{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:35:02Z","timestamp":1767926102393,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T00:00:00Z","timestamp":1359590400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s12525-012-0120-4","type":"journal-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T02:27:28Z","timestamp":1359512848000},"page":"105-114","source":"Crossref","is-referenced-by-count":83,"title":["Cloud computing in industrial SMEs: identification of the barriers to its adoption and effects of its application"],"prefix":"10.1007","volume":"23","author":[{"given":"Sara","family":"Trigueros-Preciado","sequence":"first","affiliation":[]},{"given":"Daniel","family":"P\u00e9rez-Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Solana-Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,31]]},"reference":[{"key":"120_CR1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-642-13365-7_20","volume":"76","author":"M Ahmad","year":"2010","unstructured":"Ahmad, M. (2010). Security risks of cloud computing and its emergence as 5th utility service. Information Security and Assurance. Communications in Computer and Information Science, 76, 209\u2013219.","journal-title":"Information Security and Assurance. Communications in Computer and Information Science"},{"key":"120_CR2","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Konwinski, A.et al. (2009). Above the clouds: A Berkeley view of cloud computing. Retrieved 1 March, 2011, from http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2009\/EECS-2009-28.pdf"},{"key":"120_CR3","unstructured":"Bayrak, E., Conley, J. P., & Wilkie, S. (2011). The economics of cloud computing, No 1118, Working Papers, Department of Economics, Vanderbilt University. Retrieved 1 March, 2012, from, http:\/\/EconPapers.repec.org\/RePEc:van:wpaper:1118"},{"key":"120_CR4","unstructured":"Betcher, T.J. (2010). Cloud computing: Key IT-related risks and mitigation strategies for consideration by IT security practitioners. Retrieved 9 December, 2010, from http:\/\/www.academicroom.com\/dissertation\/cloud-computing-key-it-related-risks-and-mitigation-strategies-consideration-it-securit?discipline=385837"},{"issue":"1","key":"120_CR5","first-page":"60","volume":"2","author":"S Bhardwaj","year":"2010","unstructured":"Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A Study of Infrastructure as a Service (IaaS). International Journal of Engineering and Information Technology, 2(1), 60\u201363.","journal-title":"International Journal of Engineering and Information Technology"},{"key":"120_CR6","unstructured":"B\u00f6hm, M., Leimeister, S., Riedl, C., & Krcmar, H. (2010). Cloud computing and computing evolution. Retrieved 9 December, 2010, from http:\/\/www.joint-research.org\/wp-content\/uploads\/2011\/07\/BoehmEtAl2009c.pdf"},{"issue":"4","key":"120_CR7","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1162\/003465303772815736","volume":"85","author":"E Brynjolfsson","year":"2003","unstructured":"Brynjolfsson, E., & Hitt, L. M. (2003). Computing productivity: firm level evidence. The Review of Economics and Statistics, 85(4), 793\u2013808.","journal-title":"The Review of Economics and Statistics"},{"key":"120_CR8","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C.S. & Venugopal, S. (2008). Market-oriented cloud computing: Vision, Hype, and Reality for delivering IT services as computing utility. 10th IEEE International Conference on High Performance Computing and Communications, Dalian. doi: 10.1109\/HPCC.2008.172","DOI":"10.1109\/HPCC.2008.172"},{"key":"120_CR9","doi-asserted-by":"crossref","unstructured":"Cellary, W., & Strykowski, S. (2009). e-government based on cloud computing and service-oriented architecture, In (Eds), Proceedings of ACM International Conference Proceeding Series, Bogota, Colombia, ACM New York.","DOI":"10.1145\/1693042.1693045"},{"key":"120_CR10","unstructured":"Chen, Y., Paxson, V., & Katz, R.H. (2010) What\u2019s new about cloud computing security?. Tech. report UCB\/EECS-2010-5, EECS Dept., Univ. of California, Berkeley."