Reasons For The Failure Of The Queensland IT Project And IT Risk Management Strategies

Factors contributing to the Queensland IT project failure

There are various reasons as to why the Queensland project failed and these include the following; inherent complications in the social care and health sectors and the industry in general, lack of top management support which led to poor project management (Mell, & Grance, 2011).  There was also the aspect of time limit and poor documentation which made the IBM contractors unable to complete the project. Other reasons included the lack of proper communication and training as well as a team structure that was poorly designed. There was also a complex stakeholder; client and consultant relationship and failure to test the system.  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

From the look of things, the blame cannot be directed on one particular end. A project as big as the Queensland’s IT upgrade, requires a high integrated stakeholder management. The government, the contractor, the consultancy and the health management were all to blame since they failed to play their part of the game (Redlich, & Nemzow, 2015). If all were responsible enough in their roles issues could have been identified before hand and a solution sought in good time.

The success factors for IT implementation projects includes simplified employment agreements and awards that do away with the complexities that may affect the efficiency and effectiveness of the payroll processes. There should be clear accountability lines, responsibilities and roles for a governance structure that is end to end. System assessment and evaluation for impact and readiness for change need to be done before going into live. There should be timely identification of potential risks and risk management strategies put in place.   

The Workbrain software had never been substantiated to a proper position to be utilized in major projects as the Queensland. In this case, inherent risks related to the system were not identified. The team should have run the system in one location before they scaled to the entire health system or department. System testing was also the cause reason for poor use of Workbrain software.

To fix the problem the various stakeholders including the government, the health facility management, the consultant, the IBM contractors and any other should come after an audit report has been done (Cardona, 2013). Base on the identified issues and problems they need to accept responsibility and start the whole project again right from the beginning. Each of the stakeholders is to cost share the loss depending on the magnitude of errors and problems related to them.        

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Report question

  • What are some of the IT risks and their effects?
  • What are the IT risk management strategies that solve the problems?

Program design  

The design of the report analysis involved the use of qualitative design technique to obtain information related to risks and risk management strategies. This involves the use of peer reviewed sources of data such as books, online journal articles and journals. Published sources that contain secondary information were also useful in the report.

Discussion

To avoid the types of risks identified above, the business requires integrating risk management strategy so that the business, systems, data and infrastructure remain protected against the threats. The following is the risk management strategy and how to go about it (Mitchell, 2010).  

Recommendations for IT implementation projects success

IT risk management

Managing the IT risks involves structured process that includes a series of tasks which are designed to serve the following; identify the risks, assess the risks, mitigate the risks, develop plans for response and finally to review the procedures involved in the risk management process (Ramgovind, Eloff, & Smith, 2010). One such comprehensive approach by the Australian emergency management agency towards risk management is based on the PPRR model i.e. (prevention, preparedness, response and recovery). The following are the common IT risk management strategies that help reduce the impact of these threats.

Risk management strategies

The risks and threats to IT systems, infrastructure and data have become an everyday reality in most of the modern businesses. Such businesses, data and systems need to be protected against hackers and theft by putting in place strict measures of security (Flyvbjerg, 2009). These are the strategies to implement.

Practical steps that improve security for IT systems

  • Securing computers wireless networks and servers
  • Securing the system passwords
  • Using anti-spyware and anti-virus protection as well as firewalls(Sotomayor, Montero, Llorente, & Foster, 2009).
  • Using data backups such as remote or off-site storage
  • Regularly updating software to their latest version
  • Training staff for IT procedures and policies
  • Understanding the legal obligations towards online business

Creation of an online presence that is secure

If businesses have online presence, on needs to assess the website security, online banking, email accounts as well as profiles for social media. For instance the SSL technology (secure socket layer) is applied in encrypting transaction data and send card or customer details for authorization by the acquiring bank (Durmu?o?lu, 2009). It is critical to ensure that any solution that is considered for web hosting has the capability of supporting the protocol for the SSL.  

