Читать книгу Digital Transformation: Evaluating Emerging Technologies - Группа авторов - Страница 79
References
Оглавление1.H. A. Alanazi, T. U. Daim and D. F. Kocaoglu, “Identify the best alternatives to help the diffusion of teleconsultation by using the Hierarchical Decision Model (HDM)”, in Portland International Conference on Management of Engineering and Technology (PICMET), 2015.
2.M. Adnan. “Title of dissertation”, University of Minnesota, December 2011.
3.M. M. Lingga, “Developing a Hierarchical Decision Model to evaluate nuclear power plant alternative siting technologies”, PhD dissertation, Portland State University, 2016.
4.D. I. Cleland and D. F. Kocaoglu, “Hierarchical Decision Model”, Engineering Management (New York: McGraw-Hill, 1981), pp. 449–463.
5.N. J. Sheikh, K. Kim and D. F. Kocaoglu, “Use of hierarchical decision modeling to select target markets for a new personal healthcare device”, Health Policy and Technology, 5, 2 (2016) 99–112.
6.M. Abbas, “Analysis of decision inconsistencies in judgment quantification”, in Proceedings of Technology Management in the IT-Driven Services (PICMET), 2013.
7.A. A. Huczynski and D. A. Buchanan, Organisational Behaviour, 6th edition (England: Prentice Hall, 2007).
8.Y. Shin, “Conflict resolution in virtual teams”, Organisational Dynamics, 34, 4 (2005) 331–345.
9.D. L. Duart and N. T. Snyder, Mastering Virtual Teams: Strategies, Tools and Techniques That Succeed, 2nd edition (San Francisco: Jossey-Bass, 2001).
10.A. Sheth and A. Ranabahu, “Semantic modeling for cloud computing, part I & II”, IEEE Internet Computing Magazine, 14 (2010) 81–83.
11.J. McKendrick, “Does platform as a service have interoperability issues?” Zdnet.com, 2010. http://www.zdnet.com/blog/service-oriented/doesplatform-as-a-service-have-interoperability-issues/4890.
12.The Economist, “Battle of the clouds”, The Economist, 2009. https://www.economist.com/leaders/2009/10/15/battle-of-the-clouds.
13.D. Catteddu and G. Hogben, “Cloud computing—benefits, risks and recommendations for information security”, European Network and Information Security Agency, 2009. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment/.
14.N. Loutas, E. Kamateri, F. Bosi and K. Tarabanis, “Cloud computing interoperability: The state of play”, in 3rd IEEE International Conference on Cloud Computing Technology and Science, 2011.
15.Y. Jadega and K. Modi “Cloud computing—concepts, architecture and challenges”, in International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012.
16.P. Mathur and N. Nishchal, “Cloud computing: New challenge to the entire computer industry”, in 1st International Conference on Parallel, Distributed and Grid Computing (PDGC), 2010.
17.B. P. Rimal and E. Choi, “A taxonomy and survey of cloud computing systems”, in 5th International Joint Conference on INC, IMS and IDC, 2009.
18.Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing”, in Proceedings of the 14th European Conference on Research in Computer Security (ESORICS), 2009, pp. 355–370.
19.D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing”, in International Conference on Computer Science and Electronics Engineering, Hangzhou, 2012, pp. 647–651.
20.J. Sen, “Security and privacy issues in cloud computing”, Architectures and Protocols for Secure Information Technology Infrastructures, 2013, pp. 1–45.
21.P. Goyal, “Cloud computing environments and enterprise security”, manuscript, 2010.
22.E. Overby, A. Bharadwaj and V. Sambamurthy, “Enterprise agility and the enabling role of information technology”, European Journal of Information Systems, 15 (2006) 120–131.
23.P. Goyal, “Enterprise usability of cloud computing environment: Issues and challenges”, in Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2010.