Agarwal, M., & Srivastava, G. (2019). “Big” Data Management in Cloud Computing Environment. Harmony Search and Nature Inspired Optimization Algorithms, 707-716.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.
Almolhis, N., Haney, M., & Alqhtani, F. (2019). Discovering and Understanding The Security Issues In IoT Cloud. International Journal of Computer Science and Security, 13(6), 255-265.
Armbrust, M., Fox, A., Griffith, R., & al, e. (2010). A view of cloud computing. Communications of the ACM, (4), 50–58.
Azam, A., Boari, C., & Bertolotti, F. (2018). Top management team international experience and strategic decision-making. Multinational Business Review, 26(1), 50-70.
Brunner, M., Sillaber, C., Demetz, L., & Manhart, M. (2019). Towards data-driven decision support for organizational it security audits. Information Technology, 60(4), 207–217.
Cao, G. (2015). The affordances of business analytics for strategic decision-making and their impact on organisational performance. Pacific Asia Conference on Information Systems, 1–17.
Cao, G., & Duan, Y. (2014). A path model linking business analytics, data- driven culture,and competitive advantage. European Conference on Information Systems, 1–17.
Cerreia-Vioglio, S., Giarlotta, A., Greco, S., & Maccheroni, F. (2020). Rational preference and rationalizable choice. Economic Theory, 69, 61–105.
Chang, S. E., & Lin, C. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438–458.
Chiang, R., Grover, V., Liang, T., & Zhang, D. (2018). Strategic value of big data and business analytics. Journal of Management Information Systems, 35(2), 383-387.
Choi, M., & Park, E. (2016). The influences of enterprise management strategy on information security effectiveness. International Journal of Applied Engineering Research and Development, 11(15), 8686–8694.
Davenport, T. J. (2006). Competing on analytics. Harvard Business Review, 84(1), 98–107.
Dhami, M. K., & Thomson, M. E. (2012). On the relevance of cognitive continuum theory and quasirationality for understanding management judgment and decision making. European Management Journal, 30(4), 316–326.
Dremel, C., Herterich, M., & Wulf, J. (2020). Actualizing big data analytics affordances: A revelatory case study. Information & Management, 57(1).
Duan, Y., Cao, G., & Edwards, J. (2020). Understanding the impact of business analytics on innovation. European Journal of Operational Research, 281(3), 673-686.
Edwin, E., Umamaheswari, P., & Thanka, M. (2019). An efficient and improved multi-objective optimized replication management with dynamic and cost aware strategies in cloud computing data center. Cluster Computing, 22, 119-128.
Esposito, C., De Santis, A., & Tortora, G. (2018). Blockchain: A panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing, 5(1), 31-37.
Karaboğa, T., Zehir, C., & Karaboğa, H. (2019). Big Data analytics and firm innovativeness: the moderating effect of data-driven culture. The European Proceedings of Social & Behavioural Sciences, 526-535.
Kiron, D., Prentice, P. K., & Ferguson, R. B. (2012). Innovating with analytics. Mit Sloan. Management Review, 54(1), 47-52.
Kumar, P., Raj, P., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
Loske, A., Widjaja, T., & Buxmann, P. (2013). Cloud computing providers’ unrealistic optimism regarding it security risks: A threat to users?. Thirty Fourth International Conference on Information Systems, 1–20.
Rao, B. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92, 128-135.
Tim, Y., Hallikainen, P., Pan, S., & Tamm, T. (2020). Actualizing business analytics for organizational transformation: A case study of Rovio Entertainment. European Journal of Operational Research, 281(3), 642-655.
Wang, Z., Wang, N., Su, X., & Ge, S. (2020). An empirical study on business analytics affordances enhancing the management of cloud computing data security. International Journal of Information Management, 50, 387-394.
Winkel, O. (2007). Electronic government and network security: A viewpoint. Transforming Government People Process and Policy, 1(3), 220–229.