IT Management Literature Review

IT Management Literature Review

IT Management Literature Review

Thank you for reading this post, don't forget to subscribe!

Submit the completed draft of your IT Management Literature Review and Proposed Study project. Be sure that this is a complete paper. The word draft is used only to indicate that you will receive feedback on the project’s initial submittal so that you will have time to improve your paper. The majority of your effort in this paper is in the Literature Review, but you are also expected to complete the rest of the research study.

Your paper should include the following components:

  • Introduction that sets forth the research topic (and research question, if you have one).
  • Literature Review of 12–15 pages:
    • A narrative that includes 15–25 sources relevant to, and organized around, your research topic and sub-topics, including definitions, examples, and potential criticisms of your position.
    • Synthesize your selected literature into themes, summarizing the main ideas and key points about what is known and what is unknown about the research topic.
    • Critically compare, contrast, and evaluate the chosen sources, identifying areas of controversy in the literature related to the research topic.
    • Formulate questions that need further research related to the research topic.
  • Research methodology and rationale. (You do not need to include your entire assignment from Unit 6, but enough to explain your research method and rationale.)
  • Proposed population and sample group for your study.
  • A recruitment strategy for your sample group.
  • The research instruments you plan to use and a supported rationale for your choices.
  • A conclusion that reflects the alignment of your research question to all the other elements of your paper including the gap in the literature, the method, and so on.
  • Reference List.

Your paper should be a total of 14–18 pages, using proper APA format throughout, including in-text citations and references. Review the IT Management Literature Review and Proposed Study Draft for the grading criteria of this assignment. You will also benefit from using the resources provided on writing a Literature Review and related sections of the research study.

Submit your paper to Turnitin and review the feedback to be sure that you have properly cited your sources before you submit it to your instructor. You may also want to use the Smarthinking writing feedback service before submitting your final project in Unit 10.

IT Management Literature Review

Sample Paper Work on IT Management Literature Review

IT Management Draft

Name

Institution

Date

Introduction

Cloud computing is a sample of web-based machine. This sort of technology unites many computers to the web and gives data from one remote server. This innovation has recovered numerous businesses from expense to programming and its lack of quality. In the mid nineteenth century when computer developments were taking shape in the business world, generally organizations depended on one PC to tackle all the issues inside the company. Nonetheless, as time moved necessities requested productivity to meet the business prerequisites. Therefore, innovation has taken extraordinary rate of improvements (Vakil,  Lu, & Russakoff, 2012).

In the present social order, everything has changed to concentrate on connecting people and businesses, which is passing through the web, and other computer supported channels. This pattern has accelerated interest for rapid computer innovation that can handle substantial volumes of work for every second.  Research and numerous examines on innovative headways rest the reply on cloud innovation, which carries different societies to one worldwide village. In any case, there is incredible need to deteriorate the cloud computing in portions that solitary and modest business can plan and utilize their programming without searching for a vendor source. It is estimable that distributed computing innovation has made organizations work remotely and lessen cost of purchasing distinctive programming marks for every representative. The cloud-computing platform has brought many departments in an organization into a single server (Madhavaiah, Bashir, & Shafi, 2012).

This study will investigate methods for utilizing distributed computing to take care of corporate demands and dispersing cloud computing software to single clients through secure channels. The primary thought in this study is upholding corporate autonomy in the worldwide stage while offering data on the cloud platform. The technology fails to offer checkpoints that numerous organizations consider when they execute E-business to achieve their objectives. This study will include both the technical and the non-technical population to give their encounters computers and technology. The study will lead the researchers into investigating conceivable results that could be executed in the cloud-computing platform.  The system may as well blanket diverse organizations that utilize cloud innovation and cloud technology vendors (Li, et al, 2011).

IT Management Literature Review Section

In this project, the literature review will cover several scholarly works that touch on cloud computing. The articles and research done on cloud computing will range from management issues, employee relationship and technological barriers that technology create between business and their customers. This part is a review of the articles in detail while highlighting the strengths and weaknesses the study had on cloud technology. The first article about cloud computing in the business perspective takes a critical analysis of the role cloud computing can bring to the developments of businesses worldwide. The article written by three scholars who have a wealth of knowledge on Information Technology looks at all connectors of business and technology. Cloud computing comes from different definitions as seen in the article and the way business uses technology on daily basis. Since the onset of technology and all the innovations that come with it, most businesses are left with no choice but to embrace technology because it is the only way of reaching their target customers (Iyer, et al, 2013).

