1. Abokhodair, N., Taylor, H., Hasegawa, J., & Mowery, S. J. (2012). “Heading for the Clouds?” Implications for Cloud Computing Adopters. AMCIS 2012 Proceedings. Retrieved from 〈http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/6〉
2. Ackermann, T., Widjaja, T., Benlian, A., & Buxmann, P. (2012). Perceived IT Security Risks of Cloud Computing: Conceptualization and Scale Development. ICIS 2012 Proceedings. Retrieved from 〈http://aisel.aisnet.org/icis2012/proceedings/ISSecurity/3〉
3. China government expenditures, policies, and promotion of the ICT industry;Amiri;International Journal of Applied Science & Technology,2013
4. Archer, J. (1988). The Behavioral Biology of Aggression (Vol.1), CUP Archive. Retrieved from 〈http://psycnet.apa.org/psycinfo/1988-98128-000〉
5. A view of cloud computing;Armbrust;Communications of the ACM,2010