{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:15:19Z","timestamp":1760984119142},"reference-count":72,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7,1]]},"abstract":"<p>An issue facing the manager of a small business is the use of cloud computing to meet the information technology (IT) needs of the firm. These businesses typically have limited in-house IT capabilities and often outsource much of their IT. This paper discusses this rapidly evolving technology and provides a framework for businesses to decide on harnessing the power of cloud computing. It recommends the appropriate decision based on the way in which IT is currently used in the enterprise and future needs to meet competitive challenges. The potential cost savings, technology insurance from cloud computing, and security risks are discussed and factored into the decision.<\/p>","DOI":"10.4018\/irmj.2011070102","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T15:59:17Z","timestamp":1319039957000},"page":"9-25","source":"Crossref","is-referenced-by-count":23,"title":["A Decision Table for the Cloud Computing Decision in Small Business"],"prefix":"10.4018","volume":"24","author":[{"given":"Sathiadev","family":"Mahesh","sequence":"first","affiliation":[{"name":"University of New Orleans, USA"}]},{"given":"Brett J. L.","family":"Landry","sequence":"additional","affiliation":[{"name":"University of Dallas, USA"}]},{"given":"T.","family":"Sridhar","sequence":"additional","affiliation":[{"name":"LeitNet, USA"}]},{"given":"Kenneth R.","family":"Walsh","sequence":"additional","affiliation":[{"name":"University of New Orleans, USA"}]}],"member":"2432","reference":[{"key":"irmj.2011070102-0","doi-asserted-by":"publisher","DOI":"10.1177\/0266242609344244"},{"key":"irmj.2011070102-1","unstructured":"Akamai. (2009). Contest Data processing from the Edge. Retrieved April 12, 2010, from http:\/\/www.akamai.com\/dl\/brochures\/contest_brochure.pdf"},{"key":"irmj.2011070102-2","unstructured":"Albert, G. (2009). Enhancing Dynamic Cloud-based Services using Network Virtualization. In Proceedings of the 1st ACM Workshop on Virtualized Infrastructure and Systems and Architectures, Barcelona, Spain (pp. 37-44). New York, NY: ACM."},{"key":"irmj.2011070102-3","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646389"},{"key":"irmj.2011070102-4","doi-asserted-by":"crossref","unstructured":"Ardagna, D., Mirandola, R., Trubian, M., & Zhang, L. (2009). Run-time resource management in SOA virtualized environments. In Proceedings of the 1st International Workshop on Quality of Service-Oriented Software Systems, Amsterdam, The Netherlands.","DOI":"10.1145\/1596473.1596484"},{"key":"irmj.2011070102-5","unstructured":"Arrington, M. (2009). In Our Inbox: Hundreds of Confidential Twitter Documents. Retrieved April 12, 2010, from http:\/\/techcrunch.com\/2009\/07\/14\/in-our-inbox-hundreds-of-confidential-twitter-documents\/"},{"key":"irmj.2011070102-6","doi-asserted-by":"crossref","unstructured":"Assuncao, D. D., Costanzo, A., & Buyya, R. (2009). Evaluating the Cost-Benefit of Using Cloud Computing to Extend the Capacity of Clouds. In Proceedings of the HPDC'09 Conference, Munich, Germany (pp. 141-150).","DOI":"10.1145\/1551609.1551635"},{"key":"irmj.2011070102-7","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2010102601"},{"key":"irmj.2011070102-8","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2008040105"},{"key":"irmj.2011070102-9","unstructured":"Bias, R. (2009). Cloudcenters are Datacenters in the Sky. Retrieved April 12, 2010, from http:\/\/blog.gogrid.com\/2009\/01\/08\/cloudcenters-are-datacenters-in-the-sky\/"},{"key":"irmj.2011070102-10","unstructured":"Brodkin, J. (2009). Cloud computing outages: Amazon customers the latest to suffer downtime. Retrieved from http:\/\/www.networkworld.com\/community\/node\/48961"},{"key":"irmj.2011070102-11","doi-asserted-by":"publisher","DOI":"10.1145\/1556154.1556173"},{"key":"irmj.2011070102-12","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506419"},{"key":"irmj.2011070102-13","author":"N.Carr","year":"2008","journal-title":"The Big Switch"},{"key":"irmj.2011070102-14","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(95)00016-P"},{"key":"irmj.2011070102-15","unstructured":"Cheng, R. (2010, February 8). 