{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:10:26Z","timestamp":1729645826018,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/sysose.2013.6575261","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T16:18:30Z","timestamp":1376497110000},"page":"165-170","source":"Crossref","is-referenced-by-count":7,"title":["An exploratory analysis of the influence of information security on the adoption of cloud computing"],"prefix":"10.1109","author":[{"given":"Omondi John","family":"Opala","sequence":"first","affiliation":[]},{"given":"Syed M.","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"35","first-page":"43","article-title":"Why cloud computing matters to finance","volume":"92","author":"gill","year":"2011","journal-title":"Strategic Finance"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.74"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193146"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6524-0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1080\/00273170902794206"},{"key":"34","first-page":"69","article-title":"State of the art and research challenges of new services architecture technologies: Virtualization, SOA and cloud computing","volume":"3","author":"letaifa","year":"2010","journal-title":"International Journal of Grid & Distributed Computing"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1006\/imms.1993.1022"},{"journal-title":"Research in Organizations Foundations and Methods of Inquiry","year":"2005","author":"swanson","key":"13"},{"journal-title":"Quantitative Research Methods for Professionals","year":"2010","author":"vogt","key":"14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4404"},{"key":"11","first-page":"1","article-title":"Diffusing the cloud: Cloud computing and implications for public policy","volume":"5","author":"kushida","year":"2010","journal-title":"J Ind Competit Trade"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1108\/17410391011088583"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.30"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-005-5372-3"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"journal-title":"Diffusion of Innovation (Fifth Ed )","year":"2003","author":"rogers","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1108\/13552550910944566"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1108\/17410391011019732"},{"key":"26","first-page":"1","article-title":"Identity and privacy services","volume":"3","author":"katzan","year":"2010","journal-title":"Journal of Service Science"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/45099.22.2.20050301\/87273.2"},{"key":"28","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1108\/09685220810879627","article-title":"Ontologies for information security management and governance","volume":"16","author":"edson","year":"2008","journal-title":"Information Management & Computer Security"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.008"},{"key":"3","article-title":"SME adoption of wireless LAN technology: Applying the UTAUT model","author":"anderson","year":"0","journal-title":"7th Annual Conference of the Soutehrn Association for Information Systems February 2004"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1145\/1721654.1721672","article-title":"A View of Cloud Computing","volume":"53","author":"armbrust","year":"2010","journal-title":"Communications of ACM"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.117"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.008"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1108\/17506161011081291"},{"key":"7","first-page":"1","article-title":"Guidelines on security and privacy in public cloud computing","volume":"800","author":"jansen","year":"2011","journal-title":"NIST"},{"key":"6","first-page":"1","article-title":"Identity and privacy services","volume":"3","author":"katzan","year":"2010","journal-title":"Journal of Service Science"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1080\/10658980601051482"},{"key":"5","first-page":"70","article-title":"Cloud control","volume":"23","author":"davidson","year":"2010","journal-title":"Risk"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.3102\/0034654308325896"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"9","first-page":"1","article-title":"Using COBIT to manage the benefits, risks and security of outsourcing cloud computing","volume":"2011","author":"ahmed","year":"2011","journal-title":"COBIT Focus"},{"key":"8","first-page":"66","article-title":"Cloud computing, accounting, auditing, and beyond certified public accountant","volume":"8","author":"du","year":"2010","journal-title":"The CPA Journal"}],"event":{"name":"2013 8th International Conference on System of Systems Engineering (SoSE)","start":{"date-parts":[[2013,6,2]]},"location":"Maui, HI, USA","end":{"date-parts":[[2013,6,6]]}},"container-title":["2013 8th International Conference on System of Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571724\/6575224\/06575261.pdf?arnumber=6575261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T17:50:14Z","timestamp":1498067414000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6575261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/sysose.2013.6575261","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}