Essay Instructions: 1. Beynon-Davies, P. (2009a). The language of informatics: The nature of information systems. International Journal of Information Management. 29 (2), 92-103. Retrieved from http://www.sciencedirect.com
2. Capelli, D., Moore, A. & Trzeciak, R. (2012). The CERT Guide to Insider Threats. Upper Saddle River, New Jersey: Pearson Education, Inc.
3. Durkee, D. (2010). Why cloud computing will never be free. Communications of the
ACM 53(5): 62-9.
4. Glesne, C. (2006). Becoming qualitative researchers: An introduction (3rd ed.). Boston, MA: Pearson Education, Inc.
5. Gold, J. (2012). Protection in the cloud. Internet Law 15(12): 23-8.
6. Hubbard, D. (2009). The failure of risk management: Why it’s broken and how to fix it. United States, New Jersey: John Wiley & Sons.
7. Klenke, K. (2008). Qualitative Research in the Study of Leadership. Bingley, UK:
Emerald Group Publishing Limited.
8. McDavid, J.C., & Hawthorn, L.R.L. (2006). Program evaluation & performance
measurement: An introduction to practice. Thousand Oaks, CA: Sage Publication,
Inc.
9. Onyegbula, F., Dawson, M., & Stevens, J. (2011). Understanding the need and
importance of the cloud computing environment within the National Institute of Food and Agriculture, an agency of the United States Department of Agriculture. Journal of Information Systems Technology & Planning, 4(8), 17-42.
10. Perera, I. (2010). Are free cloud services productive? A performance study on end user computing. Journal of Applied Computer Science & Mathematics, 8(1), p34-40.
11. Proctor, P. (2004). Sarbanes-Oxley security and risk controls: when is enough? Infusion: Security & Risk Strategies, META Group.
12. Qaisar, S. & Khawaja, K. (2012). Cloud Computing: Network/security threats and
countermeasures. Interdisciplinary Journal of Contemporary Research in Business 3(9): 1323-9.
13. Reddy, V. & Reddy, L. (2011). Security architecture of cloud computing. International Journal of Engineering Science and Technology 3(9): 7149-55.
14. Sambandaraska, D. (2012). Thai CIOs deal with floods, cloud and big data. Enterprise Innovation (Dec. 2011/Jan. 2012): 40-1.
15. Schram, T. H. (2006). Conceptualizing and proposing qualitative research. Upper Saddle River, N.J.: Pearson Merrill Prentice Hall.
16. Slabeva, K. S., Wozniak, T., Ristor, S. (Ed.). (2010). Grid and Cloud Computing. Heidelberg, Germany: Springer-Verlag Berlin Heidelberg.
17. Slavin, R. (2007). Educational research: In an age of accountability. Boston, MA:
Pearson Education, Inc.
18. Subashini, S. & Kabitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1): 1-11.
19. Teixeira, J. (2012). Open-Source Technologies Realizing Social Networks: A Multiple Descriptive Case-Study. Open Source Systems: Long-Term Sustainability, 250-255.
20. Vose, D. (2008). Risk Analysis: A quantitative guide. (3rd ed.). West Sussex, England: John Wiley & Sons, Ltd.
There are faxes for this order.