Therefore, the literature gap that this article brought in investigating cloud computing in the business world is the way definitions are use  to influence business operations. From a good definition, businesses will be able to find common grounds of using technology in their operations or linking with customers. Consequently, as the article uncovers all the possible definitions of cloud computing in a business perspective another article looks at reliability and speed. In this article, the authors uncover the extent of cloud technology in business and business education. Most businesses are using technology in operations and customer management (Anders, 2012). However, extend to which business use technology and cloud computing has not been estimated to provide its full impact on education and the business field.  The authors use extensive methods of research methodologies and data analysis to assess the effectiveness of cloud computing in business. It is essential to ascertain the effectiveness of technology in business to identify push factors that drive innovations. In the past, businesses used less technology and did not measure their developments or failures using technology. Therefore, this research is essential in making all businesses account for the role of technology in their developments and failures (Li, et al, 2011).

However, the study veers from cloud based computer technology to encompass internet connectivity and mobile cloud. This aspect helps in exploring several options of using secured high-speed internet everywhere to help businesses and business educators provide activities that are more dynamic. The effectiveness of a business comes from using technology and working within a certain period to achieve objectives. As much businesses or organizations depend on technology, they have an obligation to manipulate or look for technology that can work within the shortest time to give out desired results (Anders, 2012).

Cloud technology has great impacts on all businesses whether big or small. The onset of 21st century is giving the commerce world different dynamics where small and medium businesses gain the capacities of competing with the business giants within the same product range. This development prompted a study on the avenues in which small and medium businesses use cloud technology in their operations. Through several reviews and extensive background information in the use of cloud technology among large corporation, the article explores the hurdles small businesses face in acquiring cloud technology from vendors. It is evident in the internet that most business that advertises and performs online sales is large organizations with substantial capital base. This trend has led to crippling of small and medium business not to reach their target customers within the shortest time like the large corporation. By covering the strengths and weaknesses businesses face in the cloud-computing environment, the study uses a collaboration point to find the modeling technique in improving the feasibility of information systems. Largely, the study helped in opening up small business to realize their potential in the market by use of technology (Xu, 2012).

The literature gap covered in this study has brought a leveled ground of operations for small, medium sized and large businesses in operations. The overall performance of business across capabilities put small and medium sized organizations at par with the large corporations. This means that cloud technology is striving to solve differences that make businesses have a competitive advantage over the small and medium sized organizations (Armbrust, et al, 2010).

In another twist, other studies have explored different avenues in which small and medium companies can use technology within the cloud technology to compete with other large organizations. In this line, studies look at the opportunities that these low cost start-up companies have and their potential to use cloud technology in reaching their target customers. In this study, the authors focused on the use of open source software and technology to reach the customer base. Most small and medium sized companies do not have the capacity to buy good software that can connect them to other associates and a wide consumer base. In this respect, the low cost businesses have opted to use open source software that are easily available and can help in meeting part of their online business needs (Berman, et al, 2012).

The low cost companies used social sites, media marketing and crowd sourcing in information systems also provided substantial data in making conclusions about cloud computing in low cost businesses. From the study, it is evident that most businesses will consider cost of operations before buying any cloud software from a vendor (Xu, 2012). When low costs businesses opt to use social websites for media marketing, they reduce operation costs while increasing the chances of recording high profits. This means that most business have a challenge in spending money to buy cloud technology with less returns on sales. This article has promoted developments of the literature gap that existed between cost of operations and business growth within the cloud platform. Consequently, research has led to the exploration of other options that businesses can incorporate in their operations to consider using computer technology at cheaper rates. These are all done to make the cloud platform convenient for all operations within an organization (Aljabre, 2012).

From the business operator, comes the customer whom all business proprietors work to satisfy. Therefore, in this respect any technological innovation that a business implements should have a positive influence on mind of the customer.  In this line of thought, the literature review covered an article that explores cloud computing from a customer’s point of view. Through its methodology and research methods, the article uses product development lifestyle to evaluate the risks and gains in cloud computing. Most companies reach their target customers by using their lifestyle (VanderMeer, Dutta, & Datta, 2012).

