Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Opportunities and Challenges of Cloud Computing to Improve Health Care Services

Identifieur interne : 000555 ( Pmc/Corpus ); précédent : 000554; suivant : 000556

Opportunities and Challenges of Cloud Computing to Improve Health Care Services

Auteurs :

Source :

RBID : PMC:3222190

Abstract

Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed.


Url:
DOI: 10.2196/jmir.1867
PubMed: 21937354
PubMed Central: 3222190

Links to Exploration step

PMC:3222190

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Opportunities and Challenges of Cloud Computing to Improve Health Care Services</title>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">21937354</idno>
<idno type="pmc">3222190</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3222190</idno>
<idno type="RBID">PMC:3222190</idno>
<idno type="doi">10.2196/jmir.1867</idno>
<date when="2011">2011</date>
<idno type="wicri:Area/Pmc/Corpus">000555</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Opportunities and Challenges of Cloud Computing to Improve Health Care Services</title>
</analytic>
<series>
<title level="j">Journal of Medical Internet Research</title>
<idno type="eISSN">1438-8871</idno>
<imprint>
<date when="2011">2011</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct>
<analytic>
<author>
<name sortKey="Mell, P" uniqKey="Mell P">P Mell</name>
</author>
<author>
<name sortKey="Grance, T" uniqKey="Grance T">T Grance</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Brown, A" uniqKey="Brown A">A Brown</name>
</author>
<author>
<name sortKey="Weihl, B" uniqKey="Weihl B">B Weihl</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Armbrust, M" uniqKey="Armbrust M">M Armbrust</name>
</author>
<author>
<name sortKey="Fox, A" uniqKey="Fox A">A Fox</name>
</author>
<author>
<name sortKey="Griffith, R" uniqKey="Griffith R">R Griffith</name>
</author>
<author>
<name sortKey="Joseph, Ad" uniqKey="Joseph A">AD Joseph</name>
</author>
<author>
<name sortKey="Katz, R" uniqKey="Katz R">R Katz</name>
</author>
<author>
<name sortKey="Konwinski, A" uniqKey="Konwinski A">A Konwinski</name>
</author>
<author>
<name sortKey="Lee, G" uniqKey="Lee G">G Lee</name>
</author>
<author>
<name sortKey="Patterson, D" uniqKey="Patterson D">D Patterson</name>
</author>
<author>
<name sortKey="Rabkin, A" uniqKey="Rabkin A">A Rabkin</name>
</author>
<author>
<name sortKey="Stoica, I" uniqKey="Stoica I">I Stoica</name>
</author>
<author>
<name sortKey="Zaharia, M" uniqKey="Zaharia M">M Zaharia</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Li, Zj" uniqKey="Li Z">ZJ Li</name>
</author>
<author>
<name sortKey="Chen, C" uniqKey="Chen C">C Chen</name>
</author>
<author>
<name sortKey="Wang, K" uniqKey="Wang K">K Wang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Behrend, Ts" uniqKey="Behrend T">TS Behrend</name>
</author>
<author>
<name sortKey="Wiebe, En" uniqKey="Wiebe E">EN Wiebe</name>
</author>
<author>
<name sortKey="London, Je" uniqKey="London J">JE London</name>
</author>
<author>
<name sortKey="Johnson, Ec" uniqKey="Johnson E">EC Johnson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Chatman, C" uniqKey="Chatman C">C Chatman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dudley, Jt" uniqKey="Dudley J">JT Dudley</name>
</author>
<author>
<name sortKey="Pouliot, Y" uniqKey="Pouliot Y">Y Pouliot</name>
</author>
<author>
<name sortKey="Chen, R" uniqKey="Chen R">R Chen</name>
</author>
<author>
<name sortKey="Morgan, Aa" uniqKey="Morgan A">AA Morgan</name>
</author>
<author>
<name sortKey="Butte, Aj" uniqKey="Butte A">AJ Butte</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Schweitzer, Ej" uniqKey="Schweitzer E">EJ Schweitzer</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Haughton, J" uniqKey="Haughton J">J Haughton</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kabachinski, J" uniqKey="Kabachinski J">J Kabachinski</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rosenthal, A" uniqKey="Rosenthal A">A Rosenthal</name>
</author>
<author>
<name sortKey="Mork, P" uniqKey="Mork P">P Mork</name>
</author>
<author>
<name sortKey="Li, Mh" uniqKey="Li M">MH Li</name>
</author>
<author>
<name sortKey="Stanford, J" uniqKey="Stanford J">J Stanford</name>
</author>
<author>
<name sortKey="Koester, D" uniqKey="Koester D">D Koester</name>
</author>
<author>
<name sortKey="Reynolds, P" uniqKey="Reynolds P">P Reynolds</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Anderson, Nr" uniqKey="Anderson N">NR Anderson</name>
</author>
<author>
<name sortKey="Lee, Es" uniqKey="Lee E">ES Lee</name>
</author>
<author>
<name sortKey="Brockenbrough, Js" uniqKey="Brockenbrough J">JS Brockenbrough</name>
</author>
<author>
<name sortKey="Minie, Me" uniqKey="Minie M">ME Minie</name>
</author>
<author>
<name sortKey="Fuller, S" uniqKey="Fuller S">S Fuller</name>
</author>
<author>
<name sortKey="Brinkley, J" uniqKey="Brinkley J">J Brinkley</name>
</author>
<author>
<name sortKey="Tarczy Hornoch, P" uniqKey="Tarczy Hornoch P">P Tarczy-Hornoch</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dudley, Jt" uniqKey="Dudley J">JT Dudley</name>
</author>
<author>
<name sortKey="Butte, Aj" uniqKey="Butte A">AJ Butte</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wall, Dp" uniqKey="Wall D">DP Wall</name>
</author>
<author>
<name sortKey="Kudtarkar, P" uniqKey="Kudtarkar P">P Kudtarkar</name>
</author>
<author>
<name sortKey="Fusaro, Va" uniqKey="Fusaro V">VA Fusaro</name>
</author>
<author>
<name sortKey="Pivovarov, R" uniqKey="Pivovarov R">R Pivovarov</name>
</author>
<author>
<name sortKey="Patil, P" uniqKey="Patil P">P Patil</name>
</author>
<author>
<name sortKey="Tonellato, Pj" uniqKey="Tonellato P">PJ Tonellato</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Schatz, Mc" uniqKey="Schatz M">MC Schatz</name>
</author>
<author>
<name sortKey="Langmead, B" uniqKey="Langmead B">B Langmead</name>
