{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:22:51Z","timestamp":1774354971506,"version":"3.50.1"},"reference-count":123,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T00:00:00Z","timestamp":1491955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007914","name":"Brunel University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007914","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10796-017-9756-0","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T13:38:52Z","timestamp":1492004332000},"page":"359-382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies"],"prefix":"10.1007","volume":"21","author":[{"given":"Steve","family":"Jones","sequence":"first","affiliation":[]},{"given":"Zahir","family":"Irani","sequence":"additional","affiliation":[]},{"given":"Uthayasankar","family":"Sivarajah","sequence":"additional","affiliation":[]},{"given":"Peter E. D.","family":"Love","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,12]]},"reference":[{"key":"9756_CR1","volume-title":"Cloud computing and sustainability: The environmental benefits of moving to the cloud","author":"Accenture","year":"2010","unstructured":"Accenture. (2010). Cloud computing and sustainability: The environmental benefits of moving to the cloud. United States: Accenture."},{"key":"9756_CR2","doi-asserted-by":"crossref","unstructured":"Ali, O., Soar, J., & Yong, J. (2014). Impact of cloud computing technology on e-government. In: Information and Software Technologies. Springer International Publishing, pp. 272\u2013290","DOI":"10.1007\/978-3-319-11958-8_22"},{"issue":"2","key":"9756_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1057\/palgrave\/ejis\/3000425","volume":"11","author":"D Allen","year":"2002","unstructured":"Allen, D., Kern, T., & Mattison, D. (2002). Culture, power and politics in ICT outsourcing in higher education institutions. European Journal of Information Systems, 11(2), 159\u2013173.","journal-title":"European Journal of Information Systems"},{"issue":"6","key":"9756_CR4","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.jpdc.2013.02.008","volume":"73","author":"M Amoretti","year":"2013","unstructured":"Amoretti, M., Zanichelli, F., & Conte, G. (2013). Efficient autonomic cloud computing using online discrete event simulation. Journal of Parallel and Distributed Computing, 73(6), 767\u2013776.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"2","key":"9756_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.giq.2005.11.008","volume":"23","author":"KV Andersen","year":"2006","unstructured":"Andersen, K. V., & Henriksen, H. Z. (2006). E-government maturity models: Extension of the Layne and lee model. Government Information Quarterly, 23(2), 236\u2013248.","journal-title":"Government Information Quarterly"},{"key":"9756_CR6","volume-title":"Planning and control systems: A framework for analysis","author":"RN Anthony","year":"1965","unstructured":"Anthony, R. N. (1965). Planning and control systems: A framework for analysis. Cambridge: Harvard University Press."},{"issue":"4","key":"9756_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50\u201358.","journal-title":"Communications of the ACM"},{"key":"9756_CR8","first-page":"248","volume-title":"Denzin Nk and Lincoln Ys, (Eds)","author":"P Atkinson","year":"1994","unstructured":"Atkinson, P., & Hammersley, M. (1994). Ethnography and participant observation. In Handbook Of Qualitative Research (Ed.), Denzin Nk and Lincoln Ys, (Eds) (pp. 248\u2013261). Thousand Oaks: Sage Publications."},{"key":"9756_CR9","doi-asserted-by":"crossref","unstructured":"Aymerich, F.M., Fenu, G., and Surcis, S., (2008). An approach to a cloud computing network. In: The Proceedings of the first international conference on applications of digital information and web technologies, p 113","DOI":"10.1109\/ICADIWT.2008.4664329"},{"issue":"1","key":"9756_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/JPROC.2010.2060451","volume":"99","author":"J Baliga","year":"2011","unstructured":"Baliga, J., Ayre, R., Hinton, K., & Tucker, R. S. (2011). Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE, 99(1), 149\u2013167.","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"9756_CR11","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","volume":"17","author":"F Belanger","year":"2008","unstructured":"Belanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. Journal of Strategic Information Systems, 17(2), 165\u2013176.","journal-title":"Journal of Strategic Information Systems"},{"issue":"3","key":"9756_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1057\/ejis.2013.1","volume":"23","author":"A Bhattacherjee","year":"2014","unstructured":"Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems, 23(3), 357\u2013372.","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"9756_CR13","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1177\/002224378502200209","volume":"12","author":"TV Bonoma","year":"1985","unstructured":"Bonoma, T. V. (1985). Case research in marketing: Opportunities, problems, and a process. Journal of Marketing Research, 12(2), 199\u2013208.","journal-title":"Journal of Marketing Research"},{"key":"9756_CR14","unstructured":"Burton, G., (2015). Cloud computing security and privacy fears stopping EU from moving to 'government cloud' - report. [online] Available at: \n                    http:\/\/www.computing.co.uk\/ctg\/news\/2397802\/cloud-computing-security-and-privacy-fears-stopping-eu-from-moving-to-government-cloud-report\n                    \n                   [Accessed 1 Jul. 2015]."