Econ. Perspect."},{"issue":"4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/0304-405X(76)90026-X","volume":"3","author":"MC Jensen","year":"1976","unstructured":"Jensen, M.C., Meckling, W.H.: Theory of the firm: managerial behavior, agency costs and ownership structure. J. Financ. Econ. 3(4), 305\u2013360 (1976)","journal-title":"J. Financ. Econ."},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"1340006","DOI":"10.1142\/S0218843013400066","volume":"22","author":"K Kim","year":"2013","unstructured":"Kim, K., Altmann, J.: Evolution of the software-as-a-service innovation system through collective intelligence. Int. J. Coop. Inf. Syst. 22(3), 1340006 (2013)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1086\/466922","volume":"21","author":"B Klein","year":"1978","unstructured":"Klein, B., Crawford, R.G., Alchian, A.A.: Vertical integration, appropriable rents, and the competitive contracting process. J. Law Econ. 21, 297\u2013326 (1978)","journal-title":"J. Law Econ."},{"key":"3_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-642-22726-4_45","volume-title":"Advances in Computing and Communications","author":"RKL Ko","year":"2011","unstructured":"Ko, R.K.L., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol. 193, pp. 432\u2013444. Springer, Heidelberg (2011)"},{"issue":"4","key":"3_CR18","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.telpol.2012.04.011","volume":"37","author":"N Kshetri","year":"2013","unstructured":"Kshetri, N.: Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommun. Policy 37(4), 372\u2013386 (2013)","journal-title":"Telecommun. Policy"},{"key":"3_CR19","unstructured":"Kurze, T., Klems, M., Bermbach, D., Lenk, A., Tai, S., Kunze, M.: Cloud federation. In: Proceedings of Second International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 32\u201338 (2011)"},{"key":"3_CR20","doi-asserted-by":"crossref","DOI":"10.1515\/9781400829453","volume-title":"The Theory of Incentives - The Principal-Agent Model","author":"JJ Laffont","year":"2002","unstructured":"Laffont, J.J., Martimort, D.: The Theory of Incentives - The Principal-Agent Model. Princeton University Press, Princeton (2002)"},{"key":"3_CR21","unstructured":"Leimeister, S., B\u00f6hm, M., Riedl, C., Krcmar, H.: The business perspective of cloud computing: actors, roles and value networks. In: Proceedings of ECIS 2010, Paper 56 (2010)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-40651-5_5","volume-title":"Service-Oriented and Cloud Computing","author":"A Lenk","year":"2013","unstructured":"Lenk, A., Pallas, F.: Modeling quality attributes of cloud-standby-systems. In: Lau, K.-K., Lamersdorf, W., Pimentel, E. (eds.) ESOCC 2013. LNCS, vol. 8135, pp. 49\u201363. Springer, Heidelberg (2013)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-662-44879-3_3","volume-title":"Service-Oriented and Cloud Computing","author":"A Lenk","year":"2014","unstructured":"Lenk, A., Tai, S.: Cloud standby: disaster recovery of distributed systems in the cloud. In: Villari, M., Zimmermann, W., Lau, K.-K. (eds.) ESOCC 2014. LNCS, vol. 8745, pp. 32\u201346. Springer, Heidelberg (2014)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-35194-5_12","volume-title":"Economics of Grids, Clouds, Systems, and Services","author":"M Mac\u00edas","year":"2012","unstructured":"Mac\u00edas, M., Guitart, J.: Cheat-proof trust model for cloud computing markets. In: Vanmechelen, K., Altmann, J., Rana, O.F. (eds.) GECON 2012. LNCS, vol. 7714, pp. 154\u2013168. Springer, Heidelberg (2012)"},{"key":"3_CR25","volume-title":"Economics, Organization & Management","author":"P Milgrom","year":"1992","unstructured":"Milgrom, P., Roberts, J.: Economics, Organization & Management. Prentice Hall, Englewood Cliffs (1992)"},{"key":"3_CR26","unstructured":"National Institute of Standards and Technology (NIST): Special Publication 800\u2013145 - The NIST Definition of Cloud Computing (2011). http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"3_CR27","unstructured":"National Institute of Standards and Technology (NIST): Special Publication 500\u2013292 - NIST Cloud Computing Reference Architecture (2011). http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=909505"},{"issue":"3","key":"3_CR28","doi-asserted-by":"publisher","first-page":"355","DOI":"10.2307\/1882010","volume":"87","author":"M Spence","year":"1973","unstructured":"Spence, M.: Job market signaling. Q. J. Econ. 87(3), 355\u2013374 (1973)","journal-title":"Q. J. Econ."},{"issue":"2","key":"3_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2408776.2408789","volume":"56","author":"A Sunyaev","year":"2013","unstructured":"Sunyaev, A., Schneider, S.: Cloud services certification. Commun. ACM 56(2), 33\u201336 (2013)","journal-title":"Commun. ACM"},{"issue":"3","key":"3_CR30","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.clsr.2010.03.002","volume":"26","author":"M Taylor","year":"2010","unstructured":"Taylor, M., Haggerty, J., Gresty, D., Hegarty, R.: Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3), 304\u2013308 (2010)","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"3_CR31","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s12599-008-0009-0","volume":"1","author":"J Vykoukal","year":"2009","unstructured":"Vykoukal, J., Wolf, M., Beck, R.: Services grids in industry - on-demand provisioning and allocation of grid-based business services. Bus. Inf. Syst. Eng. 1(2), 177\u2013184 (2009)","journal-title":"Bus. Inf. Syst. Eng."}],"container-title":["Lecture Notes in Computer Science","Economics of Grids, Clouds, Systems, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14609-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T19:55:53Z","timestamp":1747252553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14609-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319146089","9783319146096"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14609-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}