</author>
<author>
<name sortKey="Salzberg, Sl" uniqKey="Salzberg S">SL Salzberg</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Avila Garcia, Ms" uniqKey="Avila Garcia M">MS Avila-Garcia</name>
</author>
<author>
<name sortKey="Trefethen, Ae" uniqKey="Trefethen A">AE Trefethen</name>
</author>
<author>
<name sortKey="Brady, M" uniqKey="Brady M">M Brady</name>
</author>
<author>
<name sortKey="Gleeson, F" uniqKey="Gleeson F">F Gleeson</name>
</author>
<author>
<name sortKey="Goodman, D" uniqKey="Goodman D">D Goodman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bateman, A" uniqKey="Bateman A">A Bateman</name>
</author>
<author>
<name sortKey="Wood, M" uniqKey="Wood M">M Wood</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kudtarkar, P" uniqKey="Kudtarkar P">P Kudtarkar</name>
</author>
<author>
<name sortKey="Deluca, Tf" uniqKey="Deluca T">TF Deluca</name>
</author>
<author>
<name sortKey="Fusaro, Va" uniqKey="Fusaro V">VA Fusaro</name>
</author>
<author>
<name sortKey="Tonellato, Pj" uniqKey="Tonellato P">PJ Tonellato</name>
</author>
<author>
<name sortKey="Wall, Dp" uniqKey="Wall D">DP Wall</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Memon, Fn" uniqKey="Memon F">FN Memon</name>
</author>
<author>
<name sortKey="Owen, Am" uniqKey="Owen A">AM Owen</name>
</author>
<author>
<name sortKey="Sanchez Graillet, O" uniqKey="Sanchez Graillet O">O Sanchez-Graillet</name>
</author>
<author>
<name sortKey="Upton, Gj" uniqKey="Upton G">GJ Upton</name>
</author>
<author>
<name sortKey="Harrison, Ap" uniqKey="Harrison A">AP Harrison</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Vaquero, Lm" uniqKey="Vaquero L">LM Vaquero</name>
</author>
<author>
<name sortKey="Rodero Merino, L" uniqKey="Rodero Merino L">L Rodero-Merino</name>
</author>
<author>
<name sortKey="Caceres, J" uniqKey="Caceres J">J Caceres</name>
</author>
<author>
<name sortKey="Lindner, M" uniqKey="Lindner M">M Lindner</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Iyer, B" uniqKey="Iyer B">B Iyer</name>
</author>
<author>
<name sortKey="Henderson, Jc" uniqKey="Henderson J">JC Henderson</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Vouk, Ma" uniqKey="Vouk M">MA Vouk</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Han, Y" uniqKey="Han Y">Y Han</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cervone, Hf" uniqKey="Cervone H">HF Cervone</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Sittig, Df" uniqKey="Sittig D">DF Sittig</name>
</author>
<author>
<name sortKey="Singh, H" uniqKey="Singh H">H Singh</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wang, X" uniqKey="Wang X">X Wang</name>
</author>
<author>
<name sortKey="Tan, Y" uniqKey="Tan Y">Y Tan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="He, C" uniqKey="He C">C He</name>
</author>
<author>
<name sortKey="Jin, X" uniqKey="Jin X">X Jin</name>
</author>
<author>
<name sortKey="Zhao, Z" uniqKey="Zhao Z">Z Zhao</name>
</author>
<author>
<name sortKey="Xiang, T" uniqKey="Xiang T">T Xiang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Botts, N" uniqKey="Botts N">N Botts</name>
</author>
<author>
<name sortKey="Thoms, B" uniqKey="Thoms B">B Thoms</name>
</author>
<author>
<name sortKey="Noamani, A" uniqKey="Noamani A">A Noamani</name>
</author>
<author>
<name sortKey="Horan, Ta" uniqKey="Horan T">TA Horan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Yang, Ct" uniqKey="Yang C">CT Yang</name>
</author>
<author>
<name sortKey="Chen, Lt" uniqKey="Chen L">LT Chen</name>
</author>
<author>
<name sortKey="Chou, Wl" uniqKey="Chou W">WL Chou</name>
</author>
<author>
<name sortKey="Wang, Kc" uniqKey="Wang K">KC Wang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Hoang, Db" uniqKey="Hoang D">DB Hoang</name>
</author>
<author>
<name sortKey="Chen, L" uniqKey="Chen L">L Chen</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Guo, L" uniqKey="Guo L">L Guo</name>
</author>
<author>
<name sortKey="Chen, F" uniqKey="Chen F">F Chen</name>
</author>
<author>
<name sortKey="Chen, L" uniqKey="Chen L">L Chen</name>
</author>
<author>
<name sortKey="Tang, X" uniqKey="Tang X">X Tang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Alagoz, F" uniqKey="Alagoz F">F Alagoz</name>
</author>
<author>
<name sortKey="Valdez, Ac" uniqKey="Valdez A">AC Valdez</name>
</author>
<author>
<name sortKey="Wilkowska, W" uniqKey="Wilkowska W">W Wilkowska</name>
</author>
<author>
<name sortKey="Ziefle, M" uniqKey="Ziefle M">M Ziefle</name>
</author>
<author>
<name sortKey="Dorner, S" uniqKey="Dorner S">S Dorner</name>
</author>
<author>
<name sortKey="Holzinger, A" uniqKey="Holzinger A">A Holzinger</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rolim, Co" uniqKey="Rolim C">CO Rolim</name>
</author>
<author>
<name sortKey="Koch, Fl" uniqKey="Koch F">FL Koch</name>
</author>
<author>
<name sortKey="Westphall, Cb" uniqKey="Westphall C">CB Westphall</name>
</author>
<author>
<name sortKey="Werner, J" uniqKey="Werner J">J Werner</name>
</author>
<author>
<name sortKey="Fracalossi, A" uniqKey="Fracalossi A">A Fracalossi</name>
</author>
<author>
<name sortKey="Salvador, Gs" uniqKey="Salvador G">GS Salvador</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Nkosi, Mt" uniqKey="Nkosi M">MT Nkosi</name>
</author>
<author>
<name sortKey="Mekuria, F" uniqKey="Mekuria F">F Mekuria</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Sundararaman, K" uniqKey="Sundararaman K">K Sundararaman</name>
</author>
<author>
<name sortKey="Parthasarathi, J" uniqKey="Parthasarathi J">J Parthasarathi</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Koufi, V" uniqKey="Koufi V">V Koufi</name>
</author>
<author>
<name sortKey="Malamateniou, F" uniqKey="Malamateniou F">F Malamateniou</name>
</author>
<author>
<name sortKey="Vassilacopoulos, G" uniqKey="Vassilacopoulos G">G Vassilacopoulos</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Arrais, Jp" uniqKey="Arrais J">JP Arrais</name>