},{"key":"9756_CR15","unstructured":"Cabinet Office, (2010). Government ICT strategy, smarter, cheaper, Greener. London: the Stationery Office."},{"key":"9756_CR16","volume-title":"The ICT strategy for government","author":"Cabinet Office","year":"2011","unstructured":"Cabinet Office. (2011a). The ICT strategy for government. London: The Stationery Office."},{"key":"9756_CR17","volume-title":"Government cloud strategy","author":"Cabinet Office","year":"2011","unstructured":"Cabinet Office. (2011b). Government cloud strategy. London: The Stationery Office."},{"key":"9756_CR18","unstructured":"Catteddu, D., & Hogben, G. (2009). Cloud computing - benefits. Risks and Recommendations For Information Security. Information Security, 51273 Available At: \n                    http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-risk-assessment\n                    \n                  ."},{"issue":"3","key":"9756_CR19","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s10796-015-9557-2","volume":"18","author":"MB Chhetri","year":"2015","unstructured":"Chhetri, M. B., Chichin, S., Vo, Q., & Kowalczyk, R. (2015). Smart CloudBench\u2014A framework for evaluating cloud infrastructure performance. Information Systems Frontiers, 18(3), 413\u2013428.","journal-title":"Information Systems Frontiers"},{"key":"9756_CR20","volume-title":"Warwickshire county council signs google to pilot G-cloud E-mail service","author":"Computer Weekly","year":"2011","unstructured":"Computer Weekly, (2011). Warwickshire county council signs google to pilot G-cloud E-mail service."},{"key":"9756_CR21","unstructured":"Columbus, L. (2014). KPMG's 2014 cloud computing survey: Enterprises quickly moving beyond cost reduction to customer-driven results. [online] Forbes. Available at: \n                    http:\/\/www.forbes.com\/sites\/louiscolumbus\/2014\/12\/26\/kpmgs-2014-cloud-computing-survey-enterprises-quickly-moving-beyond-cost-reduction-to-customer-driven-results\/\n                    \n                   [Accessed 7 Jul. 2015]."},{"key":"9756_CR22","volume-title":"In: Reflections, challenges and new directions - 20th international conference on information systems development (Isd2011)","author":"GJ Costello","year":"2011","unstructured":"Costello, G. J., Clarke, R., Donnellan, B., & Lohan, J. (2011). Development of a prototype knowledge discovery portal for energy informatics. In In: Reflections, challenges and new directions - 20th international conference on information systems development (Isd2011). Edinburgh: Scotland."},{"key":"9756_CR23","volume-title":"Qualitative inquiry and research design: Choosing among five traditions","author":"J Creswell","year":"1998","unstructured":"Creswell, J. (1998). Qualitative inquiry and research design: Choosing among five traditions. Thousand Oaks: Sage Publications Inc.."},{"issue":"4","key":"9756_CR24","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1057\/jit.2009.17","volume":"24","author":"W Currie","year":"2009","unstructured":"Currie, W., & Swanson, E. (2009). Special issue on institutional theory in information systems research: Contextualizing the IT artefact. Journal of Information Technology, 24(4), 283\u2013285.","journal-title":"Journal of Information Technology"},{"key":"9756_CR25","volume-title":"Research methods","author":"FC Dane","year":"1990","unstructured":"Dane, F. C. (1990). Research methods. CA, USA: Brooks\/Cole, Pacific Cole."},{"key":"9756_CR26","doi-asserted-by":"crossref","unstructured":"Dyer, W. G., & Wilkins, A. L. (1991). Better stories, not better constructs, to generate better theory: A rejoinder to Eisenhardt. Academy of management review, 16(3), 613\u2013619.","DOI":"10.5465\/amr.1991.4279492"},{"key":"9756_CR27","unstructured":"Donnelly, C. (2015). Public sector IT suppliers call on government to extend G-Cloud 5. [online] Available at: \n                    http:\/\/www.computerweekly.com\/news\/4500245526\/Public-sector-IT-suppliers-call-on-government-to-extend-G-Cloud-5\n                    \n                   [Accessed 01 Jul. 2015]."},{"issue":"3\u20134","key":"9756_CR28","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.istr.2011.08.004","volume":"16","author":"PG Dorey","year":"2011","unstructured":"Dorey, P. G., & Leite, A. (2011). Commentary: Cloud computing \u2013 A security problem or solution? Information Security Technical Report, 16(3\u20134), 89\u201396.","journal-title":"Information Security Technical Report"},{"key":"9756_CR29","volume-title":"Management research","author":"M Easterby-Smith","year":"2008","unstructured":"Easterby-Smith, M., Thorpe, R., Jackson, P., & Lowe, A. (2008). Management research (3rd ed.). London: SAGE Publications Ltd..","edition":"3"},{"issue":"4","key":"9756_CR30","doi-asserted-by":"publisher","first-page":"532","DOI":"10.5465\/amr.1989.4308385","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532\u2013550.","journal-title":"Academy of Management Review"},{"key":"9756_CR31","unstructured":"ENISA, (2015). Security Framework for Governmental Clouds. [online] Athens, Greece: The European Union Agency for Network and Information Security (ENISA. Available at: \n                    https:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/cloud-computing\/governmental-cloud-security\/security-framework-for-govenmental-clouds\n                    \n                   [Accessed 6 Jul. 2015]."