Towards an understanding of cloud computing's impact on organizational IT strategy
R Qian, P Palvia - Journal of Information Technology Case and …, 2013 - Taylor & Francis
… IT strategy. According to a recent survey conducted by Enterprise Strategy Group (ESG), 72%
… their companies' IT strategy in the coming five years (Lundell, McKnight and Gahm, 2011). …
… their companies' IT strategy in the coming five years (Lundell, McKnight and Gahm, 2011). …
Benefits of Web Applications Security Testing for on Sri Lankan SMEs
MDA Kavindya, OMB Jayasundera, TL Guruge… - …, 2014 - search.proquest.com
… were explained on behalf of Enterprise Strategy Group (ESG). Through the research …
Questionnaire was targeted to a particular audience who are currently working in the business …
Questionnaire was targeted to a particular audience who are currently working in the business …
Read-performance optimization for deduplication-based storage systems in the cloud
… Our preliminary experimental study on the virtual machine disk images reveals that the …
[Xiao and Yang 2008], and 48% of organizations need to reduce recovery times [ESG 2008]. In …
[Xiao and Yang 2008], and 48% of organizations need to reduce recovery times [ESG 2008]. In …
Can small users recover from the cloud?
R Clarke - Computer law & security review, 2017 - Elsevier
… during the period during which this study was undertaken. The following segments are
proposed as a means of identifying potential objects of study, based on examples and partial …
proposed as a means of identifying potential objects of study, based on examples and partial …
Exploiting workload characteristics and service diversity to improve the availability of cloud storage systems
… A study conducted by ESG (Enterprise Strategy Group) … can achieve equivalent levels of data
protection while using less … with a large volume of active data, objects accessed frequently, …
protection while using less … with a large volume of active data, objects accessed frequently, …
How do technical companies use microblogging?
S Zhang - 2015 - essay.utwente.nl
… The goal of this study is to present a thorough understanding of the status of microblogging
usage of the technical companies. It‘s to compare the Chinese and the Western technical …
usage of the technical companies. It‘s to compare the Chinese and the Western technical …
Analyst burnout in the cyber security operation center-CSOC: A phenomenological study
JL Hull - 2017 - search.proquest.com
… A survey based study of cyber security professionals Oltsik (2016) sponsored by the Enterprise
Strategy Group (ESG) points out that factors such as compensation are one consideration …
Strategy Group (ESG) points out that factors such as compensation are one consideration …
Extending V-model practices to support SRE to build secure web application
AA Abdulrazeg, NM Norwawi… - … Conference on Advanced …, 2014 - ieeexplore.ieee.org
Technological advancements and rapid growth in the use of the Internet by the society have
had a huge impact on information security. It has triggered the need for a major shift in the …
had a huge impact on information security. It has triggered the need for a major shift in the …
A value-based approach to the ex-ante evaluation of IT enabled business process improvement projects
RL Raschke, S Sen - Information & Management, 2013 - Elsevier
… be used as a guide to corporate strategy [12]. A subsequent study established that ABC is …
performance when it is used in conjunction with other strategic initiatives [8]. ABC can also be …
performance when it is used in conjunction with other strategic initiatives [8]. ABC can also be …
An overview of cloud based content delivery networks: Research dimensions and state-of-the-art
… cloud and CDN, in this paper, we present a comprehensive study of Cloud CDNs. We present
a state-of-the art survey on current commercial and research driven Cloud CDNs. We then …
a state-of-the art survey on current commercial and research driven Cloud CDNs. We then …