</author>
<author>
<name sortKey="Oliveira, Jl" uniqKey="Oliveira J">JL Oliveira</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Strukhoff, R" uniqKey="Strukhoff R">R Strukhoff</name>
</author>
<author>
<name sortKey="O Gara, M" uniqKey="O Gara M">M O'Gara</name>
</author>
<author>
<name sortKey="Moon, N" uniqKey="Moon N">N Moon</name>
</author>
<author>
<name sortKey="Romanski, P" uniqKey="Romanski P">P Romanski</name>
</author>
<author>
<name sortKey="White, E" uniqKey="White E">E White</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Danek, J" uniqKey="Danek J">J Danek</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Avery, P" uniqKey="Avery P">P Avery</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cherry, S" uniqKey="Cherry S">S Cherry</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Bannerman, Pl" uniqKey="Bannerman P">PL Bannerman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Armbrust, M" uniqKey="Armbrust M">M Armbrust</name>
</author>
<author>
<name sortKey="Fox, A" uniqKey="Fox A">A Fox</name>
</author>
<author>
<name sortKey="Griffith, R" uniqKey="Griffith R">R Griffith</name>
</author>
<author>
<name sortKey="Joseph, Ad" uniqKey="Joseph A">AD Joseph</name>
</author>
<author>
<name sortKey="Katz, Rh" uniqKey="Katz R">RH Katz</name>
</author>
<author>
<name sortKey="Konwinski, A" uniqKey="Konwinski A">A Konwinski</name>
</author>
<author>
<name sortKey="Lee, G" uniqKey="Lee G">G Lee</name>
</author>
<author>
<name sortKey="Patterson, Da" uniqKey="Patterson D">DA Patterson</name>
</author>
<author>
<name sortKey="Rabkin, A" uniqKey="Rabkin A">A Rabkin</name>
</author>
<author>
<name sortKey="Stoica, I" uniqKey="Stoica I">I Stoica</name>
</author>
<author>
<name sortKey="Zaharia, M" uniqKey="Zaharia M">M Zaharia</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Everett, C" uniqKey="Everett C">C Everett</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jansen, W" uniqKey="Jansen W">W Jansen</name>
</author>
<author>
<name sortKey="Grance, T" uniqKey="Grance T">T Grance</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zhang, R" uniqKey="Zhang R">R Zhang</name>
</author>
<author>
<name sortKey="Liu, L" uniqKey="Liu L">L Liu</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Baliga, J" uniqKey="Baliga J">J Baliga</name>
</author>
<author>
<name sortKey="Ayre, Rwa" uniqKey="Ayre R">RWA Ayre</name>
</author>
<author>
<name sortKey="Hinton, K" uniqKey="Hinton K">K Hinton</name>
</author>
<author>
<name sortKey="Tucker, Rs" uniqKey="Tucker R">RS Tucker</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Durkee, D" uniqKey="Durkee D">D Durkee</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pearson, S" uniqKey="Pearson S">S Pearson</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Svantesson, D" uniqKey="Svantesson D">D Svantesson</name>
</author>
<author>
<name sortKey="Clarke, R" uniqKey="Clarke R">R Clarke</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mather, T" uniqKey="Mather T">T Mather</name>
</author>
<author>
<name sortKey="Kumaraswamy, S" uniqKey="Kumaraswamy S">S Kumaraswamy</name>
</author>
<author>
<name sortKey="Latif, S" uniqKey="Latif S">S Latif</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kuner, C" uniqKey="Kuner C">C Kuner</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ward, Bt" uniqKey="Ward B">BT Ward</name>
</author>
<author>
<name sortKey="Sipior, Jc" uniqKey="Sipior J">JC Sipior</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cavoukian, A" uniqKey="Cavoukian A">A Cavoukian</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Marks, Ea" uniqKey="Marks E">EA Marks</name>
</author>
<author>
<name sortKey="Lozano, B" uniqKey="Lozano B">B Lozano</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Stanoevska Slabeva, K" uniqKey="Stanoevska Slabeva K">K Stanoevska-Slabeva</name>
</author>
<author>
<name sortKey="Wozniak, T" uniqKey="Wozniak T">T Wozniak</name>
</author>
<author>
<name sortKey="Hoyer, V" uniqKey="Hoyer V">V Hoyer</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kuo, Am" uniqKey="Kuo A">AM Kuo</name>
</author>
<author>
<name sortKey="Borycki, E" uniqKey="Borycki E">E Borycki</name>
</author>
<author>
<name sortKey="Kushniruk, A" uniqKey="Kushniruk A">A Kushniruk</name>
</author>
<author>
<name sortKey="Lee, Ts" uniqKey="Lee T">TS Lee</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lee, Ts" uniqKey="Lee T">TS Lee</name>
</author>
<author>
<name sortKey="Kuo, Mh" uniqKey="Kuo M">MH Kuo</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Marston, S" uniqKey="Marston S">S Marston</name>
</author>
<author>
<name sortKey="Li, Z" uniqKey="Li Z">Z Li</name>
</author>
<author>
<name sortKey="Bandyopadhyay, S" uniqKey="Bandyopadhyay S">S Bandyopadhyay</name>
</author>
<author>
<name sortKey="Zhang, J" uniqKey="Zhang J">J Zhang</name>
</author>
<author>
<name sortKey="Ghalsasi, A" uniqKey="Ghalsasi A">A Ghalsasi</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Buyya, R" uniqKey="Buyya R">R Buyya</name>
</author>
<author>
<name sortKey="Ranjan, R" uniqKey="Ranjan R">R Ranjan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kuo, Mh" uniqKey="Kuo M">MH Kuo</name>
</author>
<author>
<name sortKey="Kushniruk, Aw" uniqKey="Kushniruk A">AW Kushniruk</name>
</author>
<author>
<name sortKey="Borycki, Em" uniqKey="Borycki E">EM Borycki</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gagliardi, F" uniqKey="Gagliardi F">F Gagliardi</name>
</author>
<author>
<name sortKey="Muscella, S" uniqKey="Muscella S">S Muscella</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Creeger, M" uniqKey="Creeger M">M Creeger</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fox, A" uniqKey="Fox A">A Fox</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
<journal-id journal-id-type="publisher-id">JMIR</journal-id>
<journal-title-group>