},{"key":"9756_CR32","unstructured":"European Commission, (2014). About cloud computing. [online] Available at: \n                    http:\/\/ec.europa.eu\/digital-agenda\/en\/about-cloud-computing\n                    \n                   [Accessed 18 Aug. 2014]."},{"key":"9756_CR33","unstructured":"Fichman, R. G. (1992, December). Information technology diffusion: A review of empirical research. In ICIS, pp., 195\u2013206."},{"key":"9756_CR34","unstructured":"Fiedler, J., (1978). Field research: A manual for logistics and management of Scientific studies in natural settings, San Francisco,USA: Jossey-Bass."},{"key":"9756_CR35","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1093\/jopart\/mus022","volume":"23","author":"J Fishenden","year":"2013","unstructured":"Fishenden, J., & Thompson, M. (2013). Digital government, open architecture, and innovation: Why public sector IT will never be the same again. Journal of Public Administration Research and Theory, 23, 977\u20131004.","journal-title":"Journal of Public Administration Research and Theory"},{"key":"9756_CR36","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., and Lu, S., (2008). Cloud computing and Grid computing 360-degree compared. Grid computing environments workshop Gce '08, pp. 1.","DOI":"10.1109\/GCE.2008.4738445"},{"key":"9756_CR37","unstructured":"Framingham, M., (2012). Research indicates that cloud increases short term costs for long term gains [homepage of Idg Enterprise], [online] Available: \n                    http:\/\/www.idgenterprise.com\/press\/research-indicates-that-cloud-increases-short-term-costs-for-long-term-gains,\n                    \n                   Accessed On 3 April 2012."},{"key":"9756_CR38","doi-asserted-by":"crossref","unstructured":"Gable, G. G. (1994). Integrating case study and survey research methods: an example in information systems. European journal of information systems, 3(2), 112\u2013126.","DOI":"10.1057\/ejis.1994.12"},{"key":"9756_CR39","first-page":"144","volume-title":"Choosing information systems research approaches, information systems research - issues, methods and practice guidelines","author":"RD Galliers","year":"1992","unstructured":"Galliers, R. D. (1992). Choosing information systems research approaches, information systems research - issues, methods and practice guidelines (pp. 144\u2013162). Blackwell Scientific, UK: Edited By Galliers R.D."},{"key":"9756_CR40","volume-title":"IT maturity model","author":"M Gartner","year":"2011","unstructured":"Gartner, M., (2011). IT maturity model, Gartner Group Research Note."},{"key":"9756_CR41","volume-title":"Roadblocks to effective strategy","author":"M Gartner","year":"2010","unstructured":"Gartner, M., (2010). Roadblocks to effective strategy, Gartner Group Research Note."},{"key":"9756_CR42","volume-title":"Independent review of public sector efficiency: Releasing resources to the front line","author":"P Gershon","year":"2004","unstructured":"Gershon, P., (2004). Independent review of public sector efficiency: Releasing resources to the front line, Hm Treasury."},{"key":"9756_CR43","first-page":"123","volume-title":"Characterizing cloud federation for enhancing Providers' profit. In: Proceedings Of Ieee 3rd International Conference On Cloud Computing Cloud","author":"I Goiri","year":"2010","unstructured":"Goiri, I., Guitart, J., & Torres, J. (2010). Characterizing cloud federation for enhancing Providers' profit. In: Proceedings Of Ieee 3rd International Conference On Cloud Computing Cloud (pp. 123\u2013130). Spain, IEEE: Barcelona."},{"key":"9756_CR44","unstructured":"Guardian, (2011). Hillingdon Goes For Google Apps [Homepage Of The Guardian], [Online]. Available: \n                    http:\/\/www.guardian.co.uk\/government-computing-network\/2011\/dec\/19\/hillingdon-council-google-apps\/print\n                    \n                  , Accessed 8 March 2012."},{"key":"9756_CR45","volume-title":"Research design: Strategies and choice in the design of social research","author":"C Hakim","year":"1987","unstructured":"Hakim, C. (1987). Research design: Strategies and choice in the design of social research. London: Allen and Unwin."},{"key":"9756_CR46","unstructured":"Hamouda, S., (2012). Security and privacy in cloud computing, Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, pp. 241\u2013245."},{"key":"9756_CR47","doi-asserted-by":"crossref","unstructured":"Herriott, R. E., & Firestone, W. A. (1983). Multisite qualitative policy research: Optimizing description and generalizability. Educational researcher, 12(2), 14\u201319.","DOI":"10.3102\/0013189X012002014"},{"key":"9756_CR48","unstructured":"Hochstrasser, B. (1992). Justifying IT investments. Conference Proceedings: Advanced Information Systems; the new technologies in today's business environment, pp. 17-28."