'Cloud Computing': What Exactly is it, Anyway? Retrieved May 5, 2010, from http:\/\/online.wsj.com\/article\/SB10001424052748703580904574638391318085158.html"},{"key":"irmj.2011070102-16","unstructured":"Chun, B., & Maniatis, P. (2009). Augmented Smartphone Applications Through Clone Cloud Execution. In Proceedings of the HotOS 2009 Conference, Monte Verita, Switzerland."},{"key":"irmj.2011070102-17","unstructured":"Cloud Security Alliance. (2009). Security Guidance for Critical Areas of Focus in Cloud Computing. Retrieved April 12, 2010, from http:\/\/www.cloudsecurityalliance.org\/csaguide.pdf"},{"key":"irmj.2011070102-18","doi-asserted-by":"crossref","unstructured":"Costa, P., Zahn, T., Rowston, A., O'Shea, G., & Schubert, S. (2009). Why should we integrate services, servers, and networking in a data center? In Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, Barcelona, Spain (pp. 111-118).","DOI":"10.1145\/1592681.1592699"},{"issue":"1","key":"irmj.2011070102-19","first-page":"22","article-title":"A Walk in the Cloud.","volume":"43","author":"P.Cunningham","year":"2009","journal-title":"Information Management Journal"},{"key":"irmj.2011070102-20","doi-asserted-by":"crossref","unstructured":"Deelman, E., Singh, G., Livny, M., Berriman, B., & Good, J. (2008). The cost of doing science on the Cloud: The Montage Example. In Proceedings of the ACM\/IEEE Conference on Supercomputing, Piscatawy, NJ (pp. 1-12).","DOI":"10.1109\/SC.2008.5217932"},{"key":"irmj.2011070102-21","doi-asserted-by":"crossref","unstructured":"Delic, K., & Walker, M. (2008). Emergence of the Academic Computing Clouds. ACM Ubiquity, 9(31).","DOI":"10.1145\/1459229.1414664"},{"key":"irmj.2011070102-22","unstructured":"DMTF. (2009). Open Virtualization Format Specification. Retrieved April 13, 2010, from http:\/\/www.dmtf.org\/standards\/published_documents\/DSP0243_1.0.0.pdf"},{"key":"irmj.2011070102-23","doi-asserted-by":"crossref","unstructured":"Edwards, A., Fischer, A., & Lain, A. (2009). Diverter: a new approach to networking within virtualized infrastructures. In Proceedings of the ACM Workshop on Research on Enterprise Networking, Barcelona, Spain (pp. 103-110).","DOI":"10.1145\/1592681.1592698"},{"key":"irmj.2011070102-24","unstructured":"FCC. (2009). FCC Public Notice. Retrieved April 14, 2010, http:\/\/hraunfoss.fcc.gov\/edocs_public\/attachmatch\/DA-09-2433A1.pdf"},{"key":"irmj.2011070102-25","unstructured":"Festa, P. (1999, June 30). Destop.com joining Web-based applications market. Cnet News. Retrieved from http:\/\/news.cnet.com\/Desktop.com-joining-Web-based-applications-market\/2100-1023_3-227919.html"},{"key":"irmj.2011070102-26","unstructured":"France, C. (2010). Business Information Modeling and the Cloud. Retrieved April 14, 2010, from http:\/\/www.aecbytes.com\/feature\/2010\/BIM_Cloud.html"},{"key":"irmj.2011070102-27","unstructured":"Garfinkel, S. (2007). An evaluation for Amazon's Grid Computing Services: EC2,S3,SQS. Retrieved April 14, 2010, from http:\/\/simson.net\/clips\/academic\/2007.harvard.s3.pdf"},{"key":"irmj.2011070102-28","first-page":"32","article-title":"Clouds on the Information Horizon: How to Avoid the Storm.","author":"B.Gatewood","year":"2009","journal-title":"Information & Management"},{"key":"irmj.2011070102-29","unstructured":"Gohring, N. (2010, September 28). Cloud Services Empower Startups. New York Times. Retrieved September 28, 2010, from http:\/\/www.nytimes.com"},{"key":"irmj.2011070102-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.07.002"},{"key":"irmj.2011070102-31","unstructured":"Google. (2009). Google apps and government. Retrieved April 14, 2010, from http:\/\/googleenterprise.blogspot.com\/2009\/09\/google-apps-and-government.html"},{"key":"irmj.2011070102-32","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592576"},{"key":"irmj.2011070102-33","doi-asserted-by":"publisher","DOI":"10.1038\/449963a"},{"key":"irmj.2011070102-34","doi-asserted-by":"crossref","unstructured":"Hill, Z., & Humphrey, M. (2009). Applicability