學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 評估產業之雲端準備度
Assessing Cloud Readiness in Enterprises
作者 車育賢
貢獻者 張欣綠
Chang, Hsin Lu
車育賢
關鍵詞 雲端運算
雲端準備度
私有雲
公有雲
Cloud computing
Cloud readiness
Private cloud
Public cloud
日期 2013
上傳時間 10-Feb-2014 14:48:40 (UTC+8)
摘要 近年來雲端運算逐漸盛行且其已被許多企業採用,雲端運算所帶來的好處包含提供更好的連結、企業不同廠的無間隙合作,進而提高生產效率。透過現存論文的研究,我們發現企業導入雲端運算與使其和企業內企業流程成功結合為兩大企業成功的因素。然而,要如何導入與對雲端運算加以控制卻很少在現存論文中談及,更遑論企業在導入雲端前該做哪些準備等議題。本研究也透過文獻的探討提出兩個研究面向(管理面與科技面),文獻探討也發現,此兩面向為企業選擇導入公有雲或是私有雲的主因。再者,本研究提出兩個討論面向的同時,也與現存的雲端服務供應商討論此兩面向,希望能讓兩面向更加符合現存雲端狀況。根據這兩面向的基礎,本研究在此兩大面向下提出許多因素來探討企業導入雲端的準備度。本研究也進一步透過問卷的方式訪問現存有採用或是導入雲端的企業,問卷內容涵蓋上述提到的兩面向,進而透過所收集的資料之分析來探討真正影響雲端導入成功與否的因素是否與研究所提出的假設符合。研究結果發現,虛擬化與IT建設的有無與完善程度對於私有雲的導入成功與否有正向關係。而研究結果也指出,公有雲與私有雲兩種型態的雲端也有相互的關係。
Cloud computing has been dedicated to providing several benefits, such as better connectivity and seemingly seamless cooperation between different plants, that improve firm performance. Previous research maintains that introducing cloud computing and combining it with companies’ processes are two of the prime factors that lead companies to success; however, the manner of implementing this technology and exerting control over it are rarely discussed, especially with regard to the preparation before a company’s official launch of cloud computing. A literature review enables us to propose two dimensions—technological and managerial concerns—of factors driving companies to introduce cloud computing through both private and public clouds. Moreover, after proposing the two dimensions, we examine them by conducting interviews with several companies in the hopes of making these dimensions more applicable and pragmatic in business. Because the purpose of this research is to prepare companies to implement cloud computing, we design a questionnaire based on the dimensions and undertake a survey with several companies that have implemented cloud computing to determine the underlying factors influencing the performance of cloud computing. The results of this research show that both of the virtualization and IT infrastructure readiness factors have positive impacts on private clouds, and the results also indicate a relationship between public and private clouds, which means companies that have adopted public clouds are more likely to succeed in adopting private clouds.
參考文獻 An, B., Lesser, V., Irwin, D., & Zink, M. (2010, May). Automated negotiation with decommitment for dynamic resource allocation in cloud computing. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (pp. 981-988). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1838338

Babcock, C. (2009, April 13). Why ’Private Cloud’ Computing Is Real – And Worth Considering. InformationWeek. Retrieved from http://www.informationweek.com/

Bagozzi, R. P., Yi, Y., & Phillips, L. W. (1991). Assessing construct validity in organizational research. Administrative science quarterly, 421-458.

Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A study of infrastructure as a service (IAAS). International Journal of engineering and information Technology, 2(1), 60-63.

Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud Computing: Understanding and Investigating Platform as a Service (PaaS). International Journal of Engineering, 3(3), 145-452.

Buyya, R., Ranjan, R., & Calheiros, R. (2010, May). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. Paper presented at the International Conference on Algorithms and Architectures, Busan, Korea. Abstract retrieved from http://link.springer.com/chapter/10.1007%2F978-3-642-13119-6_2?LI=true

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.

Chang, V., Wills, G., & De Roure, D. (2010). Cloud business models and sustainability: impacts for businesses and e-research. Software Sustainability Workshop. Retrieved from http://eprints.soton.ac.uk/271054/37/VC_Cloud_Business_Models_accepted_AHM2010.pdf
Charter, R. A. (1999). Sample size requirements for precise estimates of reliability, generalizability, and validity coefficients. Journal of Clinical and Experimental Neuropsychology, 21(4), 559-566.

Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85-90.

Clemons, E. K., & Chen, Y. (2011, January). Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing. Internet Computing, IEEE. Advance online publication. doi: 10.1109/HICSS.2011.292

Dargha, R. (2011). Cloud Computing: Key Considerations for Adoption. Infosys. Retrieved from http://www.infosys.com/cloud/resource-center/documents/cloud-computing.pdf

Das, S., Agarwal, S., Agrawal, D., Abbadi, A. E. (2010). An Elastic, Scalable, and Self Managing Transactional Database for the Cloud (UCSB Computer Science Technical Report). Retrieved from University of California, Department of Computer Science: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.9402

Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud computing: Distributed Internet computing for IT and scientific research. Internet Computing, IEEE, 13(5), 10-13.

Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: Issues and challenges. Internet Computing, IEEE. Advance online publication. doi: 10.1109/AINA.2010.187

Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., & Wolf, D. (2011). Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Computing, 91(1), 23-42.

Emerson Network Power (2010). Taking the Enterprise Data Center into the Cloud [White paper]. Retrieved from http://www.emersonnetworkpower.com/en-US/Brands/Liebert/Documents/White%20Papers/scalable-data-center_24567-R11-10.pdf

Ercan, T. (2010). Effective use of cloud computing in educational institutions. Procedia - Social and Behavioral Sciences, 2(2), 938-942.

Géczy, P., Izumi, N., & Hasida, K. (2012). Cloudsourcing: Managing Cloud Adoption. Global Journal of Business Research, 6(2), 57-70.

Goodburn, M. A., & Hill, S. (2010). The cloud transforms business. Financial Executive, 26(10), 35-39.

Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. Security & Privacy, IEEE, 9(2), 50-57.

Grover, V., & Teng, J. T. (1993). The Decision to Outsource Information-Systems Functions. Journal of Systems Management, 44(11), 34-38.

Gurav, U., & Shaikh, R. (2010, February). Virtualization: a key feature of cloud computing. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1741957

Harris, W. (2011, April). Cloud Computing-Based IT Solutions for Organizations With Multiregional Branch Offices. Paper presented at the 2nd International Conference on Information Managemant and Evaluation: ICIME2011, Toronto, Canada. Abstract retrieved from http://www.academic-conferences.org/pdfs/ICIME11-Booklet.pdf

Hayes, B. (2008). Cloud computing. Communications of the ACM, 52(7), 9-11.

Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing (G00157782). Retrieved from http://www.gartner.com/DisplayDocument?id=685308

Hunter, P. (2009). Cloud aloud. Engineering & Technology, 4(16), 54-56.

IBM Corporation. (2009). Fact sheet: IBM Strategy and Change Services for Cloud Adoption [Fact sheet]. Retrieved from http://www-03.ibm.com/press/us/en/attachment/28557.wss?fileId=ATTACH_FILE5&fileName=Fact%20sheet%20-%20IBM%20Strategy%20and%20Change%20Services%20for%20Cloud%20Adoption.pdf

IBM Corporation. (2010). Defining a framework for cloud adoption [White paper]. Retrieved from ftp://public.dhe.ibm.com/common/ssi/ecm/en/ciw03067usen/CIW03067USEN.PDF

Ibrahim, A. S., Hamlyn-harris, J. H., & Grundy, J. (2010, November). Emerging security challenges of cloud virtual infrastructure. Paper presented at the Asia Pacific Software Engineering Conference 2010 Cloud Workshop, Sydney, Australia. Abstract retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.603

Jiang, J. J., Muhanna, W. A., & Klein, G. (2000). User resistance and strategies for promoting acceptance across system types. Information & Management, 37(1), 25-36.

Kandukuri, B. R., Paturi, V. R., & Rakshit, A. (2009, September). Cloud security issues. Internet Computing, IEEE. Advance online publication. doi: 10.1109/SCC.2009.84

Kim, W., Kim, S. D., Lee, E., & Lee, S. (2009, December). Adoption issues for cloud computing. In Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (pp. 3-6). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1806341

Knorr, E., & Gruman, G. (2008). What cloud computing really means. Infoworld. Retrieved from http://moodle-rsc.ukc.ac.uk/login/index.php

Krautheim, F. J. (2009, June). Private virtual infrastructure for cloud computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing (pp. 5). USENIX Association. Retrieved from https://www.usenix.org/conference/hotcloud-09/private-virtual-infrastructure-cloud-computing

Lai, V. S., & Mahapatra, R. K. (1997). Exploring the research in information technology implementation. Information & Management, 32(4), 187-201.