},{"key":"120_CR11","doi-asserted-by":"crossref","unstructured":"Clemons, E., & Chen, Y. (2011). Making the decision to contract for cloud services: managing the risk of an extreme form of IT outsourcing, In Proceedings of 44th Hawaii International Conference on System Sciences, Kauai. doi: 10.1109\/HICSS.2011.292","DOI":"10.1109\/HICSS.2011.292"},{"key":"120_CR12","unstructured":"Cloud Security Alliance. (2009). Security guidance for critical areas of focus in cloud computing. Retrieved 11 December, 2010, from http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.pdf"},{"issue":"5","key":"120_CR13","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.ijinfomgt.2010.05.012","volume":"30","author":"R Colomo-Palacios","year":"2010","unstructured":"Colomo-Palacios, R., Garc\u00eda-Crespo, \u00c1., Soto-Acosta, P., Ruano-Mayoral, M., & Jim\u00e9nez-L\u00f3pez, D. (2010). A case analysis of semantic technologies for R&D intermediation information management. International Journal of Information Management, 30(5), 465\u2013469.","journal-title":"International Journal of Information Management"},{"key":"120_CR14","unstructured":"Das, R., Patnaik, S., & Misro, A.K. (2011). Adoption of cloud computing in e-Governance. Paper in CCSIT 2011, Part III, CCIS, 161\u2013172, Springer: Berlin Heidelberg."},{"issue":"2","key":"120_CR15","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1287\/isre.1090.0261","volume":"22","author":"S Dewan","year":"2011","unstructured":"Dewan, S., & Ren, F. (2011). Information technology and firm boundaries: impact on firm risk and return performance. Information Systems Research, 22(2), 369\u2013388.","journal-title":"Information Systems Research"},{"key":"120_CR16","doi-asserted-by":"crossref","unstructured":"Dillon, T., Wu, C. & Chang, E. (2010). Cloud computing: Issues and challenges, In Proceedings of 24th International Conference on Information Networking and Applications Perth, IEEE, 27\u201333.","DOI":"10.1109\/AINA.2010.187"},{"issue":"2","key":"120_CR17","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1108\/14691930910952614","volume":"10","author":"JC Dumay","year":"2009","unstructured":"Dumay, J. C. (2009). Intellectual capital measurement: a critical approach. Journal of Intellectual Capital, 10(2), 190\u2013210.","journal-title":"Journal of Intellectual Capital"},{"key":"120_CR18","unstructured":"ENISA. (2009). Cloud computing: benefits, risks and recommendations for information security. Retrieved 12 December, 2010, from http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-risk-assessment\/at_download\/fullReport"},{"issue":"2","key":"120_CR19","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MS.2009.31","volume":"26","author":"H Erdogmus","year":"2009","unstructured":"Erdogmus, H. (2009). Cloud computing: does nirvana hide behind the nebula? IEEE Software, 26(2), 4\u20136. Retrieved 10 December, 2010 from http:\/\/ieeexplore.ieee.org.libproxy.uoregon.edu\/stamp\/stamp.jsp?arnumber=04786942 .","journal-title":"IEEE Software"},{"issue":"2","key":"120_CR20","first-page":"179","volume":"54","author":"F Etro","year":"2009","unstructured":"Etro, F. (2009). The economic impact of cloud computing on business creation, employment and output in the E.U. Review of Business and Economics, 54(2), 179\u2013208.","journal-title":"Review of Business and Economics"},{"key":"120_CR21","unstructured":"Etro, F. (2010) The economic consequences of the diffusion of cloud computing, in Dutta, S., & Mia, I. (2010). The Global Information Technology Report 2009\u20132010 ICT for Sustainability. Londres, Foro Econ\u00f3mico Mundial-INSEAD."},{"key":"120_CR22","unstructured":"European Commission. (2010) The future of cloud computing. Opportunities for European cloud computing beyond 2010. From http:\/\/cordis.europa.eu\/fp7\/ict\/ssai\/docs\/cloud-report-final.pdf"},{"key":"120_CR23","unstructured":"Geelan, J. (2009). Twenty-one experts define cloud computing. Virtualization Journal. Retrieved 4 December, 2010, from http:\/\/virtualization.sys-con.com\/node\/612375 ."},{"key":"120_CR24","doi-asserted-by":"crossref","unstructured":"Hubbard, D. W. (2010). How to measure anything: finding the value of intangibles in business. 