<journal-title>Journal of Medical Internet Research</journal-title>
</journal-title-group>
<issn pub-type="epub">1438-8871</issn>
<publisher>
<publisher-name>Gunther Eysenbach</publisher-name>
<publisher-loc>JMIR Publications Inc., Toronto, Canada</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">21937354</article-id>
<article-id pub-id-type="pmc">3222190</article-id>
<article-id pub-id-type="publisher-id">v13i3e67</article-id>
<article-id pub-id-type="doi">10.2196/jmir.1867</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Viewpoint</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Opportunities and Challenges of Cloud Computing to Improve Health Care Services</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="editor">
<name>
<surname>Eysenbach</surname>
<given-names>Gunther</given-names>
</name>
</contrib>
</contrib-group>
<contrib-group>
<contrib contrib-type="reviewer">
<name>
<surname>Mork</surname>
<given-names>Peter</given-names>
</name>
</contrib>
<contrib contrib-type="reviewer">
<name>
<surname>Kimura</surname>
<given-names>Eizen</given-names>
</name>
</contrib>
<contrib contrib-type="reviewer">
<name>
<surname>Reynolds</surname>
<given-names>Carl</given-names>
</name>
</contrib>
<contrib contrib-type="reviewer">
<name>
<surname>Lai</surname>
<given-names>Feipei</given-names>
</name>
</contrib>
</contrib-group>
<contrib-group>
<contrib id="contrib1" contrib-type="author" corresp="yes">
<name>
<surname>Kuo</surname>
<given-names>Alex Mu-Hsing</given-names>
</name>
<degrees>PhD</degrees>
<xref ref-type="aff" rid="aff1">1</xref>
<address>
<institution>School of Health Information Science</institution>
<institution>University of Victoria</institution>
<addr-line>PO Box 3050 STN CSC</addr-line>
<addr-line>Victoria, BC, V8W 3P5</addr-line>
<country>Canada</country>
<phone>1 250 4724300</phone>
<fax>1 250 4724751</fax>
<email>akuo@uvic.ca</email>
</address>
</contrib>
</contrib-group>
<aff id="aff1" rid="aff1">
<sup>1</sup>
<institution>School of Health Information Science</institution>
<institution>University of Victoria</institution>
<addr-line>Victoria, BC</addr-line>
<country>Canada</country>
</aff>
<pub-date pub-type="collection">
<season>Jul-Sep</season>
<year>2011</year>
</pub-date>
<pub-date pub-type="epub">
<day>21</day>
<month>9</month>
<year>2011</year>
</pub-date>
<volume>13</volume>
<issue>3</issue>
<elocation-id>e67</elocation-id>
<history>
<date date-type="received">
<day>10</day>
<month>6</month>
<year>2011</year>
</date>
<date date-type="rev-request">
<day>02</day>
<month>7</month>
<year>2011</year>
</date>
<date date-type="rev-recd">
<day>10</day>
<month>8</month>
<year>2011</year>
</date>
<date date-type="accepted">
<day>25</day>
<month>8</month>
<year>2011</year>
</date>
</history>
<permissions>
<copyright-statement>©Alex Mu-Hsing Kuo. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 21.09.2011. </copyright-statement>
<copyright-year>2011</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
<license-p>
<pmc-comment>CREATIVE COMMONS</pmc-comment>
This is an open-access article distributed under the terms of the Creative Commons Attribution License (
<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/2.0/">http://creativecommons.org/licenses/by/2.0/</ext-link>
), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on
<ext-link ext-link-type="uri" xlink:href="http://www.jmir.org/,">http://www.jmir.org/,</ext-link>
as well as this copyright and license information must be included.</license-p>
</license>
</permissions>
<self-uri xlink:type="simple" xlink:href="http://www.jmir.org/2011/3/e67/"></self-uri>
<abstract>
<p>Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed.</p>
</abstract>
<kwd-group>
<kwd>Health care</kwd>
<kwd>electronic health record</kwd>
<kwd>cloud computing</kwd>
<kwd>bioinformatics</kwd>
<kwd>quality improvement</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec>
<title>Introduction</title>
<p>Cloud computing refers to an on-demand, self-service Internet infrastructure that enables the user to access computing resources anytime from anywhere [
<xref ref-type="bibr" rid="ref1">1</xref>
]. It is a new model of delivering computing resources, not a new technology. Examples of commonly used non-health care applications include Microsoft Hotmail and Google Docs, while some better known applications in health care include Microsoft HealthVault and Google Health platform (recently discontinued [
<xref ref-type="bibr" rid="ref2">2</xref>
]). However, compared with conventional computing, this model provides three new advantages: massive computing resources available on demand, elimination of an up-front commitment by users, and payment for use on a short-term basis as needed [
<xref ref-type="bibr" rid="ref3">3</xref>
]. Several articles, forums, and blogs have reported its applications in industry, business, transportation, education, and national security [
<xref ref-type="bibr" rid="ref4">4</xref>
-
<xref ref-type="bibr" rid="ref7">7</xref>
].</p>
<p>Health care, as with any other service operation, requires continuous and systematic innovation in order to remain cost effective, efficient, and timely, and to provide high-quality services. Many managers and experts predict that cloud computing can improve health care services, benefit health care research, and change the face of information technology (IT) [
<xref ref-type="bibr" rid="ref8">8</xref>
-
<xref ref-type="bibr" rid="ref13">13</xref>
]. For example, Schweitzer [
<xref ref-type="bibr" rid="ref10">10</xref>
], Haughton [
<xref ref-type="bibr" rid="ref11">11</xref>
], and Kabachinski [
<xref ref-type="bibr" rid="ref12">12</xref>
] believe that cloud computing can reduce electronic health record (EHR) startup expenses, such as hardware, software, networking, personnel, and licensing fees, and therefore will encourage its adoption. Research by Rosenthal et al shows that the biomedical informatics community, especially consortiums that share data and applications, can take advantage of the new computing paradigm [