},{"key":"9756_CR49","doi-asserted-by":"crossref","unstructured":"Iosup, A., Ostermann, S., Yigitbasi, N., Prodan, R., Fahringer, T., and Epema, D., (2011). Performance Analysis Of Cloud Computing Services For Many-Tasks Scientific Computing 22(6), 931\u2013945","DOI":"10.1109\/TPDS.2011.66"},{"issue":"6","key":"9756_CR50","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1057\/jors.2010.10","volume":"61","author":"Z Irani","year":"2010","unstructured":"Irani, Z. (2010). Investment evaluation within Project Management: An information systems perspective. Journal of the Operational Research Society, 61(6), 917\u2013928.","journal-title":"Journal of the Operational Research Society"},{"issue":"3","key":"9756_CR51","first-page":"161","volume":"17","author":"Z Irani","year":"2001","unstructured":"Irani, Z., & Love, P. E. D. (2001a). The propagation of technology management taxonomies for evaluating investments in information systems. Journal of Management Information Systems, 17(3), 161\u2013177.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"9756_CR52","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1111\/j.1365-2575.2005.00186.x","volume":"15","author":"Z Irani","year":"2005","unstructured":"Irani, Z., Love, P., Elliman, T., Jones, S., & Themistocleous, M. (2005). Evaluating e-government: Learning from the experiences of two UK local authorities. Information Systems Journal, 15(1), 61\u201382.","journal-title":"Information Systems Journal"},{"key":"9756_CR53","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4324\/9780080570105","volume-title":"Evaluating information systems: Public and private sector","author":"Z Irani","year":"2008","unstructured":"Irani, Z., & Love, P. E. D. (2008). Information systems evaluation: A crisis of understanding. In Z. Irani & P. E. D. Love (Eds.), Evaluating information systems: Public and private sector (1st ed., p. 20). UK: Butterworth-Heinemann.","edition":"1st"},{"issue":"1","key":"9756_CR54","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S0378-7206(01)00128-8","volume":"40","author":"Z Irani","year":"2002","unstructured":"Irani, Z. (2002). Information systems evaluation: Navigating through the problem domain. Information Management, 40(1), 11\u201324.","journal-title":"Information Management"},{"issue":"3","key":"9756_CR55","first-page":"161","volume":"17","author":"Z Irani","year":"2001","unstructured":"Irani, Z., & Love, P. E. D. (2001b). The propagation of technology management taxonomies for evaluating investments in information systems. Journal of Management Information System, 17(3), 161\u2013177.","journal-title":"Journal of Management Information System"},{"issue":"2","key":"9756_CR56","first-page":"117","volume":"9","author":"B Iyer","year":"2010","unstructured":"Iyer, B., & Henderson, J. (2010). Preparing for the future: Understanding the seven capabilities of cloud computing. MIS Quarterly Executive, 9(2), 117\u2013131.","journal-title":"MIS Quarterly Executive"},{"issue":"3","key":"9756_CR57","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1080\/19331680802425479","volume":"5","author":"PT Jaeger","year":"2008","unstructured":"Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3), 269\u2013283.","journal-title":"Journal of Information Technology & Politics"},{"key":"9756_CR58","doi-asserted-by":"publisher","unstructured":"Jansen, W.A, (2011), Cloud hooks: Security and privacy issues in cloud computing. System Sciences (HICSS), 2011 44th Hawaii International Conference on, vol., no., pp. 1,10, 4-7 Jan. 2011 doi:\n                    10.1109\/HICSS.2011.103","DOI":"10.1109\/HICSS.2011.103"},{"key":"9756_CR59","doi-asserted-by":"publisher","first-page":"602","DOI":"10.2307\/2392366","volume":"24","author":"TD Jick","year":"1979","unstructured":"Jick, T. D. (1979). Mixing qualitative and quantitative methods: Triangulation in accumulation. Administrative Science Quarterly, 24, 602\u2013611.","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"9756_CR60","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1111\/j.1539-6924.1981.tb01350.x","volume":"1","author":"S Kaplan","year":"1981","unstructured":"Kaplan, S., & Garrick, B. (1981). On the quantitative definition of risk. Risk Analysis, 1(1), 11\u201327.","journal-title":"Risk Analysis"},{"key":"9756_CR61","unstructured":"Kepes, B. (2015). A Cautionary Government Cloud Story--UK's G-Cloud. Does The \"G\" Stand For Gone?. [online] Forbes. Available at: \n                    http:\/\/www.forbes.com\/sites\/benkepes\/2015\/01\/27\/a-cautionary-government-cloud-story-uks-g-cloud-does-the-g-stand-for-gone\/\n                    \n                   [Accessed 1 Jul. 2015]."