Page 595 -
P. 595

594    References


        European Parliament.  “Directive 2009/136/EC of the European   Choi, Jae, Derek L. Nazareth, and Hemant K. Jain. “Implementing
            Parliament and of the Council of November 25, 2009.”    Service-Oriented Architecture in Organizations.” Journal of
            European Parliament  (2009).                         Management Information Systems 26, No. 4 (Spring 2010).
        Fowler, Geoffrey A.  “Tech Giants Agree to Deal on Privacy Policies   Clark, Don. “HTML5:  A Look Behind the Technology Changing
            for Apps.”  Wall Street Journal (February 23, 2012).  the Web.”  Wall Street Journal  (November 11, 2011).
        Federal Trade Commission.  "Protecting Consumer Privacy In an   David, Julie Smith, David Schuff, and Robert St. Louis. “Managing
            Era of Rapid Change."  Washington D.C. (2012).       Your IT Total Cost of Ownership.” Communications of the
        Hsieh, J.J. Po-An, Arun Rai, and Mark Keil. “Understanding Digital   ACM 45, no. 1 (January 2002).
            Inequality:  Comparing Continued Use Behavioral Models of   Fitzgerald, Brian. “The Transformation of Open Source Software.”
            the Socio-Economically Advantaged and Disadvantaged.” MIS   MIS Quarterly 30, No. 3 (September 2006).
            Quarterly 32, no. 1 (March 2008).                Fox, Armando, and David Patterson. “Self-Repairing Computers.”
        Laudon, Kenneth C. and Carol Guercio Traver. E-Commerce:    Scientific American (May 2003.).
            Business, Technology, Society 9th Edition. Upper Saddle   Ganek, A. G., and T. A. Corbi. “The Dawning of the Autonomic
            River, NJ: Prentice-Hall (2013).                     Computing Era.” IBM Systems Journal 42, no 1, (2003).
        Laudon, Kenneth C. Dossier Society: Value Choices in the Design   Gantz, John and David Reinsal.  ”Extracting Value from Chaos.”
            of National Information Systems. New York: Columbia   IDC (June 2011).
            University Press (1986b).                        Gartner Inc, “Worldwide IT Outsourcing Services Spending to Hit
        Lee, Dong-Joo, Jae-Hyeon Ahn, and Youngsok Bang.  “Managing   US $251bn in 2012 .” siliconrepublic.com (August 8, 2012).
            Consumer Privacy Concerns in Personalization: A Strategic   Gartner, Inc.” Gartner Says Worldwide IT Spending On Pace to
            Analysis of Privacy Protection.”  MIS Quarterly 35, No. 2   Surpass $3.6 Trillion in 2012 .” (July 9, 2012).
            (June 2011).                                     Hagel III, John and John Seeley Brown. “Your Next IT Strategy.”
        National White Collar Crime Center and the Federal Bureau of   Harvard Business Review (October, 2001).
            Investigation. "Internet Crime Complaint Center 2011   Hamblen, Matt. “Consumerization Trends Driving IT Shops
            Internet Crime Report. (2012).                       Crazy.” CIO (May 2, 2012).
        Nord, G. Daryl, Tipton F. McCubbins, and Jeretta Horn Nord.   Internet World  Stats. “World Internet Users and Population Stats.”
            “E-Monitoring in the Workplace:  Privacy, Legislation, and   www.inernetworldstats.com, accessed October 14, 2012.
            Surveillance Software. Communications of the ACM 49, No. 8   Kauffman, Robert J. and Julianna Tsai. “The Unified Procurement
            (August 2006).                                       Strategy for Enterprise Software: A Test of the ‘Move to the
        Payton, Fay Cobb.”Rethinking the Digital Divide.”        Middle’ Hypothesis.” Journal of Management Information
            Communications of the ACM 46, no. 6 (June 2003)      Systems 26, No. 2 (Fall 2009).
        Rifkin, Jeremy. “Watch Out for Trickle-Down Technology.” The   King, John. “Centralized vs. Decentralized Computing:
            New York Times (March 16, 1993).                     Organizational Considerations and Management Options.”
        Robinson, Francis. “EU Unveils Web-Privacy Rules.” Wall Street   Computing Surveys (October 1984).
            Journal (January 26, 2012).                      Kurzweil, Ray. “Exponential Growth an Illusion?: Response to