<xref ref-type="bibr" rid="ref13">13</xref>
]. As indicated in the paper by Anderson et al, data-handling problems, complexity, and expensive or unavailable computational solutions to research problems are major issues in biomedical research data management and analysis [
<xref ref-type="bibr" rid="ref14">14</xref>
]. Several informatics innovations have demonstrated that cloud computing has the potential to overcome these difficulties [
<xref ref-type="bibr" rid="ref15">15</xref>
-
<xref ref-type="bibr" rid="ref21">21</xref>
].</p>
<p>Despite the many benefits associated with cloud computing applications for health care, there are also several management, technology, security, and legal issues to be addressed. The aim of this paper is to discuss the concept of cloud computing, its current applications in health care, the challenges and opportunities, and how to implement strategic planning when the organization has decided to move to the new model of service.</p>
</sec>
<sec>
<title>Cloud Computing: A New Economic Computing Model</title>
<p>Cloud computing is still a developing paradigm, and its definition, attributes, and characteristics will evolve over time. Vaquero et al studied more than 20 definitions and tried to extract a consensus definition as well as a minimum definition containing the essential characteristics. Based on the study, they defined cloud computing as follows [
<xref ref-type="bibr" rid="ref22">22</xref>
]:</p>
<disp-quote>
<p>Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically re-configured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customizedService-Level Agreements.</p>
</disp-quote>
<p>From a service point of view, cloud computing includes 3 archetypal models: software, platform, and infrastructure [
<xref ref-type="bibr" rid="ref1">1</xref>
,
<xref ref-type="bibr" rid="ref23">23</xref>
-
<xref ref-type="bibr" rid="ref25">25</xref>
]. </p>
<p>(1)
<italic>Software as a service (SaaS):</italic>
The applications (eg, EHRs) are hosted by a cloud service provider and made available to customers over a network, typically the Internet.</p>
<p>(2)
<italic>Platform as a service (PaaS):</italic>
The development tools (eg, operation systems) are hosted in the cloud and accessed through a browser. With PaaS, developers can build Web applications without installing any tools on their computer, and then deploy those applications without any specialized administrative skills.</p>
<p>(3)
<italic>Infrastructure as a service (IaaS):</italic>
The cloud user outsources the equipment used to support operations, including storage, hardware, servers, and networking components. The provider owns the equipment and is responsible for housing, running, and maintaining it. The user typically pays on a per-use basis.</p>
<p>To deploy cloud computing, the US National Institute of Standards and Technology (NIST) listed 4 models (see
<xref ref-type="fig" rid="figure1">Figure 1</xref>
) [
<xref ref-type="bibr" rid="ref1">1</xref>
,
<xref ref-type="bibr" rid="ref26">26</xref>
]:</p>
<p>(1)
<italic>Public cloud:</italic>
A cloud service provider makes resources (applications and storage) available to the general public over the Internet on a pay-as-you-go basis. For example, the Amazon Elastic Compute Cloud (EC2) allows users to rent virtual computers on which to run their own applications. EC2 runs within Amazon’s network infrastructure and data centers and allows customers to pay only for what they use with no minimum fee.</p>
<p>(2)
<italic>Private cloud:</italic>
A cloud infrastructure is operated solely for a single organization. In other words, the proprietary network or the data center supplies hosted services to a certain group of people. For example, Microsoft Azure enables customers to build the foundation for a private cloud infrastructure using Windows Server and System Center family of products with the Dynamic Data Center Toolkit. </p>
<p>(3)
<italic>Community cloud:</italic>
The cloud infrastructure is shared by several organizations with common concerns (eg, mission, security requirements, policy, and compliance considerations). For example, the Google GovCloud provides the Los Angeles City Council with a segregated data environment to store its applications and data that are accessible only to the city’s agencies.</p>
<p>(4)
<italic>Hybrid cloud:</italic>
The cloud infrastructure comprises 2 or more clouds (private, public, or community). In this infrastructure, an organization provides and manages some resources within its own data center and has others provided externally. For example, IBM collaborates with Juniper Networks to provide a hybrid cloud infrastructure to enterprises to seamlessly extend their private clouds to remote servers in a secure public cloud [
<xref ref-type="bibr" rid="ref27">27</xref>
].</p>
<fig id="figure1" position="float">
<label>Figure 1</label>
<caption>
<p>The cloud computing deployment models.</p>
</caption>
<graphic xlink:href="jmir_v13i3e67_fig1"></graphic>
</fig>
</sec>
<sec>
<title>Status and Adoption of Cloud Computing in Health Care</title>
<p>Many previous studies reported the potential benefits of cloud computing and proposed different models or frameworks in an attempt to improve health care service [
<xref ref-type="bibr" rid="ref28">28</xref>
-
<xref ref-type="bibr" rid="ref35">35</xref>
]. Among them, Rolim et al proposed a cloud-based system to automate the process of collecting patients’ vital data via a network of sensors connected to legacy medical devices, and to deliver the data to a medical center’s “cloud” for storage, processing, and distribution. The main benefits of the system are that it provides users with 7-days-a-week, real-time data collecting, eliminates manual collection work and the possibility of typing errors, and eases the deployment process [