2nd Edition. John Wiley & Sons.","DOI":"10.1002\/9781118983836"},{"key":"120_CR25","unstructured":"IDC. (2009). IDC\u2019s new IT cloud services forecast: 2009\u20132013. Retrieved 5 May, 2011, from http:\/\/blogs.idc.com\/ie\/?p=543"},{"key":"120_CR26","unstructured":"International Data Corporation, IDC ( 2008). IT cloud services forecast-2008\u20132012: A key driver for growth. Retrieved 4 December, 2010, from http:\/\/blogs.idc.com\/ie\/?p\u2009=\u2009224."},{"issue":"4","key":"120_CR27","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"L Kaufman","year":"2009","unstructured":"Kaufman, L. (2009). Data security in the world of cloud computing. Security & Privacy, 7(4), 61\u201364.","journal-title":"Security & Privacy"},{"issue":"1","key":"120_CR28","doi-asserted-by":"crossref","first-page":"65","DOI":"10.5381\/jot.2009.8.1.c4","volume":"8","author":"W Kim","year":"2009","unstructured":"Kim, W. (2009). Cloud computing: Today and Tomorrow. Journal of Object Technology, 8(1), 65\u201372.","journal-title":"Journal of Object Technology"},{"key":"120_CR29","volume-title":"Identity in the age of cloud computing: The next-generation Internet\u2019s impact on business, governance and social interaction","author":"J Lasica","year":"2009","unstructured":"Lasica, J. (2009). Identity in the age of cloud computing: The next-generation Internet\u2019s impact on business, governance and social interaction. Washington, D.C: Aspen Institute."},{"issue":"1","key":"120_CR30","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MC.2009.20","volume":"42","author":"N Leavitt","year":"2009","unstructured":"Leavitt, N. (2009). Is cloud computing really ready for prime time? Computer, 42(1), 15\u201325.","journal-title":"Computer"},{"issue":"4","key":"120_CR31","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1080\/10580530802384761","volume":"25","author":"JJ-Y Lee","year":"2008","unstructured":"Lee, J. J.-Y. (2008). Complementary effects of information technology investment on firm profitability: the functional forms of the complementarities. Information Systems Management, 25(4), 364\u2013371.","journal-title":"Information Systems Management"},{"issue":"2","key":"120_CR32","first-page":"305","volume":"7","author":"S Ma","year":"2012","unstructured":"Ma, S. (2012). A review on cloud computing development. Journal of Networks, 7(2), 305\u2013310.","journal-title":"Journal of Networks"},{"issue":"1","key":"120_CR33","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing: the business perspective. Decision Support Systems, 51(1), 176\u2013189.","journal-title":"Decision Support Systems"},{"key":"120_CR34","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T. (2011). The NIST definition of cloud computing. recommendations of the national institute of standards and technology. Special publication 800\u2013145","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"2","key":"120_CR35","doi-asserted-by":"crossref","first-page":"283","DOI":"10.2307\/25148636","volume":"28","author":"N Melville","year":"2004","unstructured":"Melville, N., Kraemer, K., & Gurbaxani, V. (2004). Information technology and organizational performance: an integrative model of it business value. MIS Quarterly, 28(2), 283\u2013322.","journal-title":"MIS Quarterly"},{"key":"120_CR36","unstructured":"OECD, (2009). The impact of the global crisis on SME and entrepreneurship financing and policy responses. Retrieved 9 December 2010, from: http:\/\/www.oecd.org\/cfe\/smesandentrepreneurship\/43183090.pdf"},{"key":"120_CR37","unstructured":"OECD (2010): Information technology outlook 2010 highlights. OECD publications. Retrieved 7 February, 2011, from: http:\/\/www.oecd.org\/dataoecd\/60\/21\/46444955.pdf"},{"issue":"5","key":"120_CR38","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1002\/(SICI)1097-0266(199705)18:5<375::AID-SMJ876>3.0.CO;2-7","volume":"18","author":"TC Powell","year":"1997","unstructured":"Powell, T. C., & Dent-Micallef, A. (1997). Information technology as competitive advantage: the role of human, business, and technology