of the Willow Architecture for Cloud Management. In Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds (ACDC'09), Barcelona, Spain (pp. 31-36).","DOI":"10.1145\/1555271.1555279"},{"key":"irmj.2011070102-35","unstructured":"Hoover, J. (2008). Outages force Cloud Computing Users to Rethink Tactics. Retrieved from http:\/\/www.informationweek.com\/news\/services\/saas\/showArticle.jhtml?articleID=210004236"},{"issue":"3","key":"irmj.2011070102-36","first-page":"88","article-title":"Information Technology (IT) Appropriateness: The Contingency Theory of \u201cFIT\u201d and IT implementation in Small and Medium Enterprises.","volume":"45","author":"D.Khazanchi","year":"2005","journal-title":"Journal of CIS"},{"key":"irmj.2011070102-37","doi-asserted-by":"crossref","unstructured":"Konstantinou, A., Eilam, T., Kalantar, M., Totok, A., Arnold, W., & Snible, E. (2009). An architecture for virtual solution composition and deployment in infrastructure clouds. In Proceedings of the 3rd International Workshop on Virtualization Technologies in Distributed Computing (VTDC'09), Barcelona, Spain (pp. 9-18).","DOI":"10.1145\/1555336.1555339"},{"key":"irmj.2011070102-38","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2005100101"},{"key":"irmj.2011070102-39","doi-asserted-by":"crossref","unstructured":"Lim, H., Babu, S., Chase, J., & Parekh, S. (2008). Automated Control in Cloud Computing: Challenges and Opportunities. In Proceedings of the 1st Workshop on Automated Control Datacenters and Clouds (ACSC'09), Barcelona, Spain (pp. 13-18).","DOI":"10.1145\/1555271.1555275"},{"issue":"3","key":"irmj.2011070102-40","first-page":"75","article-title":"Determinants of Information Technology Success in Small Business.","volume":"35","author":"S.Magal","year":"1995","journal-title":"Journal of CIS"},{"issue":"3","key":"irmj.2011070102-41","first-page":"42","article-title":"Service Outsourcing: Information Technology.","volume":"5","author":"M.Maleki","year":"2008","journal-title":"SCMS Journal of Indian Management"},{"key":"irmj.2011070102-42","doi-asserted-by":"crossref","unstructured":"Matthews, J., Garfinkel, T., Hoff, C., & Wheeler, J. (2009). Virtual machine Contracts for Datacenter and Cloud Computing Environments. In Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds (ACDC'09), Barcelona, Spain (pp. 23-30).","DOI":"10.1145\/1555271.1555278"},{"issue":"3","key":"irmj.2011070102-43","first-page":"98","article-title":"Information Technology Changes the Way You Compete.","volume":"62","author":"F.McFarlan","year":"1984","journal-title":"Harvard Business Review"},{"key":"irmj.2011070102-44","doi-asserted-by":"crossref","unstructured":"Mell, P., & Grance, T. (2009). The NIST Definition of Cloud Computing. Retrieved April 12, 2010, from http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/cloud-def-v15.doc","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"4","key":"irmj.2011070102-45","first-page":"96","article-title":"The Cloud, The Crowd, and Public Policy.","volume":"25","author":"M.Nelson","year":"2009","journal-title":"Issues in Science and Technology"},{"issue":"10","key":"irmj.2011070102-46","first-page":"96","article-title":"Information Technology and the Board of Directors.","volume":"83","author":"R.Nolan","year":"2005","journal-title":"Harvard Business Review"},{"key":"irmj.2011070102-47","unstructured":"Nolle, T. (2009). Identifying Applications for Public and Private Clouds. Retrieved April 14, 2010, from http:\/\/searchcloudcomputing.techtarget.com\/tip\/0,289483,sid201_gci1358701,00.html?track=NL-1329&ad=710605&asrc=EM_NLT_7835341&uid=8788654"},{"key":"irmj.2011070102-48","unstructured":"North, K. (2009). The Many Flavors of Platform Services for Cloud Computing. Retrieved April 14, 2010, from http:\/\/www.drdobbs.com\/windows\/220300737"},{"key":"irmj.2011070102-49","unstructured":"Open Cloud. (2010). Open Cloud Manifesto. Retrieved April 12, 2010, from http:\/\/opencloudmanifesto.org\/Cloud_Computing_Use_Cases_Whitepaper-3_0.pdf"},{"key":"irmj.2011070102-50","doi-asserted-by":"crossref","unstructured":"Palankar, M., Iamnitchi, A., Ripeanu, M., & Garfinkel, S. (2008). Amazon S3 for science Grids: A viable soulution? In Proceedings of the International Workshop on Data-aware Distributed Computing (DADC'08), New York, NY (pp. 55-64).","DOI":"10.1145\/1383519.1383526"},{"key":"irmj.2011070102-51","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(96)01069-5"},{"key":"irmj.2011070102-52","doi-asserted-by":"crossref","unstructured":"Pearson, S. (2009). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, BC (pp. 44-52).","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"irmj.2011070102-53","doi-asserted-by":"publisher","DOI":"10.1177\/0266242609102276"},{"key":"irmj.2011070102-54","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1302_2"},{"issue":"2","key":"irmj.2011070102-55","first-page":"33","article-title":"What makes the competitive contribution of ERP strategic.","volume":"39","author":"A.Ragowsky","year":"2008","journal-title":"Database"},{"key":"irmj.2011070102-56","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00064"},{"key":"irmj.2011070102-57","doi-asserted-by":"crossref","unstructured":"Rellermeyer, J., Duller, M., & Alonso, G. (2009). Engineering the cloud from software modules. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, BC.","DOI":"10.1109\/CLOUD.2009.5071530"},{"key":"irmj.2011070102-58","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00052-X"},{"key":"irmj.2011070102-59","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Exploring Information Leakage in Third Party Clouds. In Proceedings of the CCS '09 Conference, Chicago, IL."},{"key":"irmj.2011070102-60","doi-asserted-by":"publisher","DOI":"10.1145\/1734160.1734169"},{"key":"irmj.2011070102-61","unstructured":"Schwartz, E. (2007). Salesforce.com launches SaaS platform. Retrieved from http:\/\/www.infoworld.com\/t\/architecture\/salesforcecom-launches-saas-platform-724"},{"issue":"7","key":"irmj.2011070102-62","first-page":"10","article-title":"The dangers of cloud computing.","volume":"4","author":"E.Schwartz","year":"2008","journal-title":"Network World Asia"},{"key":"irmj.2011070102-63","doi-asserted-by":"publisher","DOI":"10.1177\/0266242608088743"},{"key":"irmj.2011070102-64","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.019"},{"key":"irmj.2011070102-65","doi-asserted-by":"publisher","DOI":"10.1023\/B:MONE.0000031603.28679.6f"},{"key":"irmj.2011070102-66","unstructured":"Sridhar, T. (2009). Cloud Computing-A Primer. The Internet Protocol Journal, 12(3)."},{"issue":"4","key":"irmj.2011070102-67","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1080\/07421222.1999.11518227","article-title":"An integrated model of information systems adoption in small businesses.","volume":"15","author":"J.Thong","year":"1999","journal-title":"Journal of Management Information Systems"},{"key":"irmj.2011070102-68","author":"M.Williams","year":"2009","journal-title":"Microsoft loses Sidekick user's personal data"},{"key":"irmj.2011070102-69","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(92)90005-R"},{"key":"irmj.2011070102-70","doi-asserted-by":"crossref","unstructured":"Youseff, L., Butrico, M., & DaSilva, D. (2008). Toward a unified ontology of cloud computing. Paper presented at the Grid Computing Environments Workshop (GCE2008).","DOI":"10.1109\/GCE.2008.4738443"},{"key":"irmj.2011070102-71","unstructured":"Yuefa, D., Bo, W., Yaquiang, G., Quan, Z., & Chaojing, T. (2009). Data Security Model for Cloud Computing. In Proceedings of the IWISA 2009 Conference, Qingdao, China (pp. 141-145)."}],"container-title":["Information Resources Management Journal"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=55065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T15:53:20Z","timestamp":1686412400000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/irmj.2011070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,7,1]]},"references-count":72,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7]]}},"URL":"https:\/\/doi.org\/10.4018\/irmj.2011070102","relation":{},"ISSN":["1040-1628","1533-7979"],"issn-type":[{"value":"1040-1628","type":"print"},{"value":"1533-7979","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,1]]}}}