<xref ref-type="bibr" rid="ref36">36</xref>
]. Nkosi and Mekuria described a cloud computing protocol management system that provides multimedia sensor signal processing and security as a service to mobile devices. The system has relieved mobile devices from executing heavier multimedia and security algorithms in delivering mobile health services. This will improve the utilization of the ubiquitous mobile device for societal services and promote health service delivery to marginalized rural communities [
<xref ref-type="bibr" rid="ref37">37</xref>
]. Rao et al reported a pervasive cloud initiative called Dhatri, which leveraged the power of cloud computing and wireless technologies to enable physicians to access patient health information at anytime from anywhere [
<xref ref-type="bibr" rid="ref38">38</xref>
]. Koufi et al described a cloud-based prototype emergency medical system for the Greek National Health Service integrating the emergency system with personal health record systems to provide physicians with easy and immediate access to patient data from anywhere and via almost any computing device while containing costs [
<xref ref-type="bibr" rid="ref39">39</xref>
].</p>
<p>Numerous of articles and resources also reported the successful application of cloud computing in bioinformatics research [
<xref ref-type="bibr" rid="ref15">15</xref>
-
<xref ref-type="bibr" rid="ref21">21</xref>
,
<xref ref-type="bibr" rid="ref40">40</xref>
,
<xref ref-type="bibr" rid="ref41">41</xref>
]. For example, Avila-Garcia et al proposed a framework based on the cloud computing concept for colorectal cancer imaging analysis and research for clinical use [
<xref ref-type="bibr" rid="ref18">18</xref>
]. Bateman and Wood used Amazon’s EC2 service with 100 nodes to assemble a full human genome with 140 million individual reads requiring alignment using a sequence search and alignment by hashing (SSAHA) algorithm [
<xref ref-type="bibr" rid="ref19">19</xref>
]. Kudtarkar et al also used Amazon’s EC2 to compute orthologous relationships for 245,323 genome-to-genome comparisons. The computation took just over 200 hours and cost US $8,000, approximately 40% less than expected [
<xref ref-type="bibr" rid="ref20">20</xref>
]. Memom et al applied cloud computing to evaluate the impact of G-quadruplexes on Affymetrix arrays [
<xref ref-type="bibr" rid="ref21">21</xref>
]. The Laboratory for Personalized Medicine of the Center for Biomedical Informatics at Harvard Medical School took the benefits of cloud computing to develop genetic testing models that managed to manipulate enormous amounts of data in record time [
<xref ref-type="bibr" rid="ref41">41</xref>
].</p>
<p>Besides academic researchers, many world-class software companies have heavily invested in the cloud, extending their new offerings for medical records services, such as Microsoft’s HealthVault, Oracle’s Exalogic Elastic Cloud, and Amazon Web Services (AWS), promising an explosion in the storage of personal health information online. Also, the use of health cloud computing is reported worldwide. For example, the AWS plays host to a collection of health care IT offerings, such as Salt Lake City-based Spearstone’s health care data storage application, and DiskAgent uses Amazon Simple Storage Service (Amazon S3) as its scalable storage infrastructure [
<xref ref-type="bibr" rid="ref42">42</xref>
].</p>
<p>The American Occupational Network is improving patient care by digitizing health records and updating its clinical processes using cloud-based software from IBM Business Partners MedTrak Systems. The company now can provide faster and more accurate billing to individuals and insurance companies, shortening the average time to create a bill from 7 days to less than 24 hours, and reducing medical transcription costs by 80% [
<xref ref-type="bibr" rid="ref43">43</xref>
].</p>
<p>The US Department of Health & Human Services’ Office of the National Coordinator for Health Information Technology recently chose Acumen Solutions’ cloud-based customer relationship management and project management system for the selection and implementation of EHR systems across the United States. The software enables regional extension centers to manage interactions with medical providers related to the selection and implementation of an EHR system [
<xref ref-type="bibr" rid="ref44">44</xref>
].</p>
<p>Telstra and the Royal Australian College of General Practitioners announced the signing of an agreement to work together to build an eHealth cloud. Telstra is one of the leading telecommunications providers in Australia; the College is the largest general practice representative body in Australia with more than 20,000 members and over 7000 in its National Rural Faculty. The eHealth cloud will host health care applications including clinical software, decision-support tools for diagnosis and management, care plans, referral tools, prescriptions, training, and other administrative and clinical services [
<xref ref-type="bibr" rid="ref45">45</xref>
].</p>
<p>In Europe, a consortium including IBM, Sirrix AG security technologies, Portuguese energy and solution providers Energias de Portugal and EFACEC, San Raffaele Hospital (Italy), and several European academic and corporate research organizations contracted Trustworthy Clouds—a patient-centered home health care service—to remotely monitor, diagnose, and assist patients outside of a hospital setting. The complete lifecycle, from prescription to delivery to intake to reimbursement, will be stored in the cloud and will be accessible to patients, doctors, and pharmacy staff [
<xref ref-type="bibr" rid="ref46">46</xref>
].</p>
</sec>
<sec>
<title>Health Cloud Computing Opportunities and Challenges</title>
<p>Recent research indicates that 75% of chief information officers reported that they will need and use cloud computing in the near future [