IT and induction training on the staff

Existing and new staff need to be trained in the IT procedures, policies and conduct codes as an important element of the IT risk management strategy. Staff training helps cover key business policies and processes that include the following;

  • Safe handling of any emails that are infected
  • Protection of the privacy towards the details of the customers
  • Priority tasks in case an event of security breach happens online  

As the employer one needs to have legal obligations that help in the training of staff (Sobol, & Klein, 2009). The provision of support as well as training for new or existing employees is an essential aspect of staff training.  

Business insurance

It is very hard for businesses to avoid or prevent all threats and risks related to IT. This makes the business insurance an element that is quite essential in the risk management and planning of business recovery (Knahl, 2009). One needs to regularly review and update the insurance especially for new or IT risks that are emerging such as the increased use of mobile devices that are personal while running activities in the workplace.      

Response towards an IT incident

The business recovers depending on how the owner responds to the IT incident. In this case the process influences the ideas of the customers and the business reliability. An incident of IT can get confined to the components of IT in the business like the denial of service attacks that target the business (De Bakker, Boonstra, & Wortmann, 2010). On the other side the incident can also include the whole business crisis including the damage on its networks from natural disasters. The risk management plan for IT risks and the continuity plan of the business need to have the following elements.

  • The response plans for the IT incident
  • Emergency plans of response
  • Plans of recovery

Proposed solutions for Queensland IT project failure

The response plans for the IT incident

Response plans for IT risks are meant to identify the principal risks that threaten the IT systems and highlights the steps the business owner needs to take towards mitigating the effects of the damages (Yuriyama, & Kushida, 2010). These may involve the details of any key staff needed to be notified after the incident, the plan of communication, the actions of priority, contact list and an event log for making records.   

Emergency response plan

Incidents that affect the IT systems may occur from a wider crisis that may include bushfire, flood, cyclone or an explosion. In such emergency cases the members of safety and staff of the public become the first priority (Wu, Ping, Ge, Wang, & Fu, 2010). Any incident for IT response plan needs to integrate and be supportive of response plans for emergency cases.    

Recovery plan for IT incident

These recovery plans need to help the business to respond in an effective manner on the incidents or crises that affect the IT systems in the business. The plans of recovery can shorten the times of recovery and reduce the extent of losses and these may include;

  • The strategies that recover the business operations in the shortest time ever
  • The objectives of the time recovery
  • Descriptions of important resources, staff and the equipment that are needed in making the business recovery(Sheppard, 2012). 

A checklist for IT (information technology) risk management

To all the businesses that make use of IT technology systems, it is critical for the owners to be aware of the key steps that can be taken towards the minimization of the IT risks or incidents. The owners of the business need to come up with a checklist for IT risk management that should help them to determine the precautions that are basic and the various steps to be involved in the management of the IT risks in the business (Dikaiakos, Katsaros, Mehra, Pallis, & Vakali, 2009). The checklist involves or takes care of all the various IT risks known to exist and that have the potential of influencing the operations of the business. The checklist caters all aspect for risks such as software and hardware damage, viruses, malicious attracts, spam, human errors and natural disasters (Bhatt, Emdad, Roberts, & Grover, 2010).  The checklist is a group of items that are highlighted for the business in terms of questions regarding the risks and the management risks that may affect the business IT systems and infrastructure and have a yes or no response in the end. It helps tell the business owners how well they are prepared in terms of managing and IT incident or risk that might occur (Kumar, & Van Hillegersberg, 2009). The checklist helps the business owners to always be ready for any of the identified risks based on the fact that these are issues that the business may not be able to tell when they happen. The idea is to ensure in case they happen, the business is ready to wake up to the occasion and through the management strategies, be able to recover its full operations and business continuity.