Leavitt, N. (2009). Is cloud computing really ready for prime time. Internet Computing, IEEE, 42(1), 15-20.

Lenk, A., Klems, M., Nimis, J., Tai, S., & Sandholm, T. (2009, May). What`s inside the Cloud? An architectural map of the Cloud landscape. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 23-31). IEEE Computer Society. Retrieved from http://origin-www.computer.org/csdl/proceedings/icse-cloud/2009/3713/00/05071529.pdf

Li, Z. J., Chen, C., & Wang, K. (2011). Cloud computing for agent-based urban transportation systems. Intelligent Systems, IEEE, 26(1), 73-79.

Loebbecke, C., Thomas, B., & Ullrich, T. (2012). Assessing Cloud Readiness at Continental AG. MIS Quarterly, 11(1), 11-20.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189.

McAfee, A. (2011). What every CEO needs to know about the cloud. Harvard Business Review, 89(11), 124-132.

Mell, P., & Grance, T. (2010). The NIST Definition of Cloud Computing. Communications of the ACM, 53(6), 145.

Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245-253.

Preimesberger, C. (2011). The world from hardware to software and now to cloud-according to DELL. eWEEK. Retrieved From http://www.eweek.com/

Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: a comparison of covariance-and component-based SEM. MIS Quarterly, 33(1), 197-214.


Raman, T. V. (2008). Cloud computing and equal access for all. In Proceedings of the 2008 international cross-disciplinary conference on Web accessibility, pp. 1-4.

Reynolds, E., & Bess, C. (2009). Clearing Up the Cloud: Adoption Strategies for Cloud Computing. Cutter IT Journal, 22(6), 14-20.

Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I. M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., & Galan, F. (2009). The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development, 53(4), 4-1.

Rogers, E. (1983). Diffusion of Innovations. New York, USA: Free Press.

Royston, J. P. (1983). Some techniques for assessing multivarate normality based on the shapiro-wilk W. Applied Statistics, 121-133.

Shapiro, S. S., & Wilk, M. B. (1965). An analysis of variance test for normality (complete samples). Biometrika, 52(3), 591-611.

Simalango, M. F., Kang, M. Y., & Oh, S. (2010). Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization (Doctoral dissertation, Ajou University, South Korea). Retrieved from http://arxiv.org/ftp/arxiv/papers/1010/1010.4952.pdf

Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. Internet Computing, IEEE, 13(5), 14-22.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.

Sultan, N. (2010). Cloud computing for education: A new dawn?. International Journal of Information Management, 30(2), 109-116.

Wang, L., Laszewski, G. V., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New Generation Computing, 28(2), 137-146.

Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16.

VMware (2011) Global Cloud Computing adoption: transformation Is in the air [White paper]. Retrieved from http://www.vmwaregrid.com/vcloud_service_provider/servedbythenet/assets/Cloud_IDG.pdf

Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. European Journal of Information Systems, 12(4), 251-268.
描述 碩士
國立政治大學
資訊管理研究所
100356027
102
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0100356027
資料類型 thesis
dc.contributor.advisor 張欣綠zh_TW
dc.contributor.advisor Chang, Hsin Luen_US
dc.contributor.author (Authors) 車育賢zh_TW
dc.creator (作者) 車育賢zh_TW
dc.date (日期) 2013en_US
dc.date.accessioned 10-Feb-2014 14:48:40 (UTC+8)-
dc.date.available 10-Feb-2014 14:48:40 (UTC+8)-
dc.date.issued (上傳時間) 10-Feb-2014 14:48:40 (UTC+8)-
dc.identifier (Other Identifiers) G0100356027en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/63653-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 100356027zh_TW
dc.description (描述) 102zh_TW
dc.description.abstract (摘要) 近年來雲端運算逐漸盛行且其已被許多企業採用,雲端運算所帶來的好處包含提供更好的連結、企業不同廠的無間隙合作,進而提高生產效率。透過現存論文的研究,我們發現企業導入雲端運算與使其和企業內企業流程成功結合為兩大企業成功的因素。然而,要如何導入與對雲端運算加以控制卻很少在現存論文中談及,更遑論企業在導入雲端前該做哪些準備等議題。本研究也透過文獻的探討提出兩個研究面向(管理面與科技面),文獻探討也發現,此兩面向為企業選擇導入公有雲或是私有雲的主因。再者,本研究提出兩個討論面向的同時,也與現存的雲端服務供應商討論此兩面向,希望能讓兩面向更加符合現存雲端狀況。根據這兩面向的基礎,本研究在此兩大面向下提出許多因素來探討企業導入雲端的準備度。本研究也進一步透過問卷的方式訪問現存有採用或是導入雲端的企業,問卷內容涵蓋上述提到的兩面向,進而透過所收集的資料之分析來探討真正影響雲端導入成功與否的因素是否與研究所提出的假設符合。研究結果發現,虛擬化與IT建設的有無與完善程度對於私有雲的導入成功與否有正向關係。而研究結果也指出,公有雲與私有雲兩種型態的雲端也有相互的關係。zh_TW
dc.description.abstract (摘要) Cloud computing has been dedicated to providing several benefits, such as better connectivity and seemingly seamless cooperation between different plants, that improve firm performance. Previous research maintains that introducing cloud computing and combining it with companies’ processes are two of the prime factors that lead companies to success; however, the manner of implementing this technology and exerting control over it are rarely discussed, especially with regard to the preparation before a company’s official launch of cloud computing. A literature review enables us to propose two dimensions—technological and managerial concerns—of factors driving companies to introduce cloud computing through both private and public clouds. Moreover, after proposing the two dimensions, we examine them by conducting interviews with several companies in the hopes of making these dimensions more applicable and pragmatic in business. Because the purpose of this research is to prepare companies to implement cloud computing, we design a questionnaire based on the dimensions and undertake a survey with several companies that have implemented cloud computing to determine the underlying factors influencing the performance of cloud computing. The results of this research show that both of the virtualization and IT infrastructure readiness factors have positive impacts on private clouds, and the results also indicate a relationship between public and private clouds, which means companies that have adopted public clouds are more likely to succeed in adopting private clouds.en_US
dc.description.tableofcontents Chapter One: Introduction 1
Chapter Two: Literature Review 3
2.1 Cloud computing 3
2.2 Readiness for Cloud Computing 7
Chapter Three: Research Model 12
3.1 Technological Readiness 12
3.2 Managerial Readiness 14
3.3 The adoption Public and Private Clouds 16
Chapter Four: Research Methodology 17
4.1 Pilot Test 17
4.2 Data Collection 18
4.3 Measurements 19
4.4 Instrument Validation 20
Chapter Five: Analysis and Results 26
5.1 Mean Value Analysis 26
5.2 Results 27
5.3 Findings and Discussion 29
Chapter six: Conclusion 37
6.1 Summary 37
6.2 Contributions 37
6.3 Limitations and Future Research 38
References 39
Appendix A. Questionnaire (English Version) 46
Appendix B. Questionnaire (Mandarin Version) 52
Appendix C. Participant List 57
zh_TW
dc.format.extent 1258200 bytes-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0100356027en_US
dc.subject (關鍵詞) 雲端運算zh_TW
dc.subject (關鍵詞) 雲端準備度zh_TW
dc.subject (關鍵詞) 私有雲zh_TW
dc.subject (關鍵詞) 公有雲zh_TW
dc.subject (關鍵詞) Cloud computingen_US
dc.subject (關鍵詞) Cloud readinessen_US
dc.subject (關鍵詞) Private clouden_US
dc.subject (關鍵詞) Public clouden_US
dc.title (題名) 評估產業之雲端準備度zh_TW
dc.title (題名) Assessing Cloud Readiness in Enterprisesen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) An, B., Lesser, V., Irwin, D., & Zink, M. (2010, May). Automated negotiation with decommitment for dynamic resource allocation in cloud computing. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (pp. 981-988). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1838338

Babcock, C. (2009, April 13). Why ’Private Cloud’ Computing Is Real – And Worth Considering. InformationWeek. Retrieved from http://www.informationweek.com/

Bagozzi, R. P., Yi, Y., & Phillips, L. W. (1991). Assessing construct validity in organizational research. Administrative science quarterly, 421-458.

Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A study of infrastructure as a service (IAAS). International Journal of engineering and information Technology, 2(1), 60-63.

Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud Computing: Understanding and Investigating Platform as a Service (PaaS). International Journal of Engineering, 3(3), 145-452.

Buyya, R., Ranjan, R., & Calheiros, R. (2010, May). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. Paper presented at the International Conference on Algorithms and Architectures, Busan, Korea. Abstract retrieved from http://link.springer.com/chapter/10.1007%2F978-3-642-13119-6_2?LI=true

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.

Chang, V., Wills, G., & De Roure, D. (2010). Cloud business models and sustainability: impacts for businesses and e-research. Software Sustainability Workshop. Retrieved from http://eprints.soton.ac.uk/271054/37/VC_Cloud_Business_Models_accepted_AHM2010.pdf
Charter, R. A. (1999). Sample size requirements for precise estimates of reliability, generalizability, and validity coefficients. Journal of Clinical and Experimental Neuropsychology, 21(4), 559-566.

Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85-90.

Clemons, E. K., & Chen, Y. (2011, January). Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing. Internet Computing, IEEE. Advance online publication. doi: 10.1109/HICSS.2011.292

Dargha, R. (2011). Cloud Computing: Key Considerations for Adoption. Infosys. Retrieved from http://www.infosys.com/cloud/resource-center/documents/cloud-computing.pdf

Das, S., Agarwal, S., Agrawal, D., Abbadi, A. E. (2010). An Elastic, Scalable, and Self Managing Transactional Database for the Cloud (UCSB Computer Science Technical Report). Retrieved from University of California, Department of Computer Science: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.9402

Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud computing: Distributed Internet computing for IT and scientific research. Internet Computing, IEEE, 13(5), 10-13.

Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: Issues and challenges. Internet Computing, IEEE. Advance online publication. doi: 10.1109/AINA.2010.187

Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H., & Wolf, D. (2011). Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Computing, 91(1), 23-42.

Emerson Network Power (2010). Taking the Enterprise Data Center into the Cloud [White paper]. Retrieved from http://www.emersonnetworkpower.com/en-US/Brands/Liebert/Documents/White%20Papers/scalable-data-center_24567-R11-10.pdf

Ercan, T. (2010). Effective use of cloud computing in educational institutions. Procedia - Social and Behavioral Sciences, 2(2), 938-942.

Géczy, P., Izumi, N., & Hasida, K. (2012). Cloudsourcing: Managing Cloud Adoption. Global Journal of Business Research, 6(2), 57-70.

Goodburn, M. A., & Hill, S. (2010). The cloud transforms business. Financial Executive, 26(10), 35-39.

Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. Security & Privacy, IEEE, 9(2), 50-57.

Grover, V., & Teng, J. T. (1993). The Decision to Outsource Information-Systems Functions. Journal of Systems Management, 44(11), 34-38.

Gurav, U., & Shaikh, R. (2010, February). Virtualization: a key feature of cloud computing. In Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1741957

Harris, W. (2011, April). Cloud Computing-Based IT Solutions for Organizations With Multiregional Branch Offices. Paper presented at the 2nd International Conference on Information Managemant and Evaluation: ICIME2011, Toronto, Canada. Abstract retrieved from http://www.academic-conferences.org/pdfs/ICIME11-Booklet.pdf

Hayes, B. (2008). Cloud computing. Communications of the ACM, 52(7), 9-11.

Heiser, J., & Nicolett, M. (2008). Assessing the security risks of cloud computing (G00157782). Retrieved from http://www.gartner.com/DisplayDocument?id=685308

Hunter, P. (2009). Cloud aloud. Engineering & Technology, 4(16), 54-56.

IBM Corporation. (2009). Fact sheet: IBM Strategy and Change Services for Cloud Adoption [Fact sheet]. Retrieved from http://www-03.ibm.com/press/us/en/attachment/28557.wss?fileId=ATTACH_FILE5&fileName=Fact%20sheet%20-%20IBM%20Strategy%20and%20Change%20Services%20for%20Cloud%20Adoption.pdf

IBM Corporation. (2010). Defining a framework for cloud adoption [White paper]. Retrieved from ftp://public.dhe.ibm.com/common/ssi/ecm/en/ciw03067usen/CIW03067USEN.PDF

Ibrahim, A. S., Hamlyn-harris, J. H., & Grundy, J. (2010, November). Emerging security challenges of cloud virtual infrastructure. Paper presented at the Asia Pacific Software Engineering Conference 2010 Cloud Workshop, Sydney, Australia. Abstract retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.603

Jiang, J. J., Muhanna, W. A., & Klein, G. (2000). User resistance and strategies for promoting acceptance across system types. Information & Management, 37(1), 25-36.