<xref ref-type="bibr" rid="ref47">47</xref>
,
<xref ref-type="bibr" rid="ref48">48</xref>
]. The forecast, conducted by Mark Beccue, suggested that the number of people subscribing to mobile cloud applications will rise from 71 million to nearly a billion by 2014 [
<xref ref-type="bibr" rid="ref49">49</xref>
]. In health sectors, many organizations, managers, and experts believe that the cloud computing approach can also improve services and benefit research [
<xref ref-type="bibr" rid="ref8">8</xref>
-
<xref ref-type="bibr" rid="ref13">13</xref>
]. In addition, a report by the European Network and Information Security Agency (ENISA) stated that this new computing model is set to see massive global investment in many sectors, including health care [
<xref ref-type="bibr" rid="ref50">50</xref>
]. The report also estimated that, by 2013, US $44 billion will be spent worldwide on cloud computing, potentially providing huge benefits to health care.</p>
<p>As with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. Few research papers have systematically studied the impact of cloud computing on health care IT in terms of its opportunities and challenges. This study reviews the literature and evaluates the opportunities and challenges from the viewpoint of management, technology, security, and legality (see
<xref ref-type="table" rid="table1">Table 1</xref>
).</p>
<table-wrap id="table1" position="float">
<label>Table 1</label>
<caption>
<p>Cloud computing opportunity and challenge summary</p>
</caption>
<table frame="hsides" rules="groups" cellpadding="8" cellspacing="0" border="1" width="1000">
<col width="200" span="1"></col>
<col width="400" span="1"></col>
<col width="400" span="1"></col>
<thead>
<tr valign="top">
<td rowspan="1" colspan="1">Aspects</td>
<td rowspan="1" colspan="1">Opportunities</td>
<td rowspan="1" colspan="1">Challenges</td>
</tr>
</thead>
<tbody>
<tr valign="top">
<td rowspan="1" colspan="1">Management</td>
<td rowspan="1" colspan="1">Lower cost of new IT
<sup>a</sup>
infrastructure</td>
<td rowspan="1" colspan="1">Lack of trust by health care professionals</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Computing resources available on demand</td>
<td rowspan="1" colspan="1">Organizational inertia</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Payment of use on a short-term basis as needed</td>
<td rowspan="1" colspan="1">Loss of governance</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Uncertain provider’s compliance</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1">Technology</td>
<td rowspan="1" colspan="1">Reduction of IT
<sup>a</sup>
maintenance burdens</td>
<td rowspan="1" colspan="1">Resource exhaustion issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Scalability and flexibility of infrastructure</td>
<td rowspan="1" colspan="1">Unpredictable performance</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Advantage for green computing</td>
<td rowspan="1" colspan="1">Data lock-in</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Data transfer bottlenecks</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Bugs in large-scale distributed cloud systems</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1">Security</td>
<td rowspan="1" colspan="1">More resources available for data protection</td>
<td rowspan="1" colspan="1">Separation failure</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Replication of data in multiple locations increasing data security</td>
<td rowspan="1" colspan="1">Public management interface issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Dynamically scaled defensive resources strengthening resilience</td>
<td rowspan="1" colspan="1">Poor encryption key management</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Privilege abuse</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1">Legal</td>
<td rowspan="1" colspan="1">Provider’s commitments to protect customer’s data and privacy</td>
<td rowspan="1" colspan="1">Data jurisdiction issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Development of guidelines and technologies to enable the construction of trusted platforms by not-for-profit organizations</td>
<td rowspan="1" colspan="1">Privacy issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Fostering of regulations by government for data and privacy protection</td>
<td rowspan="1" colspan="1"></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table1fn1">
<p>
<sup>a</sup>
Information technology.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<sec>
<title>Management Aspect</title>
<sec>
<title>Opportunity</title>
<p>The principle advantage of cloud computing is its low cost. For example, Amazon charges only US $0.1 per hour for 1.0-GHz × 86 instruction set architecture “slices” of EC2. Amazon S3 charges US $0.12 to $0.15 per gigabyte-month, with additional bandwidth charges of US $0.10 to $0.15 per gigabyte to move data into and out of AWS over the Internet [
<xref ref-type="bibr" rid="ref51">51</xref>
]. An organization can easily get a cost-effective and on-premise IT solution through cloud computing without the need to purchase or evaluate hardware or software, or to hire internal IT staff to maintain and service in-house infrastructure [
<xref ref-type="bibr" rid="ref20">20</xref>
,
<xref ref-type="bibr" rid="ref41">41</xref>
,
<xref ref-type="bibr" rid="ref51">51</xref>
]. The result is that the organization can focus on critical tasks without having to incur additional costs with regard to IT staffing and training.</p>
<p>Also, the cloud computing approach speeds deployment while maintaining vital flexibility (ie, rapid elasticity and ubiquitous access to health resources). This capability means that, as demand changes, hospitals and other health care providers do not need to adjust their infrastructures to accommodate the changes.</p>