The study capitalized in using the cloud platform that used customers’ lifestyle to direct them towards a certain proprietor. In covering the use of cloud computing, business have an obligation of establishing the best avenues of reaching the target customers and the language to use in such platforms. By targeting four business areas like SMEs, BFS, education and hospitals, the article uses the risks associate to evaluate the importance of cloud technology in business (VanderMeer, Dutta, & Datta, 2012).  The four risk classifications that the article covers are vendor related risk, safety related risk, no-gain risk and competency related risk.  At this point, the article brings critical issues that cause the literature gap in this study. These issues concern that risks that several businesses encounter when using cloud technology in their operations. This literature review creates interests in the use of technology to improve business growth as well as mitigating risks (Budrienė, & Zalieckaitė, 2012).

Through mapping of the four categories of risks and their uses in business, the article draws conclusion on the role vendors’ play in reducing business risks for cloud technology users. Therefore, vendors play an important role in the daily operations of a business on the cloud platform. However, there are several risks involved that vendors could not control at their level. The reason why vendors cannot control the risk is security matters concerning intellectual properties (VanderMeer, Dutta, & Datta, 2012). From this article, the vendors have tried to develop applications that fit the user needs of several businesses on the E-commerce platform. This is evident on another study that focuses on the relationship between cloud vendors and the end users of their products. The study uses empirical methods to uncover cloud technology in the manufacturing section and the way corporations align their needs to efficiency (Budrienė, & Zalieckaitė, 2012).

Most companies take needs to the forefront in manufacturing applications for business operations. Through data collected from different manufacturers and cloud technology vendors, the article uncovers the details behind cloud computing adoptions in the manufacturing sector. This article is essential in developing the literature review and finding the literature gap between vendors and end users of cloud technology. The article looks at the different roles and technological advancements that vendors pack in their software to help end users enjoy cloud technology effectively (Vincent, Wang, & Xu, 2013).

Vendors provide cloud services to organizations under several platforms. These platforms come with different specifications that cannot allow a business to develop their own cloud product. Therefore, other studies take each platform and analyze its viability to businesses and ways in which it can help in reducing costs while increasing returns on profit. Through using the Software-as –a-Service platform of information manipulation and sharing, the article looks at cloud technology, the online services, and their impact to businesses (Desai, 2013).

In discussing several multiple cloud vendors, the article explores different obstacles to opportunities for the cloud technology. This study helps the literature review to identify the challenges cloud vendors face when providing their services on the Software-as-a-Service platform. The challenges identified in this study forms a large part of the literature information since it helps in identifying the possible hurdles businesses can encounter in developing their own cloud technologies (Espadas, 2013). Through extensive research and evidences from large computer manufacturing companies, other studies explore the potential of generating new business frameworks that are in line with technology.  The researchers have shown how cloud technology can help in creating opportunities in the business world for value added services. However, this is done on the manufacturer’s context towards the customer (Kelly, 2013).

Through the extensive on shifting competition in the business landscape, the studies help in developing the literature touching on emerging issues that prevent businesses from making their own cloud technologies (Espadas, 2013). This information is essential for small business owners who depend on technology to reach a wide market. They invest most of their funds on technology with an aim of making profits in a market dominated by the large corporations. In using the cloud platform to increase innovations in business, the company increases its value and efficiencies. Other information explores the role of cloud computing in business through researching its values to businesses (Kelly, 2013).

Researchers in the field of information technology and business have used online companies like Amazon cloud technology model as a case study in assessing the benefits as well as the drawbacks businesses face in using cloud technology.  In line with the hurdles, Amazon face in its cloud platform, the researchers navigates through types of businesses that can benefit from integrating their operations in the cloud technology platform. In its conclusion, the studies approve the importance of cloud technology to small business and other low cost corporations. These studies are essential in developing literature review that looks at the use of cloud technology in small businesses. This can act as a good step of making research methods geared towards making cloud technology available to all businesses (Haibo, & Tate, 2012).

