Storage and Protection of Business Data 10
References
Alruwaili, F. F., & Gulliver, T. A. 2014., Safeguarding the Cloud: An Effective Risk
Management Framework for Cloud Computing Services.International Journal of
Computer Communications and Networks (IJCCN), 4(3), 6-16.
Baltzan, P., & Phillips, A. 2016., Business driven information systems. McGraw Hill Education.
Chavhan, N. B., Wankhade, P. J., & Tagalpallewar, S. K. (2013). Implementation of data leakage
detection & protection using allocation strategies. International Journal for Engineering
Applications and Technology, 174-181.
Coronel, C., & Morris, S., 2016. Database systems: design, implementation, & management.
Cengage Learning.
Debortoli, S., Müller, O., & vom Brocke, J., 2014. Comparing business intelligence and big data
skills. Business & Information Systems Engineering, 6(5), 289-300.
Demirkan, H., & Delen, D., 2013. Leveraging the capabilities of service-oriented decision
support systems: Putting analytics and big data in cloud. Decision Support
Systems, 55(1), 412-421.
Galliers, R. D., & Leidner, D. E., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Gibson, N., & Holland, G., 2014. A dual-database trusted broker system for resolving protecting
and utilizing multi-sourced data. In Information Quality and Governance for Business
Intelligence (pp. 352-362). IGI Global.
Jager, H. A., Monitzer, A., Rieken, R., Ernst, E., & Nguyen, K. D., 2014. Sealed cloud-a novel
approach to safeguard against insider attacks. InTrusted Cloud Computing (pp. 15-34).
Springer International Publishing.