},{"key":"9756_CR62","first-page":"3257","volume":"1001","author":"A Khajeh-Hosseini","year":"2010","unstructured":"Khajeh-Hosseini, A., Sommerville, I., & Sriram, I. (2010). Research challenges for Enterprise cloud computing. Arxiv Preprint Arxiv, 1001, 3257.","journal-title":"Arxiv Preprint Arxiv"},{"issue":"1","key":"9756_CR63","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1111\/emre.12004","volume":"10","author":"S Khanagha","year":"2013","unstructured":"Khanagha, S., Volberda, H., Sidhu, J. S., & Oshri, I. (2013). Management innovation and adoption of emerging technologies: The case of cloud computing. European Management Review, 10(1), 51\u201367.","journal-title":"European Management Review"},{"issue":"1","key":"9756_CR64","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1057\/palgrave.jit.2000084","volume":"22","author":"J Kotlarsky","year":"2007","unstructured":"Kotlarsky, J., Oshri, I., Hillegersberyg, J., & Kumar, K. (2007). Globally distributed component-based software development: An exploratory study of knowledgement and work division. Journal of Information Technology, 22(1), 161\u2013173.","journal-title":"Journal of Information Technology"},{"key":"9756_CR65","doi-asserted-by":"crossref","unstructured":"Krishnaswamy, V., & Sundarraj, R. P. (2015). Organizational implications of a comprehensive approach for cloud-storage sourcing. Information Systems Frontiers, 19(1), 57\u201373.","DOI":"10.1007\/s10796-015-9588-8"},{"key":"9756_CR66","volume-title":"Federal Cloud Computing Strategy","author":"V Kundra","year":"2011","unstructured":"Kundra, V. (2011). Federal Cloud Computing Strategy. Washington DC: The White House Washington."},{"issue":"3","key":"9756_CR67","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0378-7206(01)00143-4","volume":"40","author":"P Legris","year":"2003","unstructured":"Legris, P., Ingham, J., & Collerette, P. (2003). Why do people use information technology? A critical review of the technology acceptance model. Information Management, 40(3), 191\u2013204.","journal-title":"Information Management"},{"issue":"1","key":"9756_CR68","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0378-7206(03)00002-8","volume":"41","author":"C Lin","year":"2003","unstructured":"Lin, C., & Pervan, G. (2003). The practice of is\/it benefits management in large Australian organizations. Information Management, 41(1), 13\u201324.","journal-title":"Information Management"},{"issue":"5","key":"9756_CR69","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1016\/j.future.2012.12.007","volume":"29","author":"W Lloyd","year":"2013","unstructured":"Lloyd, W., Pallickara, S., David, O., Lyon, J., Arabi, M., & Rojas, K. (2013). Performance implications of multi-tier application deployments on infrastructure-as-a-service clouds: Towards performance modeling. Future Generation Computer Systems, 29(5), 1254\u20131264.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"9756_CR70","first-page":"49","volume":"9","author":"J Luftman","year":"2010","unstructured":"Luftman, J., & Ben-Zvi, T. (2010a). Key issues for IT executives 2009: Difficult Economy's impact on it. MIS Quarterly Executive, 9(1), 49\u201359.","journal-title":"MIS Quarterly Executive"},{"issue":"4","key":"9756_CR71","first-page":"263","volume":"9","author":"J Luftman","year":"2010","unstructured":"Luftman, J., & Ben-Zvi, T. (2010b). Key issues for it executives 2010: Judicious it investments continue post-recession. MIS Quarterly Executive, 9(4), 263\u2013273.","journal-title":"MIS Quarterly Executive"},{"issue":"4","key":"9756_CR72","first-page":"203","volume":"10","author":"J Luftman","year":"2011","unstructured":"Luftman, J., & Ben-Zvi, T. (2011). Key issues for it executives 2011: Cautious optimism in Uncertain economic times. MIS Quarterly Executive, 10(4), 203\u2013212.","journal-title":"MIS Quarterly Executive"},{"key":"9756_CR73","unstructured":"Marinescu, D. C. (2013). Cloud computing: theory and practice. 1st ed. Amsterdam: Elsevier Science."},{"issue":"1","key":"9756_CR74","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jsis.2011.11.002","volume":"21","author":"M Marabelli","year":"2012","unstructured":"Marabelli, M., & Newell, S. (2012). Knowledge risks in organizational networks: The practice perspective. Journal of Strategic Information Systems, 21(1), 18\u201330.","journal-title":"Journal of Strategic Information Systems"},{"key":"9756_CR75","first-page":"472","volume":"5931","author":"A Marinos","year":"2009","unstructured":"Marinos, A., & Briscoe, G. (2009). Community cloud computing. Cloud Computing \u2013 Lecture Notes In Computer Science, 5931, 472\u2013484.","journal-title":"Cloud Computing \u2013 Lecture Notes In Computer Science"},{"issue":"1","key":"9756_CR76","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing \u2014 The business perspective. Decision Support Systems, 51(1), 176\u2013189.","journal-title":"Decision Support Systems"},{"issue":"4","key":"9756_CR77","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1007\/s10796-011-9317-x","volume":"14","author":"B Martens","year":"2012","unstructured":"Martens, B., & Teuteberg, F. (2012). Decision-making in cloud computing environments: A cost and risk based approach. Information Systems Frontiers, 14(4), 871\u2013893.","journal-title":"Information Systems Frontiers"},{"key":"9756_CR78","unstructured":"Mendoza, S., (2014). Local Governments Embrace Cloud: 5 Benefits - InformationWeek. [online] Available at: \n                    http:\/\/www.informationweek.com\/government\/cloud-computing\/local-governments-embrace-cloud-5-benefits\/d\/d-id\/1315986\n                    \n                   [Accessed 7 Jul. 2015]."