        Singer, Natasha. “When the Privacy Button Is Already Pressed.”    Ilkka Tuomi.” KurzweilAI.net, September 23, 2003
            New York Times (September 15, 2012).             Lohr, Steve. “I.B.M. Mainframe Evolves to Serve the Digital World.
        Smith, H. Jeff, and John Hasnas. “Ethics and Information Systems:   New York Times (August 28, 2012).
            The Corporate Domain.” MIS Quarterly 23, no. 1 (March   Lyman, Peter and Hal R. Varian.  “How Much Information 2003?”
            1999).                                               University of California at Berkeley School of Information
        Smith, H. Jeff. “The Shareholders vs. Stakeholders Debate.” MIS   Management and Systems (2003).
            Sloan Management Review 44, no. 4 (Summer 2003).  Mann, Andi, Kurt Milne and Jeanne Morain.  “Calculting the Cost
        Symantec. "Symantec Intelligence Report: August 2012 Report"   Advantages of a Private Cloud. “ Cloud Computing Review 1,
            (August 2012).                                       No. 1 (June 2011).
        United States Department of Health, Education, and Welfare.   Marko, Kurt. “2012 State of the Data Center.” Information Week
            Records, Computers, and the Rights of Citizens. Cambridge:   (June 2012).
            MIT Press (1973).                                Markoff, John. “A High-Stakes Search Continues for Silicon’s
        U.S. Senate. “Do-Not-Track Online Act of 2011.” Senate 913 (May 9,   Successor.” New York Times (December 5, 2011).
            2011).                                           Markoff, John. “New Storage Device Is Very Small, at 12 Atoms.”
        U.S. Sentencing Commission.  “Sentencing Commission Toughens   New York Times (January 12, 2012).
            Requirements for Corporate Compliance Programs. “ (April   McAfee, Andrew. “What Every CEO Needs to Know about the
            13, 2004).                                           Cloud.” Harvard Business Review (November 2011).
        Xu, Heng, Hock-Hai Teo, Bernard C.Y. Tan, and Ritu Agarwal.   McAfee, Andrew. “Will Web Services Really Transform
            “The Role of Push-Pull Technology in Privacy Calculus: The   Collaboration?” MIT Sloan Management Review 46, no. 2
            Case of Location-Based Services.” Journal of Management   (Winter 2005).
            Information Systems 26, No. 3 (Winter 2010).     McDougall, Paul. “IBM Cements $1 Billion Outsourcing Deal with
                                                                 Cemex.” Information Week (July 30, 2012).
        CHAPTER 5                                            Mell, Peter and Tim Grance. “The NIST Definition of Cloud
        Andersson, Henrik, James Kaplan, and Brent Smolinski.    Computing” Version 15.  NIST (October 17, 2009).
            “Capturing Value from IT Infrastructure Innovation.”   Moore, Gordon.  “Cramming More Components Onto Integrated
            McKinsey Quarterly (October 2012).                   Circuits,” Electronics 38, Number 8 (April 19, 1965).
        Babcock, Charles. “Cloud's Thorniest Question: Does It Pay Off?”   Mueller, Benjamin, Goetz Viering, Christine Legner, and Gerold
            Information Week (June 4, 2012).                     Riempp. “Understanding the Economic Potential of Service-
        Benlian , Alexander, Marios Koufaris and Thomas Hess. “Service   Oriented Architecture.” Journal of Management Information
            Quality in Software-as-a-Service: Developing the SaaS-Qual   Systems 26, No. 4 (Spring 2010).
            Measure and Examining Its Role in Usage Continuance.”   Schuff, David and Robert St. Louis. “Centralization vs.
            Journal of Management Information Systems, 28, No. 3   Decentralization of Application Software.” Communications
            (Winter 2012).                                       of the ACM 44, no. 6  (June 2001).
        Carr, Nicholas.  The Big Switch.  New York: Norton (2008).    SeekingAlpha.com (April 24, 2012).







   MIS13_References global.indd   594                                                                         1/17/2013   2:38:45 PM
   590   591   592   593   594   595   596   597   598   599   600