Conclusion

The IT risks include software and hardware failure, spam, malicious attacks, human error and viruses. They also include natural catastrophes such as floods, cyclones and fires. One can manage risks related to IT by carrying out a risk management assessment. The risk management plan for IT risks and the continuity plan of the business need to have the response plans for the IT incident, emergency plans of response and plans of recovery. The business also needs to have a checklist. The checklist is a group of items that are highlighted for the business in terms of questions regarding the risks and the management risks that may affect the business IT systems and infrastructure and have a yes or no response in the end. The checklist caters all aspect for risks. Staff training helps cover key business policies and processes that include safe handling of any emails that are infected, protection of the privacy towards the details of the customers and priority tasks in case an event of security breach happens online.  Business need to ensure they implement the following practical steps that improve security for IT systems; securing computers wireless networks and servers, securing the system passwords, using anti-spyware and anti-virus protection as well as firewalls, using data backups such as remote or off-site storage, regularly updating software to their latest version, training staff for it procedures and policies and understanding the legal obligations towards online business

IT risk management strategies

References

Angeles, R. (2009). Anticipated IT infrastructure and supply chain integration capabilities for RFID and their associated deployment outcomes. International Journal of Information Management, 29(3), 219-231.

Bhatt, G., Emdad, A., Roberts, N., & Grover, V. (2010). Building and leveraging information in dynamic environments: The role of IT infrastructure flexibility as enabler of organizational responsiveness and competitive advantage. Information & Management, 47(7-8), 341-349.

Buyya, R., Beloglazov, A., & Abawajy, J. (2010). Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges. arXiv preprint arXiv:1006.0308.

Cardona, O. D. (2013). The need for rethinking the concepts of vulnerability and risk from a holistic perspective: a necessary review and criticism for effective risk management. In Mapping vulnerability (pp. 56-70). Routledge.

Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud computing: Distributed internet computing for IT and scientific research. IEEE Internet computing, 13(5).

De Bakker, K., Boonstra, A., & Wortmann, H. (2010). Does risk management contribute to IT project success? A meta-analysis of empirical evidence. International Journal of Project Management, 28(5), 493-503.

Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.

Durmu?o?lu, S. S. (2009). The role of top management team’s information technology (IT) infrastructure view on new product development: Conceptualizing IT infrastructure capability as a mediator. European Journal of Innovation Management, 12(3), 364-385.

Flyvbjerg, B. (2009). Survival of the unfittest: why the worst infrastructure gets built—and what we can do about it. Oxford review of economic policy, 25(3), 344-367.

Knahl, M. H. (2009). A Conceptual Framework for the Integration of IT Infrastructure Management, IT Service Management and IT Governance. World Academy of Science, Engineering and Technology, 52, 438-443.

Kumar, K., & Van Hillegersberg, J. (2009). Why an ERP for IT.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

Mitchell, E. (2010). Using cloud services for library IT infrastructure. Code4lib journal, 9, 3-22.

Ramgovind, S., Eloff, M. M., & Smith, E. (2010, August). The management of security in cloud computing. In Information Security for South Africa (ISSA), 2010 (pp. 1-7). IEEE.

Redlich, R. M., & Nemzow, M. A. (2015). U.S. Patent No. 9,015,301. Washington, DC: U.S. Patent and Trademark Office.

Sellers, R. E., Guillot, J., Carter, G. H., Atkins, N. W., Pausback, N. J., Engle, M. R., … & Ballard, W. H. (2014). U.S. Patent No. 8,725,853. Washington, DC: U.S. Patent and Trademark Office.

Sheppard, R. F. (2012). U.S. Patent No. 8,285,578. Washington, DC: U.S. Patent and Trademark Office.

Sobol, M. G., & Klein, G. (2009). Relation of CIO background, IT infrastructure, and economic performance. Information & Management, 46(5), 271-278.

Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. IEEE Internet computing, 13(5).

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.

Wu, J., Ping, L., Ge, X., Wang, Y., & Fu, J. (2010, June). Cloud storage as the infrastructure of cloud computing. In Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on (pp. 380-383). IEEE.

Xue, L., Ray, G., & Gu, B. (2011). Environmental uncertainty and IT infrastructure governance: A curvilinear relationship. Information Systems Research, 22(2), 389-399.

Yuriyama, M., & Kushida, T. (2010, September). Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing. In 2010 13th International Conference on Network-Based Information Systems (pp. 1-8). IEEE.

