1. Taxonomy of technological IT outsourcing risks: Support for risk identification and quantification;Ackermann;Proceedings of the European Conference on Information Systems (ECIS),2011
2. Amazon.com. 2015. Introduction to Auditing the Use of AWS. Available at: http://d0.awsstatic.com/whitepapers/compliance/AWS_Auditing_Security_Checklist.pdf via website: http://aws.amazon.com/compliance/aws-whitepapers/ (last accessed March 16, 2016).
3. American Institute of Certified Public Accountants (AICPA). 2015. Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy (SOC 2®)-AICPA Guide. Available at: http://www.cpa2biz.com/AST/Main/CPA2BIZ_Primary/AuditAttest/IndustryspecificGuidance/PRDOVR∼PC-0128210/PC-0128210.jsp
4. ASEC/AICPA. 2014. Trust Services Principles, and Criteria. Available at: http://www.cpa2biz.com/AST/Main/CPA2BIZ_Primary/AuditAttest/Standards/PRDOVR∼PC-TSPC13/PC-TSPC13.jsp
5. Cooperation, coordination, and governance in multisourcing: An agenda for analytical and empirical research;Bapna;Information Systems Research,2010