{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T15:06:03Z","timestamp":1760799963991,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/cbi.2016.36","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:41:25Z","timestamp":1481575285000},"page":"255-261","source":"Crossref","is-referenced-by-count":3,"title":["Cloud Impact on IT Governance"],"prefix":"10.1109","author":[{"given":"Sabine","family":"Khalil","sequence":"first","affiliation":[]},{"given":"Valerie","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"Valerie","family":"Fautrero","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1201\/1078\/44705.21.4.20040901\/84183.2","article-title":"Crafting information's technology governance","volume":"21","author":"peterson","year":"0","journal-title":"Information Systems Management"},{"year":"2003","key":"ref38","article-title":"Board briefing on IT governance. Information Technology Governance Institute"},{"article-title":"Federal cloud computing strategy","year":"2011","author":"kundra","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-241-4_16"},{"key":"ref31","article-title":"Cloud Computing-based IT Solutions For Organizations with Multiregional Branch Offices","author":"wang","year":"2011","journal-title":"Proceedings of the Second International Conference on Information Management and Evaluation Academic Conferences Limited"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4108\/eb.2012.07-09.e4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.317319"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"ref35","first-page":"24","article-title":"Protection in the Cloud: Risk Management and Insurance for Cloud Computing","volume":"15","author":"gold","year":"0","journal-title":"Journal of Internet Law"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408793"},{"key":"ref10","first-page":"257","article-title":"The organizing vision of cloud computing in Taiwan","volume":"12","author":"yang","year":"0","journal-title":"Journal of Electronic Commerce Research"},{"journal-title":"Information technology governance","year":"2004","author":"van","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"year":"2013","key":"ref12","article-title":"Fondamentaux du Cloud Computing: le point de vue des grandes entreprises"},{"key":"ref13","first-page":"13","article-title":"Factors Influencing the Adoption of Cloud Computing by Small and Medium Enterprises (SMEs) in Developing Economies","volume":"2","author":"yeboah-boateng","year":"0","journal-title":"International Journal of Emerging Science and Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"article-title":"The lifecycle process model for cloud governance","year":"2011","author":"he","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735234"},{"key":"ref17","article-title":"The True Meaning of Cloud Agility","author":"cohen","year":"2014","journal-title":"Cloud Strategies Reinventing Business"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522980"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3917\/sim.134.0007","article-title":"L'envol vers le Cloud: un ph&#x00E9;nom&#x00E8;ne de maturations multiples","volume":"18","author":"tiers","year":"0","journal-title":"Syst&#x00E8;mes d'Information Management"},{"key":"ref28","article-title":"Is security realistic in cloud computing?","volume":"22","author":"srinivasan","year":"2013","journal-title":"J Information Technology and Management"},{"journal-title":"Gartner Newsroom","article-title":"Gartner Executive Programs Worldwide Survey of More Than 2,000 CIOs Identifies Cloud Computing as Top Technology Priority for CIOs in 2011","year":"2011","key":"ref4"},{"article-title":"Cloud Computing in Research and Education","year":"2013","author":"bojanova","key":"ref27"},{"year":"2015","key":"ref3","article-title":"Cloud Computing survey 2015"},{"article-title":"Cisco Global Cloud Index: Forecast and Methodology, 2014-2019, (White Paper)","year":"2015","author":"networking","key":"ref6"},{"key":"ref29","first-page":"13","article-title":"Assessing the relationships among cloud adoption, strategic alignment and IT effectiveness","volume":"22","author":"chebrolu","year":"0","journal-title":"Information Technology and Management"},{"key":"ref5","article-title":"The cloud over Africa","author":"gillwald","year":"2014","journal-title":"Research ICT Africa"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645649"},{"key":"ref7","first-page":"150","article-title":"Challenges of cloud computing in business: Towards new organizational competencies","volume":"5","author":"oredo","year":"0","journal-title":"International Journal of Business and Social Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7763\/IJIEE.2012.V2.80"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref46","first-page":"9","article-title":"Core IS Capabilities for Exploiting Information Technology","volume":"39","author":"feeny","year":"1998","journal-title":"Sloan Management Review"},{"key":"ref20","first-page":"19","article-title":"Cloud computing: A practical framework for managing cloud computing risk-part II","volume":"25","author":"kalyvas","year":"2013","journal-title":"Intellectual Property & Technology Law Journal"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2014.05.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330685"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsa.2014.4112"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.68"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.20"},{"key":"ref41","article-title":"Defining IT governance-A consolidation of literature","author":"simonson","year":"2006","journal-title":"Proc 18th International Conference on Advanced Information Systems Engineering"},{"year":"2015","key":"ref23","article-title":"2015 Cyberthreat Defense Report North America & Europe"},{"key":"ref44","first-page":"1","article-title":"A governance model for cloud computing","author":"guo","year":"2010","journal-title":"Management and Service Science (MASS)"},{"article-title":"Organizational challenges in cloud adoption and enablers of cloud transition program","year":"2013","author":"rajendran","key":"ref26"},{"key":"ref43","article-title":"Cloud Computing Trends: 2016 State of the Cloud Survey","author":"weins","year":"2016","journal-title":"Right scale"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2012.04.011"}],"event":{"name":"2016 IEEE 18th Conference on Business Informatics (CBI)","start":{"date-parts":[[2016,8,29]]},"location":"Paris, France","end":{"date-parts":[[2016,9,1]]}},"container-title":["2016 IEEE 18th Conference on Business Informatics (CBI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7776665\/7780284\/07780321.pdf?arnumber=7780321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:47:08Z","timestamp":1498355228000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7780321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/cbi.2016.36","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}