Reasons For The Failure Of The Queensland IT Project And IT Risk Management Strategies

Factors contributing to the Queensland IT project failure

There are various reasons as to why the Queensland project failed and these include the following; inherent complications in the social care and health sectors and the industry in general, lack of top management support which led to poor project management (Mell, & Grance, 2011).  There was also the aspect of time limit and poor documentation which made the IBM contractors unable to complete the project. Other reasons included the lack of proper communication and training as well as a team structure that was poorly designed. There was also a complex stakeholder; client and consultant relationship and failure to test the system.  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

From the look of things, the blame cannot be directed on one particular end. A project as big as the Queensland’s IT upgrade, requires a high integrated stakeholder management. The government, the contractor, the consultancy and the health management were all to blame since they failed to play their part of the game (Redlich, & Nemzow, 2015). If all were responsible enough in their roles issues could have been identified before hand and a solution sought in good time.

The success factors for IT implementation projects includes simplified employment agreements and awards that do away with the complexities that may affect the efficiency and effectiveness of the payroll processes. There should be clear accountability lines, responsibilities and roles for a governance structure that is end to end. System assessment and evaluation for impact and readiness for change need to be done before going into live. There should be timely identification of potential risks and risk management strategies put in place.   

The Workbrain software had never been substantiated to a proper position to be utilized in major projects as the Queensland. In this case, inherent risks related to the system were not identified. The team should have run the system in one location before they scaled to the entire health system or department. System testing was also the cause reason for poor use of Workbrain software.

To fix the problem the various stakeholders including the government, the health facility management, the consultant, the IBM contractors and any other should come after an audit report has been done (Cardona, 2013). Base on the identified issues and problems they need to accept responsibility and start the whole project again right from the beginning. Each of the stakeholders is to cost share the loss depending on the magnitude of errors and problems related to them.        

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Report question

  • What are some of the IT risks and their effects?
  • What are the IT risk management strategies that solve the problems?

Program design  

The design of the report analysis involved the use of qualitative design technique to obtain information related to risks and risk management strategies. This involves the use of peer reviewed sources of data such as books, online journal articles and journals. Published sources that contain secondary information were also useful in the report.

Discussion

To avoid the types of risks identified above, the business requires integrating risk management strategy so that the business, systems, data and infrastructure remain protected against the threats. The following is the risk management strategy and how to go about it (Mitchell, 2010).  

Recommendations for IT implementation projects success

IT risk management

Managing the IT risks involves structured process that includes a series of tasks which are designed to serve the following; identify the risks, assess the risks, mitigate the risks, develop plans for response and finally to review the procedures involved in the risk management process (Ramgovind, Eloff, & Smith, 2010). One such comprehensive approach by the Australian emergency management agency towards risk management is based on the PPRR model i.e. (prevention, preparedness, response and recovery). The following are the common IT risk management strategies that help reduce the impact of these threats.

Risk management strategies

The risks and threats to IT systems, infrastructure and data have become an everyday reality in most of the modern businesses. Such businesses, data and systems need to be protected against hackers and theft by putting in place strict measures of security (Flyvbjerg, 2009). These are the strategies to implement.

Practical steps that improve security for IT systems

  • Securing computers wireless networks and servers
  • Securing the system passwords
  • Using anti-spyware and anti-virus protection as well as firewalls(Sotomayor, Montero, Llorente, & Foster, 2009).
  • Using data backups such as remote or off-site storage
  • Regularly updating software to their latest version
  • Training staff for IT procedures and policies
  • Understanding the legal obligations towards online business

Creation of an online presence that is secure

If businesses have online presence, on needs to assess the website security, online banking, email accounts as well as profiles for social media. For instance the SSL technology (secure socket layer) is applied in encrypting transaction data and send card or customer details for authorization by the acquiring bank (Durmu?o?lu, 2009). It is critical to ensure that any solution that is considered for web hosting has the capability of supporting the protocol for the SSL.  