The main emphasis that comes from these studies is the use of an online business company to provide all the expected challenges and ways of reducing those challenges to make the business prosper. Apart from customer segment or interaction concern in an organization, there is need for an elaborate database system on the cloud platform that allows the business owners manage several branches from a single unit. A study on Cost-based Database Request Distribution Technique for online E-commerce applications explores the use of technology in the real business world. It does not mention the type of business in focus but cut across different databases that most businesses use in connecting to customer and distributers. This means that several businesses can develop a single database application that is standard on the cloud platform to reduce vendor-based applications that come at a cost (Cummings, 2012).

The vendors applications are a bit complicated at require business to budget for their monthly pay. It proposes the cost based Database Request Distribution strategy and looks at the policies that businesses use to govern the technology. The article covers steps that businesses uses like theoretical model database for load computation in developing high-tech level architecture model for request distribution. After several qualitative approaches and experiments, the study draws conclusion on the significant developments of database-layer resource utilization in improving request distribution techniques (Lin, & Chen, 2012).

Consequently, businesses can gain the potential of using database to reach their customers with the use of open source software or social site. They only need to present their products and brand in a special way that sends a direct message to the target population. This idea can benefit the small and medium sized companies that do not financial strength as compared to the large corporations. In addition, the small and medium sized companies can use their presentations on the common social websites that carry a large population of their target customers (Banerjea, 2013).

Data security forms an important part of the cloud technology to businesses. Every manager will need to secure their channel of communication and organization’s intellectual property to stay on top of their competitors. This trend forms an important part of the literature of this study since in the wake of 21st century; most Information Technology experts face difficult times in managing cyber crimes (Lin, & Chen, 2012).  The risks are felt heavily by businesses or organizations that find themselves in the hands of hackers and other criminal acts on the internet. For a business to establish a secure line of communication and trade that does not limit the customer to  choice and inquiries, all  aspects of cloud computing technology should come  from a third party. For this reason, another study that looked into the security issues of data in the 21st century was conducted (Rader, 2012).

The study covers topics of data protection laws that governments formulate for online business transactions. Other topics covered are government regulations, user rights measures that businesses use in cloud computing techniques. These are critical issues when transferring the manufacture and management of cloud technology from vendors to the business organizations. The government regulation system will have to change to meet both small and large organizations in giving a fair trade ground.   This study helps in the development of literature review for the study in a legal perspective. It helps in exploring the legal hurdles that business face in using cloud-based technology of their own compared to vendor-based products (Aljabre, 2012).

The literature will start with vendor regulations and user rights. After every regulation and right the vendor has in offering service to organizations, the government formulate different designs of laws that all businesses should follow to avoid infringement. In the event that organizations get a chance of manufacturing their own cloud technology for business use, several challenges like using the same technology to fight competitors may arise. These are challenges that legal experts will look at in transferring ownership of cloud technology from vendors to businesses. Apart from the legal perspective that every business will look at, most organizations target cloud technology to offer products and services on demand to customers. The challenge that comes from vendor-based technology is lack of flexibility (Anders, 2012).

Most businesses act in a dynamic way that enables them to change to market demands and customers preferences. In this aspect market shifts, using vendor products become expensive and inappropriate to most business organizations that will need to change their strategies on monthly basis. Therefore, several studies have shown the importance of using cloud technology in improving the sales of products and services on demand.  The studies explore the various ways in which small businesses can utilize cloud-computing technology to provide services and products those customers’ requests. The researchers cover the major benefits in cloud computing technology and utility computing. In addition to those benefits, the studies cover details on access to large amounts of processing capabilities and storage space. This development is in the literature development since it helps in uncovering the extent of cloud computing and its impacts to small businesses (Armbrust, et al, 2010).

Small business can come out to be major beneficiaries of technology. However, the benefits measure an equal amount to the pay and risks involved. When a small business goes to the online and transforms all its operations into the virtual environment, chances of collapsing are very high especially when the technology halts or it is hacked by criminals. Cloud technology needs very delicate treatment when businesses are allowed to manufacture and manage their own patents and technology. In line with studies on using cloud technology to offer products and services, some experts in the Information Technology department did a study on Software-as-a Service platform of cloud technology to explore the relationship between vendors and businesses (Banerjea, 2013).

