1,421
Views
15
CrossRef citations to date
0
Altmetric
Articles

Expected benefits and perceived risks of cloud computing: an investigation within an Italian setting

, &
Pages 167-180 | Received 30 Jul 2015, Accepted 01 Jul 2016, Published online: 02 Aug 2016

References

  • Almulla, S. A., and C. Y. Yeun. 2010. “Cloud Computing Security Management.” Proceeding of Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference, 1–7.
  • Al-Tamimi, H. A. H., and F. M. Al-Mazrooei. 2007. “Banks’ Risk Management: A Comparison Study of UAE National and Foreign Banks.” The Journal of Risk Finance 8 (4): 394–409. doi: 10.1108/15265940710777333
  • Ariffin, N. M., S. Archer, and R. A. A. Karim. 2009. “Risks in Islamic Banks: Evidence from Empirical Research.” Journal of Banking Regulation 10 (2): 153–163. doi: 10.1057/jbr.2008.27
  • Armbrust, M., A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, et al. 2010. “A View of Cloud Computing.” Communications of the ACM 53 (4): 50–58. doi: 10.1145/1721654.1721672
  • Bank of Italy. 2009. “ Relazione annuale al Governo.” www.bancaditalia.it.
  • Bank of Italy. 2013. “ Relazione annuale al Governo.” www.bancaditalia.it.
  • Benbasat, I., and H. Barki. 2007. “Quo vadis, TAM?” Journal of the Association of Information Systems 8 (4): 211–218.
  • Brender, N., and I. Markov. 2013. “Risk Perception and Risk Management in Cloud Computing: Results from a Case Study of Swiss Companies.” International Journal of Information Management 33 (5): 726–733. doi: 10.1016/j.ijinfomgt.2013.05.004
  • Broberg, J., S. Venugopal, and R. Buyya. 2008. “Market-Oriented Grids and Utility Computing: The State-of-the-Art and Future Directions.” Journal of Grid Computing 6 (3): 255–276. doi: 10.1007/s10723-007-9095-3
  • Buyya, R., C. S. Yeo, and S. Venugopal. 2008. “Marked Oriented Cloud Computing: Vision, Hype, and Realty for Delivering IT Services as Cloud Computing Utilities.” The 10th IEEE International Conference on High Performance Computing and Communications 10 (1): 5–13.
  • Buyya, R., C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. 2009. “Cloud Computing and Emerging IT Platforms: Vision, Hype and Reality for Delivering Computing as the 5th Utility.” Future Generation Computer Systems 25 (6): 599–616. doi: 10.1016/j.future.2008.12.001
  • Carroll, M., A. Merwe, and P. Kotze. 2011. “Secure Cloud Computing: Benefits, Risks and Controls.” IEEE Information Security in South Africa 1 (1): 1–9.
  • Chen, Y., V. Paxson, and R. H. Kats. 2010. “What’s New About Cloud Computing Security?” Berkley Technical Report, No. UCB/EECS-2010-5, 1: 1–8.
  • Chuttur, M. Y. 2009. “Overview of the Technology Acceptance Model: Origins, Developments and Future Directions.” Working Papers on Information Systems, Indiana University.
  • Committee of Sponsoring Organisations of the Treadway Commission (COSO). 2012. “Enterprise Risk Management for Cloud Computing”. http://www.coso.org
  • Dahbur, K., and A. B. Tarakji. 2011. “ A Survey of the Risks, Threats and Vulnerabilities in Cloud Computing.” Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, Amman, Jordan.
  • Dalcher, I., and J. Shine. 2003. “Extending the New Technology Acceptance Model to Measure the End User Information Systems Satisfaction in a Mandatory Environment: A Bank’s Treasury.” Technology Analysis & Strategic Management 15 (4): 441–455. doi: 10.1080/095373203000136033
  • DaSilva, C. M., P. Trkman, K. Desouza, and J. Lindic. 2013. “Disruptive Technologies: A Business Model Perspective on Cloud Computing.” Technology Analysis & Strategic Management 25 (10): 1161–1173. doi: 10.1080/09537325.2013.843661
  • Davis, F. D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.” MIS Quarterly 13 (3): 319–339. doi: 10.2307/249008
  • Demirag, I. S. 1996. “The Impact of Managers’ Short-term Perceptions on Technology Management and R&D in UK Companies.” Technology Analysis & Strategic Management 8 (1): 21–32. doi: 10.1080/09537329608524230
  • ENISA. 2009. Cloud Computing: Benefits, Risks and Recommendations for Information Security. https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/.
  • Fan, C. K., and T. C. Chen. 2012. “The Risk Management Strategy of Applying Cloud Computing.” International Journal of Advanced Computer Science And Applications 9 (3): 18–27.