IT and induction training on the staff

Existing and new staff need to be trained in the IT procedures, policies and conduct codes as an important element of the IT risk management strategy. Staff training helps cover key business policies and processes that include the following;

  • Safe handling of any emails that are infected
  • Protection of the privacy towards the details of the customers
  • Priority tasks in case an event of security breach happens online  

As the employer one needs to have legal obligations that help in the training of staff (Sobol, & Klein, 2009). The provision of support as well as training for new or existing employees is an essential aspect of staff training.  

Business insurance

It is very hard for businesses to avoid or prevent all threats and risks related to IT. This makes the business insurance an element that is quite essential in the risk management and planning of business recovery (Knahl, 2009). One needs to regularly review and update the insurance especially for new or IT risks that are emerging such as the increased use of mobile devices that are personal while running activities in the workplace.      

Response towards an IT incident

The business recovers depending on how the owner responds to the IT incident. In this case the process influences the ideas of the customers and the business reliability. An incident of IT can get confined to the components of IT in the business like the denial of service attacks that target the business (De Bakker, Boonstra, & Wortmann, 2010). On the other side the incident can also include the whole business crisis including the damage on its networks from natural disasters. The risk management plan for IT risks and the continuity plan of the business need to have the following elements.

  • The response plans for the IT incident
  • Emergency plans of response
  • Plans of recovery

Proposed solutions for Queensland IT project failure

The response plans for the IT incident

Response plans for IT risks are meant to identify the principal risks that threaten the IT systems and highlights the steps the business owner needs to take towards mitigating the effects of the damages (Yuriyama, & Kushida, 2010). These may involve the details of any key staff needed to be notified after the incident, the plan of communication, the actions of priority, contact list and an event log for making records.   

Emergency response plan

Incidents that affect the IT systems may occur from a wider crisis that may include bushfire, flood, cyclone or an explosion. In such emergency cases the members of safety and staff of the public become the first priority (Wu, Ping, Ge, Wang, & Fu, 2010). Any incident for IT response plan needs to integrate and be supportive of response plans for emergency cases.    

Recovery plan for IT incident

These recovery plans need to help the business to respond in an effective manner on the incidents or crises that affect the IT systems in the business. The plans of recovery can shorten the times of recovery and reduce the extent of losses and these may include;

  • The strategies that recover the business operations in the shortest time ever
  • The objectives of the time recovery
  • Descriptions of important resources, staff and the equipment that are needed in making the business recovery(Sheppard, 2012). 

A checklist for IT (information technology) risk management

To all the businesses that make use of IT technology systems, it is critical for the owners to be aware of the key steps that can be taken towards the minimization of the IT risks or incidents. The owners of the business need to come up with a checklist for IT risk management that should help them to determine the precautions that are basic and the various steps to be involved in the management of the IT risks in the business (Dikaiakos, Katsaros, Mehra, Pallis, & Vakali, 2009). The checklist involves or takes care of all the various IT risks known to exist and that have the potential of influencing the operations of the business. The checklist caters all aspect for risks such as software and hardware damage, viruses, malicious attracts, spam, human errors and natural disasters (Bhatt, Emdad, Roberts, & Grover, 2010).  The checklist is a group of items that are highlighted for the business in terms of questions regarding the risks and the management risks that may affect the business IT systems and infrastructure and have a yes or no response in the end. It helps tell the business owners how well they are prepared in terms of managing and IT incident or risk that might occur (Kumar, & Van Hillegersberg, 2009). The checklist helps the business owners to always be ready for any of the identified risks based on the fact that these are issues that the business may not be able to tell when they happen. The idea is to ensure in case they happen, the business is ready to wake up to the occasion and through the management strategies, be able to recover its full operations and business continuity.