Kandukuri, B. R., Paturi, V. R., & Rakshit, A. (2009, September). Cloud security issues. Internet Computing, IEEE. Advance online publication. doi: 10.1109/SCC.2009.84

Kim, W., Kim, S. D., Lee, E., & Lee, S. (2009, December). Adoption issues for cloud computing. In Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services (pp. 3-6). ACM Digital Library. Retrieved from http://dl.acm.org/citation.cfm?id=1806341

Knorr, E., & Gruman, G. (2008). What cloud computing really means. Infoworld. Retrieved from http://moodle-rsc.ukc.ac.uk/login/index.php

Krautheim, F. J. (2009, June). Private virtual infrastructure for cloud computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing (pp. 5). USENIX Association. Retrieved from https://www.usenix.org/conference/hotcloud-09/private-virtual-infrastructure-cloud-computing

Lai, V. S., & Mahapatra, R. K. (1997). Exploring the research in information technology implementation. Information & Management, 32(4), 187-201.

Leavitt, N. (2009). Is cloud computing really ready for prime time. Internet Computing, IEEE, 42(1), 15-20.

Lenk, A., Klems, M., Nimis, J., Tai, S., & Sandholm, T. (2009, May). What`s inside the Cloud? An architectural map of the Cloud landscape. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 23-31). IEEE Computer Society. Retrieved from http://origin-www.computer.org/csdl/proceedings/icse-cloud/2009/3713/00/05071529.pdf

Li, Z. J., Chen, C., & Wang, K. (2011). Cloud computing for agent-based urban transportation systems. Intelligent Systems, IEEE, 26(1), 73-79.

Loebbecke, C., Thomas, B., & Ullrich, T. (2012). Assessing Cloud Readiness at Continental AG. MIS Quarterly, 11(1), 11-20.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189.

McAfee, A. (2011). What every CEO needs to know about the cloud. Harvard Business Review, 89(11), 124-132.

Mell, P., & Grance, T. (2010). The NIST Definition of Cloud Computing. Communications of the ACM, 53(6), 145.

Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245-253.

Preimesberger, C. (2011). The world from hardware to software and now to cloud-according to DELL. eWEEK. Retrieved From http://www.eweek.com/

Qureshi, I., & Compeau, D. (2009). Assessing between-group differences in information systems research: a comparison of covariance-and component-based SEM. MIS Quarterly, 33(1), 197-214.


Raman, T. V. (2008). Cloud computing and equal access for all. In Proceedings of the 2008 international cross-disciplinary conference on Web accessibility, pp. 1-4.

Reynolds, E., & Bess, C. (2009). Clearing Up the Cloud: Adoption Strategies for Cloud Computing. Cutter IT Journal, 22(6), 14-20.

Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I. M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., & Galan, F. (2009). The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development, 53(4), 4-1.

Rogers, E. (1983). Diffusion of Innovations. New York, USA: Free Press.

Royston, J. P. (1983). Some techniques for assessing multivarate normality based on the shapiro-wilk W. Applied Statistics, 121-133.

Shapiro, S. S., & Wilk, M. B. (1965). An analysis of variance test for normality (complete samples). Biometrika, 52(3), 591-611.

Simalango, M. F., Kang, M. Y., & Oh, S. (2010). Towards Constraint-based High Performance Cloud System in the Process of Cloud Computing Adoption in an Organization (Doctoral dissertation, Ajou University, South Korea). Retrieved from http://arxiv.org/ftp/arxiv/papers/1010/1010.4952.pdf

Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. Internet Computing, IEEE, 13(5), 14-22.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.

Sultan, N. (2010). Cloud computing for education: A new dawn?. International Journal of Information Management, 30(2), 109-116.

Wang, L., Laszewski, G. V., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New Generation Computing, 28(2), 137-146.

Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16.

VMware (2011) Global Cloud Computing adoption: transformation Is in the air [White paper]. Retrieved from http://www.vmwaregrid.com/vcloud_service_provider/servedbythenet/assets/Cloud_IDG.pdf

Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. European Journal of Information Systems, 12(4), 251-268.
zh_TW