},{"key":"9756_CR79","unstructured":"Miller, R., (2009). Obama tech team envisions federal cloud Data center knowledge, Available online: \n                    http:\/\/www.datacenterknowledge.com\/archives\/2009\/01\/20\/obama-techteam-envisions-federal-cloud\/\n                    \n                  ."},{"issue":"3","key":"9756_CR80","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1287\/isre.2.3.192","volume":"2","author":"GC Moore","year":"1991","unstructured":"Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192\u2013222.","journal-title":"Information Systems Research"},{"issue":"4","key":"9756_CR81","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1057\/palgrave.ejis.3000623","volume":"15","author":"A Molla","year":"2006","unstructured":"Molla, A., Heeks, R., & Balcells, I. (2006). Adding clicks to bricks: A case study of E-commerce adoption by a Catalan small retailer. European Journal of Information Systems, 15(4), 424\u2013438.","journal-title":"European Journal of Information Systems"},{"issue":"7","key":"9756_CR82","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5120\/1262-1613","volume":"7","author":"K Mukherjee","year":"2010","unstructured":"Mukherjee, K., & Sahoo, G. (2010). Cloud computing: Future framework for E-governance. International Journal of Computer Applications, 7(7), 31\u201334.","journal-title":"International Journal of Computer Applications"},{"issue":"3","key":"9756_CR83","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/09685229810225001","volume":"6","author":"E-J Mutsaer","year":"1998","unstructured":"Mutsaer, E.-J., Zee, H. V. D., & Giertz, H. (1998). The evolution of information technology. Information Management & Computer Security, 6(3), 115\u2013126.","journal-title":"Information Management & Computer Security"},{"issue":"2","key":"9756_CR84","doi-asserted-by":"publisher","first-page":"241","DOI":"10.2307\/249422","volume":"21","author":"MD Myers","year":"1997","unstructured":"Myers, M. D. (1997). Qualitative research in information systems. MIS Quarterly Executive, 21(2), 241\u2013242.","journal-title":"MIS Quarterly Executive"},{"key":"9756_CR85","volume-title":"Landscape review, information and communications technology in government","author":"National Audit Office","year":"2011","unstructured":"National Audit Office. (2011). Landscape review, information and communications technology in government. London: The Stationery Office."},{"issue":"2","key":"9756_CR86","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.jsis.2011.12.003","volume":"21","author":"LR Nolan","year":"2012","unstructured":"Nolan, L. R. (2012). Ubiquitous IT: The case of the Boeing 787 and implications for strategic IT research. Journal of Strategic Information Systems, 21(2), 91\u2013102.","journal-title":"Journal of Strategic Information Systems"},{"issue":"3","key":"9756_CR87","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","volume":"27","author":"S Paquette","year":"2010","unstructured":"Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245\u2013253.","journal-title":"Government Information Quarterly"},{"issue":"3","key":"9756_CR88","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.infoandorg.2011.07.001","volume":"21","author":"S Pan","year":"2011","unstructured":"Pan, S., & Tan, B. (2011). Demystifying case research: A structured\u2013pragmatic\u2013situational (Sps) approach to conducting case studies. Information and Organization, 21(3), 161\u2013176.","journal-title":"Information and Organization"},{"key":"9756_CR89","unstructured":"Panda, S. K., Gupta, I., & Jana, P. K. (2017). Task scheduling algorithms for multi-cloud systems: Allocation-aware approach. Information Systems Frontiers, 1\u201319."},{"key":"9756_CR90","unstructured":"Perepa, S. (2013). Why the U.S. Government is Moving to Cloud Computing. [online] WIRED. Available at: \n                    http:\/\/www.wired.com\/2013\/09\/why-the-u-s-government-is-moving-to-cloud-computing\/\n                    \n                   [Accessed 1 Jul. 2015]."},{"key":"9756_CR91","unstructured":"Pillay, H., (2014). Technology as catalyst for government cloud transformation | ZDNet. [online] ZDNet. Available at: \n                    http:\/\/www.zdnet.com\/technology-as-catalyst-for-government-cloud-transformation-7000032722\/\n                    \n                   [Accessed 26 Aug. 2014]."},{"key":"9756_CR92","first-page":"344","volume-title":"Mipro Proceedings of the 33rd international convention","author":"K Popovic","year":"2010","unstructured":"Popovic, K., & Hocenski, Z. (2010). Cloud computing security issues and challenges. In Mipro Proceedings of the 33rd international convention (pp. 344\u2013349). IEEE: Opatija, Croatia."},{"key":"9756_CR93","volume-title":"Who coined 'Cloud Computing'?","author":"A Regealado","year":"2011","unstructured":"Regealado, A. (2011). Who coined 'Cloud Computing'? Massachusetts: MIT Technology Review."},{"key":"9756_CR94","volume-title":"Effective measurement and management of IT costs and benefits","author":"D Remenyi","year":"2000","unstructured":"Remenyi, D., Money, A., Sherwood-Smith, M., & Irani, Z. (2000). Effective measurement and management of IT costs and benefits. Oxford: Butterworth-Heinemann."