Conclusion

The IT risks include software and hardware failure, spam, malicious attacks, human error and viruses. They also include natural catastrophes such as floods, cyclones and fires. One can manage risks related to IT by carrying out a risk management assessment. The risk management plan for IT risks and the continuity plan of the business need to have the response plans for the IT incident, emergency plans of response and plans of recovery. The business also needs to have a checklist. The checklist is a group of items that are highlighted for the business in terms of questions regarding the risks and the management risks that may affect the business IT systems and infrastructure and have a yes or no response in the end. The checklist caters all aspect for risks. Staff training helps cover key business policies and processes that include safe handling of any emails that are infected, protection of the privacy towards the details of the customers and priority tasks in case an event of security breach happens online.  Business need to ensure they implement the following practical steps that improve security for IT systems; securing computers wireless networks and servers, securing the system passwords, using anti-spyware and anti-virus protection as well as firewalls, using data backups such as remote or off-site storage, regularly updating software to their latest version, training staff for it procedures and policies and understanding the legal obligations towards online business

IT risk management strategies

References

Angeles, R. (2009). Anticipated IT infrastructure and supply chain integration capabilities for RFID and their associated deployment outcomes. International Journal of Information Management, 29(3), 219-231.

Bhatt, G., Emdad, A., Roberts, N., & Grover, V. (2010). Building and leveraging information in dynamic environments: The role of IT infrastructure flexibility as enabler of organizational responsiveness and competitive advantage. Information & Management, 47(7-8), 341-349.

Buyya, R., Beloglazov, A., & Abawajy, J. (2010). Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges. arXiv preprint arXiv:1006.0308.

Cardona, O. D. (2013). The need for rethinking the concepts of vulnerability and risk from a holistic perspective: a necessary review and criticism for effective risk management. In Mapping vulnerability (pp. 56-70). Routledge.

Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., & Vakali, A. (2009). Cloud computing: Distributed internet computing for IT and scientific research. IEEE Internet computing, 13(5).

De Bakker, K., Boonstra, A., & Wortmann, H. (2010). Does risk management contribute to IT project success? A meta-analysis of empirical evidence. International Journal of Project Management, 28(5), 493-503.

Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.

Durmu?o?lu, S. S. (2009). The role of top management team’s information technology (IT) infrastructure view on new product development: Conceptualizing IT infrastructure capability as a mediator. European Journal of Innovation Management, 12(3), 364-385.

Flyvbjerg, B. (2009). Survival of the unfittest: why the worst infrastructure gets built—and what we can do about it. Oxford review of economic policy, 25(3), 344-367.

Knahl, M. H. (2009). A Conceptual Framework for the Integration of IT Infrastructure Management, IT Service Management and IT Governance. World Academy of Science, Engineering and Technology, 52, 438-443.

Kumar, K., & Van Hillegersberg, J. (2009). Why an ERP for IT.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

Mitchell, E. (2010). Using cloud services for library IT infrastructure. Code4lib journal, 9, 3-22.

Ramgovind, S., Eloff, M. M., & Smith, E. (2010, August). The management of security in cloud computing. In Information Security for South Africa (ISSA), 2010 (pp. 1-7). IEEE.

Redlich, R. M., & Nemzow, M. A. (2015). U.S. Patent No. 9,015,301. Washington, DC: U.S. Patent and Trademark Office.

Sellers, R. E., Guillot, J., Carter, G. H., Atkins, N. W., Pausback, N. J., Engle, M. R., … & Ballard, W. H. (2014). U.S. Patent No. 8,725,853. Washington, DC: U.S. Patent and Trademark Office.

Sheppard, R. F. (2012). U.S. Patent No. 8,285,578. Washington, DC: U.S. Patent and Trademark Office.

Sobol, M. G., & Klein, G. (2009). Relation of CIO background, IT infrastructure, and economic performance. Information & Management, 46(5), 271-278.

Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. IEEE Internet computing, 13(5).

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.

Wu, J., Ping, L., Ge, X., Wang, Y., & Fu, J. (2010, June). Cloud storage as the infrastructure of cloud computing. In Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on (pp. 380-383). IEEE.

Xue, L., Ray, G., & Gu, B. (2011). Environmental uncertainty and IT infrastructure governance: A curvilinear relationship. Information Systems Research, 22(2), 389-399.

Yuriyama, M., & Kushida, T. (2010, September). Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing. In 2010 13th International Conference on Network-Based Information Systems (pp. 1-8). IEEE.