References
- 윤미연, 신영상, 지승구, 정현철, 원유재, "안전한 클라우드 서비스 구축을 위한 보안 요구사항 분석 연구", 한국경영정보학회 학술대회, 2012, pp. 453-457.
- 임재수, 오재인, "클라우드 컴퓨팅 서비스의 도입특성이 기업의 인지된 기대성과에 미치는 영향: 기업의 혁신채택성향을 조절변수로", Information Systems Review, 제19권, 제1호, 2017, pp. 75-100. https://doi.org/10.14329/isr.2017.19.1.075
- 임재수, 이준수, 오재인, "클라우드 컴퓨팅 서비스의 특성이 혁신채택성향에 따라 기업의 인지된 기대성과에 미치는 영향에 관한 연구", 한국경영학회 통합학술발표논문집, 2014, pp. 772-793.
- 장필식, 최일영, 최주철, 김재경, "AHP를 이용한 클라우드 컴퓨팅 서비스 과금체계 연구", 한국경영정보학회 학술대회 논문집, 2012, pp. 683-691.
- Al-Anzi, F. S., S. K. Yadav, and J. Soni, "Cloud computing: Security model comprising governance, risk management and compliance", Paper presented at the 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), 5-6 Sept. 2014.
- Asadi, S., M. Nilashi, A. R. C. Husin, and E. Yadegaridehkordi, "Customers perspectives on adoption of cloud computing in banking sector", Information Technology and Management, Vol.18, No.4, 2017, pp. 305-330. https://doi.org/10.1007/s10799-016-0270-8
- Awadallah, N., "Usage of cloud computing in banking system", International Journal of Computer Science Issues, Vol.13, No.1, 2016, pp. 49-52. https://doi.org/10.20943/IJCSI-201602-4952
- Brohi, S. N. and M. A. Bamiah, "Challenges and benefits for adopting the paradigm of cloud computing", International Journal of Advanced Engineering Sciences and Technology, Vol.8, No.2, 2011, pp. 286-290.
- Fichman, R. G., "Going beyond the dominant paradigm for information technology innovation research: Emerging concepts and methods", Journal of the Association for Information Systems, Vol.5, No.8, 2004, p. 11.
- Fox, A., R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, and I. Stoica, "Above the clouds: A berkeley view of cloud computing", Dept. Electrical Eng. and Comput, Sciences, University of California, Berkeley, Rep. UCB/EECS, Vol.28, No.13, 2009.
- Hon, W. K. and C. Millard, "Banking in the cloud: Part 1 - banks' use of cloud services", Computer Law and Security Review, Vol.34, No.1, 2018a, pp. 4-24. https://doi.org/10.1016/j.clsr.2017.11.005
- Hon, W. K. and C. Millard, "Banking in the cloud: Part 2 - regulation of cloud as 'outsourcing'", Computer Law and Security Review, Vol.34, No.2, 2018b, pp. 337-357. https://doi.org/10.1016/j.clsr.2017.11.006
- Hon, W. K. and Millard, C., "Banking in the cloud: Part 3 - contractual issues", Computer Law and Security Review, Vol.34, No.3, 2018c, pp. 595-614. https://doi.org/10.1016/j.clsr.2017.11.007
- Lee, S. and K.-K. Seo, "A hybrid multi-criteria decision-making model for a cloud service selection problem using bsc, fuzzy delphi method and fuzzy AHP", Wireless Personal Communications, Vol.86, No.1, 2015, pp. 57-75. https://doi.org/10.1007/s11277-015-2976-z
- Lewis, G., Basics about cloud computing, Software engineering institute carniege mellon university, Pittsburgh, 2010.
- Li, J., Y. K. Li, X. Chen, P. P. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication", IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.5, 2015, pp. 1206-1216. https://doi.org/10.1109/TPDS.2014.2318320
- Martens, B. and F. J. I. S. F. Teuteberg, "Decision-making in cloud computing environments: A cost and risk based approach", Information Systems Frontiers, Vol.14, No.4, 2012, pp. 871-893. https://doi.org/10.1007/s10796-011-9317-x
- Mazhelis, O. and P. Tyrvainen, "Economic aspects of hybrid cloud infrastructure: User organization perspective", Information Systems Frontiers, Vol.14, No.4, 2011, pp. 845-869. https://doi.org/10.1007/s10796-011-9326-9
- Mell, P. and T. Grance, "Effectively and securely using the cloud computing paradigm", NIST, Information Technology Laboratory, Vol.2, No. 8, 2009, pp. 304-311.
- Mohammed, D., "Security in cloud computing: an analysis of key drivers and constraints", Information Security Journal: A Global Perspective, Vol.20, No.3, 2011, pp. 123-127. https://doi.org/10.1080/19393555.2010.544704
- Ogunde, N. A. and J. Mehnen, "Factors affecting cloud technology adoption: Potential user's perspective", In W. Li and J. Mehnen(Eds.), Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing (pp. 77-98), London: Springer London.
- Oktadini, N. R. and K. Surendro, "SLA in cloud computing: Improving SLA's life cycle applying six sigma", Paper presented at the 2014 International Conference on Information Technology Systems and Innovation(ICITSI), 2014.
- Park, M., S. Chai, N. G. Azyabi, L. Lou, J. Koh, J. Park, and J. Park, "The value of personal information: An exploratory study for types of personal information and its value", Asia Pacific Journal of Information Systems, Vol.28, No.3, 2018, pp. 154-166. https://doi.org/10.14329/apjis.2018.28.3.154
- Peng, J., X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li, "Comparison of several cloud computing platforms", Paper presented at the 2009 Second International Symposium on Information Science and Engineering, 2009.
- Saaty, T. L., "Decision making with the analytic hierarchy process", International Journal of Services Sciences, Vol.1, No.1, 2008, pp. 83-98. https://doi.org/10.1504/IJSSCI.2008.017590
- Staten, J., S. Yates, F. E. Gillett, W. Saleh, and R. A. Dines, "Is cloud computing ready for the enterprise", Forrester Research, 400, 2008.
- Stieninger, M., D. Nedbal, W. Wetzlinger, G. Wagner, and M. A. Erskine, "Impacts on the organizational adoption of cloud computing: A reconceptualization of influencing factors", Procedia Technology, Vol.16, 2014, pp. 85-93. https://doi.org/10.1016/j.protcy.2014.10.071
- Sujay, R., "Hybrid cloud: A new era", International Journal of Computer Science and Technology(IJCST), Vol.2, No.2, 2011, pp. 323-326.
- Swamy, S., Cloud Computing Adoption Journey within Organizations, Berlin, Heidelberg, 2013.
- Vaquero, L. M., L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: Towards a cloud definition", ACM SIGCOMM Computer Communication Review, Vol.39, No.1, 2008, pp. 50-55. https://doi.org/10.1145/1496091.1496100
- Walterbusch, M., B. Martens, and F. Teutebergm "Evaluating cloud computing services from a total cost of ownership perspective", Management Research Review, Vol.36, No.6, 2013, pp. 613-638. https://doi.org/10.1108/01409171311325769
- Wang, H., "Privacy-preserving data sharing in cloud computing", Journal of Computer Science and Technology, Vol.25, No.3, 2010, pp. 401-414. https://doi.org/10.1007/s11390-010-9333-1
- Wei, L., H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing", Information Sciences, Vol.258, 2014, pp. 371-386. https://doi.org/10.1016/j.ins.2013.04.028
- Zissis, D. and D. Lekkas, "Addressing cloud computing security issues", Future Generation Computer Systems, Vol.28, No.3, 2012, pp. 583-592. https://doi.org/10.1016/j.future.2010.12.006