  • IBM. 2011. “IBM ed il cloud computing nuove opportunità per i business partner.” https://www-03.ibm.com/press/it/it/pressrelease/35684.wss
  • Ibrahim, S., B. He, and H. Jin. 2011. “Towards Pay-As-You-Consume Cloud Computing.” IEEE International Conference on Services Computing 1: 519–528.
  • ISTAT. 2011. Annual Report 2011. http://www3.istat.it/dati/catalogo/20110523_00/rapporto_2011.pdf
  • Kaiserswerth, M., O. Brian, and T. Brunschwiler. 2012. “Cloud Computing.” SATW White Paper in Cloud Computing 1 (1): 1–55.
  • Khajeh-Hosseini, A., D. Greenwood, J. W. Smith, and I. Sommerville. 2010. “The Cloud Adoption Toolkit: Supporting Cloud Adoption Decision in the Enterprise.” Software: Practice and Experience 42 (4): 447–465.
  • Lawler, J., A. Joseph, and H. Howell-Barber. 2012. “A Case Study of Determinants of an Effective Cloud Computing Strategy.” Review of Information Systems 16 (3): 145–156.
  • Lee, L. S., and R. D. Mautz, Jr. 2012. “Using Cloud Computing to Manage the Costs.” The Journal of Corporate Accounting And Finance 23 (2): 11–15. doi: 10.1002/jcaf.21748
  • Mangiuc, D. M. 2012. “Delivering Security in the Cloud.” Proceedings of the 7th International Conference Accounting and Management Information Systems AMIS 2012 7 (1): 1005–1013.
  • Marston, S., Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi. 2011. “Cloud Computing – The Business Perspective.” Decision Support Systems 51 (1): 176–189. doi: 10.1016/j.dss.2010.12.006
  • Mell, P., and T. Grance. 2011. The NIST Definition of Cloud Computing – Recommendations of the National Institute of Standards and Technology. Gaithersburg: NIST.
  • Microsoft. 2011. “Securing Microsoft’s Cloud Infrastructure.” https://cloudsecurityalliance.org/securing-the-MS-Cloud.pdf.
  • Pavlou, P. A. 2003. “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model.” International Journal of Electronic Commerce 7 (3): 101–134.
  • Polley, D., and A. H. Van de Ven. 1996. “Learning by Discovery During Innovation Development.” International Journal of Technology Management 11 (7/8): 871–882.
  • Renn, O., and C. Benighaus. 2013. “Perception of Technological Risk: Insights from Research and Lessons for Risk Communication and Management.” Journal of Risk Research 16 (3–4): 293–313. doi: 10.1080/13669877.2012.729522
  • Rohrmann, B. 1995. “Technological Risks – Perception, Evaluation, Communication.” In Integrated Risk Assessment New Directions, edited by R. E. Melchers and M. G. Stewart, 7–12. Rotterdam: Balkema.
  • Rosenthal, A., P. Mork, M. Li, J. Stanford, D. Koester, and P. Reynolds. 2010. “Cloud Computing: A New Business Paradigm for Biomedical Information Sharing.” Journal of Biomedical Informatics 43 (2): 342–353. doi: 10.1016/j.jbi.2009.08.014
  • Ross, P. K., and M. Blumenstein. 2015. “Cloud Computing as a Facilitator of SME Entrepreneurship.” Technology Analysis & Strategic Management 27 (1): 87–101. doi: 10.1080/09537325.2014.951621
  • Slovic, P. 1987. “Perception of Risk.” Science 236 (4799): 280–285. doi: 10.1126/science.3563507
  • Slovic, P. 2000. The Perception of Risk. London: Earthscan.
  • Sultan, N. 2011. “Reaching for the Cloud, How SMEs Can Manage.” International Journal of Information Management 31 (3): 272–278. doi: 10.1016/j.ijinfomgt.2010.08.001
  • Sultan, N., and S. Van de Bunt-Kokhuis. 2012. “Organizational Culture and Cloud Computing: Coping with a Disruptive Innovation.” Technology Analysis & Strategic Management 24 (2): 167–179. doi: 10.1080/09537325.2012.647644
  • Tanimoto, S., M. Hiramoto, M. Iwashita, H. Sato, and A. Kanai. 2011. “Risk Management on the Security Problem in Cloud Computing.” Procedings of IEEE International Conference 1: 147–152.
  • Tiwari, P. K., and B. Mishra. 2012. “Cloud Computing Security Issues, Challenges and Solution.” International Journal of Emerging Technology And Advanced Engeneering 2 (8): 306–310.
  • Ullah, K., and M. N. A. Khan. 2014. “Security and Privacy Issues in Cloud Computing Environment: A Survey Paper.” International Journal of Grid and Distributed Computing 7 (2): 89–98. doi: 10.14257/ijgdc.2014.7.2.09
  • Vouk, Mladen A. 2008. “Cloud Computing – Issues, Research and Implementations.” Journal of Computing and Information Technology 16 (1): 235–246. doi: 10.2498/cit.1001391

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.