References
[1]. Ratansingham, P., and Kumer, K., (2000). “Trading
partner trust in electronic commerce participation”. In:
nd Proceeding of the 22 International Conference on
Information Systems, pp. 544–552.
[2]. Kim, K.K., Lee, J.W., and Kim, H.S., (2003). “Impact of
trust and risk on internet banking adoption”. Korean
Manag. Rev., Vol. 32, No. 6, pp.1771–1797.
[3]. Jarvenpaa, S.L., Knoll, K., and Leidner, D.E., (2003). “Is
anybody out there? Antecedents of trust in global virtual
teams”. J. Manag. Inf. Syst., Vol. 14, No. 4, pp. 29–64.
[4]. Lim, N., (2003). “Consumer's Perceived Risk: Sources
versus Consequences”. Electron. Commer. Res. Appl.,
Vol. 2, No. 3, pp. 216–228.
[5]. Ahn, J.H., Choi, K.C., Sung, K.M., and Lee, J.H. “A
study on the impact of security risk on the usage of
knowledge management system: focus on parameter of
trust”. In: International Conference on Information systems, Vol. 15.
[6]. Hexin, Y., and Ahn, J.C., (2014). “An empirical analysis
on the persistent usage of personal cloud service: a cast
study of China”. Proc. Korean Soc. Internet Inf. Conf., Vol.
15, No. 2, pp. 149–150.
[7]. Jun, C.J., Lee, J.H., and Jeon, I.S., (2014). “Research
about factor affecting the continuous use of cloud
storage service: User factor, system factor, psychological
switching cost factor”. J. Soc. e-Bus. Stud., Vol. 19, No. 1,
pp. 15–42.
[8]. Seo, K.K., (2013). “Factor analysis of the cloud service
adoption intension of Korean firms: Applying the TAM and
VAM”. J. Digit Policy Manag, Vol. 11, No. 12, pp. 155–160.
[9]. Park, C.S., (2011). “Study on security considerations in
the cloud computing”. J Korea Acad.-Ind. Co-op. Soc.
Vol. 12, No. 3, pp. 1408–1416.
[10]. Siani, P., and Azzedine, B., (2010). “Privacy, security
nd and trust issues arising from cloud computing”. In: 2 IEEE
International Conference on Cloud Computing
Technology and Science, pp. 693–702.
[11]. Heiser, J., and Nicolett, M., (2008). Assessing the
Security Risks of Cloud Computing. Gartner.
[12]. Almond, C., (2009). A Practical Guide to Cloud
Computing Security What You Need to Know Now About
Your Business and Cloud Security. Avanade Inc., pp. 6-27.
[13]. Zissis, D., and Lekkas, D., (2012). “Addressing cloud
computing security issues”. Future Gener. Comput. Syst.
Vol. 28, No. 3, pp. 583-592.
[14]. Foster, T., Zhao, Y., and Lu, S., (2009). “Cloud
computing resource management through a grid
middleware: A case study with diet and eucalyptus”. In:
IEEE International Conference on Cloud Computing, pp.
151–154. Accessed 25 August (2015).
[15]. Tarrant, D., Brody, T., and Carr, L., (2015). “From the
desktop to the cloud: leveraging hybrid storage
architectures in your repository ”. In: International
Conference on Open Repositories. Retreived from
http://eprints.soton. ac.uk/267084/1/or09.pdf on 25
August (2015).
[16]. https://cloudsecurityalliance.org