The businesses arrangement between these two parties acts tenant-based arrangement where the business rents technology from the vendor. This research takes a critical study on the Software as a Service platform of cloud computer and the pay per use business model in scaling services. The study helps in establishing formal measurements for under and over-provisioning of computer related resources in the cloud framework. Furthermore, the researcher proposes resource allocation model to set out Software as a Service infrastructure to several businesses. These developments follow rules of multi-tenancy thus developing cost effective and scalable virtual environment. This study helps in developing the literature   review of the study from a single platform of cloud computing technology (Berman, et al, 2012).

It looks at the history of Software as a Service infrastructure and its role in business. Businesses consider these roles before entering into any form of negotiation with cloud vendor. In addition to all the developments that studies bring to cloud technology and businesses, there social and psychological aspect that bring challenges to vendors and businesses operating on the cloud platform. These are issues concerning perception, attitude and adoption of technology. Even though most people are changing their attitude to embrace technology, most businesses find it hard to reach all their target customers who see risks in every opportunity that technology brings. The study takes a broader look at the field of information technology in regards to cloud technology (Budrienė, & Zalieckaitė, 2012).

It takes a quantitative approach in data collection and analysis where several IT professionals were interviewed on their concerns about adopting IT in business. The results of the research indicated non-willingness to adopt IT in business until issues concerning compatibility of the cloud with companies’ policies, security and standardization are resolved. Compatibility issues are critical because the cover a wide range of business operations and connections. In the event that any organization changes operations to a virtual environment, all partners and shareholders that are linked to the business gets affected (Cummings, 2012).

The article is also essential in developing the literature review through exploring the compatibility issues that businesses may face in manufacturing their own cloud technology. Therefore, before designing cloud technology that fits every business individually the government and information technology experts should sit down and explore all the possible challenges that will rock the business environment in the new change (Banerjea, 2013).

Literature Review themes summary

The research literatures provide several themes to the topic of research in this study. The first idea presented by most literature is efficiencies that cloud computing bring to businesses.  Most of the studies analyzed in the annotated bibliography narrative discuss the role of technology in improving operations and helping businesses to link with customers over wide geographical coverage. This is an important part in changing cloud ownership from vendors to the business organizations. In exploring the range of efficiencies that come with cloud technology, the articles look at ways in which small and medium sized organizations have utilized all avenues in the internet to reach their target customers at the lowest cost possible.  This means that all business improve their operations and reduce distance to the customers over the internet (Desai, 2013).

The other theme that comes out from most of the studies discussed in the bibliography narrative section is the compatibility to business environment. Under this theme, there are several ideas known to the research topic in terms of compatibility. The first common idea is giving customers an online shopping platform just like the fliers and brochures businesses give out on exhibitions and trade fares. The online shopping platform gives customers all the necessary information they need about a product and helps them in making wise choices before purchasing.  In this aspect, the business can improve sales through creativity and effective marketing of its products to the consumers. However, unknown to the study in terms of compatibility is the change in business dynamics and operations.  Most business will need a virtual technology that is very flexible with the changes that take place in the business environment.  This means that all aspects of the technology should help in helping the business through all challenges whether in the market or government policies. The last theme under the narrative is security issues (Espadas, et al, 2013).

The internet brings excellent avenues for trading for all businesses that implement operations on the virtual environment.   However, measures that businesses need to look at before providing their information to cloud vendor for storage or linking with the customer several security. Issues known to the study are vendor-based measures of controlling access to private information of their clients by outsiders. This means that as vendors provide technology, they have the responsibility of securing important data from hackers or client’s competitors.  However, unknown to the study is measures that small businesses can take to prevent intellectual from competitors on the internet trade platform.  When they advertise to customers over the social media or other sites, chances are high that most customers can be victims of phishing and other money laundering acts that criminals use to collect money from unsuspecting people. Therefore, businesses will secure their assets but fail to protect their customers who make purchases over the internet (Haibo, & Tate, 2012).

Therefore, from the themes and ideas presented in the literature review section several controversies surround cloud technology in business. The most important point to note is the risk mitigation strategies that most vendors use in protecting their clients. The risks only look at the businesses and fail to consider the customer who is the unsuspecting victim of fraud or money laundering. Customers may become serious targets of cyber criminals who will use all avenues to access the credit card details o most customers who purchase goods over the internet (Iyer, et al, 2013).

