M. Dlamini, J. Eloff, and M. Eloff, Information security: The moving target, Computers & Security, vol.28, issue.3-4, pp.189-198, 2009.
DOI : 10.1016/j.cose.2008.11.007

H. Armstrong and L. Yngström, Resubmit my Information Security Thesis? You must be joking! Proceedings of WISE5, 2007.

M. Siponen and H. Oinas-kukkonen, A Review of Information Security Issues and Respective Research Contributions, The Database for Advances in Information Systems, pp.60-80, 2007.

D. Binning, Top five cloud computing security issuesTop-five-cloud-computing- security-issues, 2009.

J. Brodkin, Gartner: Seven cloud-computing security risks, Network World, 2008.

B. R. Kandukuri, R. Paturi, and A. Rakshit, Cloud Security Issues, 2009 IEEE International Conference on Services Computing, 2009.
DOI : 10.1109/SCC.2009.84

N. Salek, Revealed: CISO's top security concerns, IT News, 2010.

W. Orlikowski and J. Baroudi, Studying Information Technology in Organizations: Research Approaches and Assumptions, Information Systems Research, vol.2, issue.1, pp.1-8, 1991.
DOI : 10.1287/isre.2.1.1

S. March and G. Smith, Design and natural science research on information technology, Decision Support Systems, vol.15, issue.4, pp.251-266, 1995.
DOI : 10.1016/0167-9236(94)00041-2

D. Veiga, A. Eloff, and J. , A framework and assessment instrument for information security culture, Computers & Security, vol.29, issue.2, pp.196-207, 2009.
DOI : 10.1016/j.cose.2009.09.002

G. Mullins and M. Kiley, 'It's a PhD, not a Nobel Prize': How experienced examiners assess research theses, Studies in Higher Education, vol.27, issue.4, pp.369-386, 2002.
DOI : 10.1080/030750700115993