resources. Strategic Management Journal, 18(5), 375\u2013405.","journal-title":"Strategic Management Journal"},{"issue":"4","key":"120_CR39","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s11628-011-0120-z","volume":"5","author":"T Ramayah","year":"2011","unstructured":"Ramayah, T., Lee, W. C., & Boey, C. I. (2011). Network collaboration and performance in the tourism sector. Service Business, 5(4), 411\u2013428.","journal-title":"Service Business"},{"key":"120_CR40","doi-asserted-by":"crossref","unstructured":"Rastogi, A. (2010). A model based approach to implement cloud computing in e-Governance. International Journal of Computer Applications, 9(7), 15\u201318.","DOI":"10.5120\/1399-1888"},{"key":"120_CR41","unstructured":"Rittinghouse, J., & Ransome, J. (2010). Cloud computing implementation, management and security. Boca Raton: Taylor and Francis."},{"key":"120_CR42","doi-asserted-by":"crossref","unstructured":"Russ, M., Jones, J. G., & Jones, J. K. (2008). Knowledge-based strategies and systems: A systematic review. In M. Lytras, M. Russ, R. Maier, & A. Naeve (Eds.), Knowledge management strategies: A handbook of applied technologies (pp. 1\u201362). doi: 10.4018\/978-1-59904-603-7 .","DOI":"10.4018\/978-1-59904-603-7"},{"issue":"8","key":"120_CR43","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1016\/j.im.2003.06.004","volume":"41","author":"P Sher","year":"2004","unstructured":"Sher, P., & Lee, V. (2004). Information technology as a facilitator for enhancing dynamic capabilities through knowledge management. Information Management, 41(8), 933\u2013945.","journal-title":"Information Management"},{"issue":"18","key":"120_CR44","first-page":"4096","volume":"4","author":"P Soto-Acosta","year":"2010","unstructured":"Soto-Acosta, P., Loukis, E., Colomo-Palacios, R., & Lytras, M. D. (2010). An empirical research of the effect of internet-based innovation on business value. African Journal of Business Management, 4(18), 4096\u20134105.","journal-title":"African Journal of Business Management"},{"key":"120_CR45","doi-asserted-by":"crossref","unstructured":"Takabi, H., Joshi, J.B.D., & Ahn, G.J. (2010). Securecloud: Towards a comprehensive security framework for cloud computing environments. Proc. 1st IEEE Int Workshop Emerging Applications for Cloud Computing (CloudApp 2010), IEEE CS Press, 2010, 393\u2013398.","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"120_CR46","unstructured":"Tsaravas, C., & Themistocleous, M. (2011). Cloud computing and e-government: A literature review. European, Mediterranean & Middle Eastern Conference on Information Systems 2011,(EMCIS2011) May 30\u201331 2011, Athens."},{"issue":"1","key":"120_CR47","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"L Vaquero","year":"2009","unstructured":"Vaquero, L., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009). A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50\u201355.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"120_CR48","unstructured":"Velte, A., Velte, T., & Elsenpeter, R. (2010). Cloud computing a practical approach. McGraw-Hill."},{"key":"120_CR49","doi-asserted-by":"crossref","unstructured":"Youseff, L., Butrico, M., & Da Silva, D. (2008). Toward a unified ontology of cloud computing, In Proceedings of Grid Computing Environments Workshop, Austin. doi: 10.1109\/GCE.2008.4738443","DOI":"10.1109\/GCE.2008.4738443"},{"issue":"3","key":"120_CR50","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583\u2013592.","journal-title":"Future Generation Computer Systems"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-012-0120-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12525-012-0120-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-012-0120-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T01:03:19Z","timestamp":1562634199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12525-012-0120-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,31]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["120"],"URL":"https:\/\/doi.org\/10.1007\/s12525-012-0120-4","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,31]]}}}