Research questions

The topic of this research seeks to find ways in which business can gain the rights to develop their own cloud technology and use it within any platform. This is important to allow the businesses have control of technology that favors the dynamics in the business.

In this context, the study seeks to find critical information that collects facts from the history of development and anticipated changes in the world of information technology. The research questions that are suitable for this study are;

  1. How can cloud computing vendors develop a single platform that will respond to specific needs of business on E-commerce
  2. How can businesses owners define their business needs that allow technology to create a good trading environment
  3. What are the anticipated changes in business operations that technology has not identified ways of addressing

Research Methodology and Rationale

The study on cloud technology requires a more critical approach in coming up with solutions to technological issues that most experts have not detected. There may be limited connection to issues that experts solve now to the anticipated challenges in the future. In this approval, the research may involve focus groups and interview most organizations that operate on a virtual environment to comprehend movement of businesses in the cloud platform (Kelly, 2013).

The methodology will look at the intensity data with respect to the utilization of technology and the frequencies in which organizations utilize innovation to achieve their customers’ needs. In addition, the study will include utilizing the specialized environment since they can give more information to the study, why the issue exists and their deliberations to take care of the issue. Hence, this study will best use a qualitative approach in information gathering and analysis to give a robust reply to the research questions. The qualitative analysis will link the research problem to the sample population thus giving the study an idea of moving technology from one point to another in the business environment.  The rationale of this method will seek to provide the experiences that most businesses have with cloud technology through the interviews and discussions with the focused groups (Li, et al, 2011).

Proposed population and sample group

The proposed population and sample group for the study will involve both the technical and non-technical environment.  The non-technical population is very essential in providing raw data and challenges that consumer encounter when using the cloud technology for purchases. This group will involve managers from different department in an organization and supervisors. Most important to note is the role of consumer protection authority and their views of cloud technology to customer interactions. The authority will form part of the proposed non-technical population in providing challenges that consumers face in the virtual environment as well as benefits (Lin, & Chen, 2012).

The technical population sample in this study is cloud technology vendors and the information technology experts from different organizations.  This group has an important role in providing technical information for this study while responding to issues that rose from the non-technical population. In the end, the research will remain with a simple role of evaluating the information from the two groups in the population sample and coming out with a valid conclusion. The population sample on the technical side will give issues that cannot allow most businesses to own their cloud technology or challenges that they may face in manufacturing and managing cloud technology.  This information is important in establishing the underlying issues separating cloud vendors from business owners (Madhavaiah, Bashir, & Shafi, 2012).

Recruitment strategy

The recruitment strategy for the population and sample group will follow dependencies and frequencies of using cloud technology. The dependencies will help the study to identify businesses that rely on information technology to operate and meet their customers. This will form the first qualification measures for people selected in the population sample. After selecting all businesses that work on virtual environment, the study will refine the recruitment by checking the frequencies of using technology in serving and meeting the customers. This move is essential for the study because managers and owners of such businesses will have the urge of using their own cloud technology as compared to renting technology from cloud vendors (Rader, 2012).

Research instruments

The research instrument for this study will come from written questions that will target the larger population of non-technical group. These questions may involve group discussions involving the role of technology in business and the improvements lacking to make it better. The other instrument that may help in driving this study is the use of interviews. Interviews involve one on one chat with organizations’ management team as well as the technical population sample. The last instrument in the study will be gathering information from the online blogs. These blogs mostly consist of customers responses to products and services they receive from the online trade interaction (Vakil, Lu, & Russakoff, 2012).

Conclusion

From the background information to the literature review, the research methods provide a vivid explanation of the gap in literature and its causes. The themes discussed in the literature review helps in formulating data collections techniques that seeks to address those issues. In conclusion, the research methodology provides the research question with three possibilities. The first possibility is breaking the regulations barrier and allowing the businesses to manufacture and manage their own cloud technology. This possibility will only come at a fair cost where the business will have to employ more Information Technology experts to manage the virtual environment (VanderMeer, Dutta, & Datta, 2012).

The businesses will only worry about security from hacking and phishing that may target their customers. The second possibility is allowing the cloud vendors to continue with providing cloud technology under flexible terms. This means that   almost all cloud vendors will form an important part of the businesses they serve. The main idea of making cloud vendors part of most businesses they serve is to allow smooth change to the market dynamics. The third possibility that comes from this study is allowing cloud vendors to manufacture technology then sell it directly to the business and allow them to do improvements. This possibility will still put the cloud vendors into business while allowing businesses to manipulate their cloud technology to meet market changes and demands (Xu, 2012).