},{"key":"9756_CR95","first-page":"677","volume":"71","author":"NC Roberts","year":"2011","unstructured":"Roberts, N. C. (2011). Beyond smokestacks and silos: Open-source. Web-Enabled Coordination in Organizations and Networks, Public Administration Review, 71, 677\u2013693.","journal-title":"Web-Enabled Coordination in Organizations and Networks, Public Administration Review"},{"issue":"4","key":"9756_CR96","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1057\/ejis.1993.39","volume":"2","author":"T Saarinen","year":"1993","unstructured":"Saarinen, T., & Veps\u00e4l\u00e4inen, A. (1993). Managing the risks of information systems implementation. European Journal of Information Systems, 2(4), 283\u2013295.","journal-title":"European Journal of Information Systems"},{"key":"9756_CR97","unstructured":"Sabi, H. M., Uzoka, F. M. E., Langmia, K., Njeh, F. N., & Tsuma, C. K. (2017). A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa. Information Systems Frontiers, 1\u201324."},{"key":"9756_CR98","volume-title":"Guide to enterprise telework and remote access security, national institute of standards and technology","author":"K Scarfone","year":"2009","unstructured":"Scarfone, K., Hoffman, P., & Souppaya, M. (2009). Guide to enterprise telework and remote access security, national institute of standards and technology. Gaithersburg: U.S Department of Commerce."},{"issue":"2","key":"9756_CR99","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1108\/17410391011019732","volume":"23","author":"AM Sharif","year":"2010","unstructured":"Sharif, A. M. (2010). It's written in the cloud: The hype and promise of cloud computing. Journal of Enterprise Information Management, 23(2), 131\u2013134.","journal-title":"Journal of Enterprise Information Management"},{"key":"9756_CR100","volume-title":"Research methods in psychology","author":"JJ Shaughnessy","year":"1994","unstructured":"Shaughnessy, J. J., & Zechmeister, E. B. (1994). Research methods in psychology. New York: Mcgraw-Hill."},{"issue":"2","key":"9756_CR101","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.giq.2012.06.012","volume":"30","author":"D Shin","year":"2013","unstructured":"Shin, D. (2013). User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 30(2), 194\u2013203.","journal-title":"Government Information Quarterly"},{"key":"9756_CR102","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.jbusres.2016.08.001","volume":"70","author":"U Sivarajah","year":"2017","unstructured":"Sivarajah, U., Kamal, M. M., Irani, Z., & Weerakkody, V. (2017). Critical analysis of big data challenges and analytical methods. Journal of Business Research, 70, 263\u2013286.","journal-title":"Journal of Business Research"},{"issue":"4","key":"9756_CR103","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.giq.2015.06.004","volume":"32","author":"U Sivarajah","year":"2015","unstructured":"Sivarajah, U., Irani, Z., & Weerakkody, V. (2015). Evaluating the use and impact of web 2.0 technologies in local government. Government Information Quarterly, 32(4), 473\u2013487.","journal-title":"Government Information Quarterly"},{"key":"9756_CR104","unstructured":"Sivarajah, U., Irani, Z. and Jones, S. (2014) Application of web 2.0 technologies in E-government: A United Kingdom case study. System Sciences (HICSS), 2014 47th Hawaii International Conference on, pp. 2221."},{"key":"9756_CR105","volume-title":"Local, regional, national: What services are best delivered where?","author":"J Simpson","year":"2011","unstructured":"Simpson, J. (2011). Local, regional, national: What services are best delivered where? Cardiff: Welsh Governemnt."},{"issue":"1","key":"9756_CR106","first-page":"13","volume":"1","author":"HA Smith","year":"2004","unstructured":"Smith, H. A., Mckeen, J. D., & Street, C. (2004). Linking it to business metrics. Journal of Information Science and Technology, 1(1), 13\u201325.","journal-title":"Journal of Information Science and Technology"},{"issue":"2","key":"9756_CR107","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ijinfomgt.2013.12.011","volume":"34","author":"N Sultan","year":"2014","unstructured":"Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management, 34(2), 177\u2013184.","journal-title":"International Journal of Information Management"},{"issue":"1","key":"9756_CR108","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.ijinfomgt.2012.08.006","volume":"33","author":"N Sultan","year":"2013","unstructured":"Sultan, N. (2013). Knowledge management in the age of cloud computing and web 2.0 Experiencing the power of disruptive innovations. International Journal of Information Management, 33(1), 160\u2013165.","journal-title":"International Journal of Information Management"},{"issue":"3","key":"9756_CR109","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.ijinfomgt.2010.08.001","volume":"31","author":"NA Sultan","year":"2011","unstructured":"Sultan, N. A. (2011). Reaching for the \u201ccloud\u201d: How Smes can manage. International Journal of Information Management, 31(3), 272\u2013278.","journal-title":"International Journal of Information Management"},{"issue":"1","key":"9756_CR110","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jsis.2011.11.001","volume":"21","author":"P