References

Aljabre, A. (2012). Cloud Computing for Increased Business Value. International Journal Of Business & Social Science, 3(1), 234-239.

Anders, G. (2012). THRIFTY DOES IT. Forbes, 189(9), 92-98.

Armbrust, m., fox, a., griffith, r., joseph, a. D., katz, r., konwinski, a., & … Zaharia, m. (2010). A View of Cloud Computing. Communications Of The ACM, 53(4), 50-58.

Banerjea, D. (2013). Getting to the Core of Cloud Computing. Quality, 52(7), 23-27.

Berman, S. J., Kesterson-Townes, L., Marshall, A., & Srivathsa, R. (2012). How cloud computing enables process and business model innovation. Strategy & Leadership, 40(4), 27-35. doi:10.1108/10878571211242920

Budrienė, D., & Zalieckaitė, L. (2012). CLOUD COMPUTING APPLICATION IN SMALL AND MEDIUM-SIZED ENTERPRISES. Issues Of Business & Law, 4199-130. doi:10.520/ibl.2012.11

Connections for Business Practices. Review Of Business, 33(1), 111-118.

Cummings, R. B. (2012). Are Sales & Use Taxes Getting Cloudier With The Advent Of Cloud Computing?. Journal Of State Taxation, 30(2), 7-56.

Desai, D. (2013). Beyond Location: Data Security in the 21st Century. Communications Of The ACM, 56(1), 34-36. doi:10.1145/2398356.2398368

Espadas, J., Molina, A., Jiménez, G., Molina, M., Ramírez, R., & Concha, D. (2013). A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures. Future Generation Computer Systems, 29(1), 273-286. doi:10.1016/j.future.2011.10.013

established rivals. Strategy & Leadership, 40(3), 36-43. doi:10.1108/10878571211221202

Haibo, Y., & Tate, M. (2012). A Descriptive Literature Review and Classification of Cloud Computing Research. Communications Of AIS, 3135-60.

Iyer, E., Krishnan, A., Sareen, G., & Panda, T. (2013). Analysis of Dissatisfiers That Inhibit Cloud Computing Adoption Across Multiple Customer Segments. Proceedings Of The European Conference On Information Management & Evaluation, 145-151.

Kelly, L. (2013). Look to the cloud to help you offer your products and services on demand. Computer Weekly, 1-6.

Li, Q., Wang, C., Wu, J., Li, J., & Wang, Z. (2011). Towards the business–information technology alignment in cloud computing environment: an approach based on collaboration points and agents. International Journal Of Computer Integrated Manufacturing, 24(11), 1038-1057. doi:10.1080/0951192X.2011.592994

Lin, A., & Chen, N. (2012). Cloud computing as an innovation: Percepetion, attitude, and adoption. International Journal Of Information Management, 32(6), 533-540. doi:10.1016/j.ijinfomgt.2012.04.001

Madhavaiah, C. C., Bashir, I., & Shafi, S. (2012). Defining Cloud Computing in Business Perspective: A Review of Research. Vision (09722629), 16(3), 163-173. doi:10.1177/0972262912460153

Rader, D. (2012). How cloud computing maximizes growth opportunities for a firm challenging

Vakil, F., Lu, V., & Russakoff, A. (2012). Recent Developments in Cloud Computing and High Speed

VanderMeer, D., Dutta, K., & Datta, A. (2012). A COST-BASED DATABASE REQUEST DISTRIBUTION TECHNIQUE FOR ONLINE E-COMMERCE APPLICATIONS. MIS Quarterly, 36(2), 479-507.

Vincent Wang, X., & Xu, X. W. (2013). An interoperable solution for Cloud manufacturing. Robotics & Computer-Integrated Manufacturing, 29(4), 232-247. doi:10.1016/j.rcim.2013.01.005

Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics & Computer-Integrated Manufacturing, 28(1), 75-86. doi:10.1016/j.rcim.2011.07.002

Get a 5 % discount on an order above $ 20
Use the following coupon code :
topwritersleague