Trkman","year":"2012","unstructured":"Trkman, P., & Desouza, C. K. (2012). Knowledge risks in organizational networks: An exploratory framework. Journal of Strategic Information Systems, 21(1), 1\u201317.","journal-title":"Journal of Strategic Information Systems"},{"issue":"2","key":"9756_CR111","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1057\/ejis.1995.9","volume":"4","author":"G Walsham","year":"1995","unstructured":"Walsham, G. (1995). Interpretive case studies in is research: Nature and method. European Journal of Information Systems, 4(2), 74\u201381.","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"9756_CR112","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1057\/ejis.1996.3","volume":"4","author":"J Ward","year":"1996","unstructured":"Ward, J., Taylor, P., & Bond, P. (1996). Evaluation and realisation of is\/it benefits: An empirical study of current practice. European Journal of Information Systems, 4(4), 214\u2013225.","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"9756_CR113","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1057\/jit.2009.16","volume":"24","author":"V Weerakkody","year":"2009","unstructured":"Weerakkody, V., Dwivedi, Y., & Irani, Z. (2009). The diffusion and use of institutional theory: A cross-disciplinary longitudinal literature survey. Journal of Information Technology, 24(4), 354\u2013368.","journal-title":"Journal of Information Technology"},{"key":"9756_CR114","volume-title":"Enterprise resource management solutions and their value","author":"B Wilderman","year":"1999","unstructured":"Wilderman, B. (1999). Enterprise resource management solutions and their value. Stanford: Metagroup."},{"issue":"1","key":"9756_CR115","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1108\/09565690910937236","volume":"19","author":"L Wilkins","year":"2009","unstructured":"Wilkins, L., Swatman, P. M. C., & Holt, D. (2009). Achieved and tangible benefits: Lessons learned from a landmark EDRMS implementation. Records Management Journal, 19(1), 37\u201353.","journal-title":"Records Management Journal"},{"issue":"2","key":"9756_CR116","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186\u2013204.","journal-title":"Management Science"},{"issue":"2","key":"9756_CR117","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MITP.2009.23","volume":"11","author":"J Voas","year":"2009","unstructured":"Voas, J., & Zhang, J. (2009). Cloud computing: New wine or just a new bottle? It Professional, 11(2), 15\u201317.","journal-title":"It Professional"},{"key":"9756_CR118","volume-title":"Moving to the cloud: An introduction to cloud computing in government","author":"DC Wyld","year":"2009","unstructured":"Wyld, D. C. (2009). Moving to the cloud: An introduction to cloud computing in government. Washington DC: IBM Center for The Business Of Government."},{"issue":"6","key":"9756_CR119","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1111\/j.1540-6210.2012.02671.x","volume":"72","author":"H Xu","year":"2012","unstructured":"Xu, H. (2012). Information technology, public administration and citizen participation: The impacts of e-government on political and administrative processes. Public Administration Review, 72(6), 915\u2013920.","journal-title":"Public Administration Review"},{"key":"9756_CR120","unstructured":"Yam, C., Baldwin, A., Shiu, S. and Ioannidis, I., (2011). Migration to cloud as real option: Investment decision under uncertainty, 2011 I.E. 10th International Conference on Trust, Security and Privacy in Computing and Communications, 11\/16 2011, IEEE, pp. 940-949."},{"key":"9756_CR121","volume-title":"Case study research: Design and methods","author":"RK Yin","year":"2009","unstructured":"Yin, R. K. (2009). Case study research: Design and methods (Fourth ed.). California: Sage Publications.","edition":"Fourth"},{"key":"9756_CR122","first-page":"1","volume":"08","author":"L Youseff","year":"2008","unstructured":"Youseff, L., Butrico, M., & Da Silva, D. (2008). Toward a unified ontology of cloud computing. Grid Computing Environments Workshop Gce, 08, 1\u201310.","journal-title":"Grid Computing Environments Workshop Gce"},{"issue":"2","key":"9756_CR123","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.giq.2010.05.010","volume":"28","author":"D Zissis","year":"2011","unstructured":"Zissis, D., & Lekkas, D. (2011). Securing E-government and E-voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239\u2013251.","journal-title":"Government Information Quarterly"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9756-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9756-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9756-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T02:35:18Z","timestamp":1567218918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9756-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,12]]},"references-count":123,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9756"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9756-0","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,12]]},"assertion":[{"value":"12 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}