</sec>
<sec>
<title>Challenges</title>
<p>The main challenges include lack of trust in data security and privacy by users, organizational inertia, loss of governance, and uncertain provider’s compliance.</p>
<p>Trust is at the heart of the resistance that many customers have to the cloud [
<xref ref-type="bibr" rid="ref52">52</xref>
]. Concerns arise when their sensitive data and mission-critical applications move to a cloud computing paradigm where providers cannot guarantee the effectiveness of their security and privacy controls [
<xref ref-type="bibr" rid="ref53">53</xref>
].</p>
<p>Cultural resistance (ie, organizational inertia) to share data and change traditional ways of working is a common management challenge to adopting cloud computing.</p>
<p>In some cases, a service level agreement may not offer a commitment to allow the client to audit its data. The loss of data governance could have a severe impact on a cloud user’s strategy and therefore on the capacity to meet its mission and goals.</p>
<p>Finally, if a provider cannot meet the requisite compliance norms (eg, applicable laws, regulations, standards, contracts, or policy changes), then a customer’s investment may be at risk. In some cases, certain customer services (eg, credit card transactions) cannot be used [
<xref ref-type="bibr" rid="ref54">54</xref>
].</p>
</sec>
</sec>
<sec>
<title>Technology Aspect</title>
<sec>
<title>Opportunity</title>
<p>Smaller hospitals, medical practices, and laboratories typically do not have internal IT staff to maintain and service in-house infrastructure for mission-critical applications such as EHRs. Therefore, eliminating the new infrastructure cost and the IT maintenance burdens can remove many obstacles to EHR adoption [
<xref ref-type="bibr" rid="ref10">10</xref>
,
<xref ref-type="bibr" rid="ref55">55</xref>
]. For bigger health organizations, placing data storage or IT application needs in the hands of a cloud provider essentially shifts the IT management burden to a third-party provider. From an IT management’s point of view, cloud computing can increase the scalability, flexibility, and cost effectiveness of infrastructure.</p>
<p>Also, cloud computing has advantages for so-called
<italic>green computing</italic>
—the more efficient use of computer resources to help the environment and promote energy saving. Usage of ready-made computing resources tailored to an organization’s needs certainly helps it to reduce electricity expenses. While it saves on electricity, it also saves on resources required to cool off computers and other components. This reduces the emission of dangerous materials into the environment [
<xref ref-type="bibr" rid="ref56">56</xref>
].</p>
</sec>
<sec>
<title>Challenges</title>
<p>Several technical challenges related to the use of cloud computing include resource exhaustion, unpredictability of performance, data lock-in, data transfer bottlenecks, and bugs in large-scale distributed cloud systems.</p>
<p>Low cost and computing resources available on demand are two key features of cloud computing. However, the market is becoming crowded with large providers. Because of high competition, many cloud providers overcommit computing resources (eg, central processing unit [CPU] allocation, storage space, applications) to attract customers. In order to maintain the profit, they cut corners in the value-delivery system. For example, they may limit access to the cloud resources, or use out-of-date hardware or software or deploy older CPU technology. Unfortunately, most cloud customers are unable to govern the virtual architecture, and the providers usually do not permit an audit by the customers. The result is variable leading to unpredictable performance in the service [
<xref ref-type="bibr" rid="ref57">57</xref>
]. This difference between the customer’s expectation and what the provider can really deliver presents a major technical challenge for the cloud customer to provide high-quality service to its own users.</p>
<p>Data lock-in is also an important challenge. In some cases, cloud users may have to move data or services to another provider or back to an in-house IT environment because the provider ceases business or service operations. For example, Google decided to discontinue its Google Health service on January 1, 2012. Users have a year to download their health data [
<xref ref-type="bibr" rid="ref2">2</xref>
]. Unfortunately, most cloud infrastructures provide very little capability on data, application, and service interoperability [
<xref ref-type="bibr" rid="ref51">51</xref>
]. This makes it difficult for a customer to migrate from one provider to another, or move data and services back to an in-house IT environment.</p>
<p>Some cloud users (eg, biomedical research laboratories) may need to frequently upload to or download very large amounts of data from the cloud. Application users may find that there is a data transfer bottleneck because of physical networking bandwidth limitation. Another specific technical risk is that of bugs in large-scale distributed cloud systems. When compared with in-house IT systems, the errors in these very large distributed infrastructures are more difficult to debug [
<xref ref-type="bibr" rid="ref51">51</xref>
].</p>
</sec>
</sec>
<sec>
<title>Security Aspect</title>
<sec>
<title>Opportunity</title>
<p>Perhaps the strongest resistance to the adoption of cloud computing in health IT centers relates to data security [
<xref ref-type="bibr" rid="ref58">58</xref>
]. Nevertheless, compared with locally housed data, this model is not necessarily less secure. In some cases, it typically improves security because cloud providers (eg, Microsoft, Google, Amazon) are able to
<ext-link ext-link-type="uri" xlink:href="http://news.cnet.com/8301-1009_3-10150569-83.html">devote huge resources to solving security issues</ext-link>
that many customers cannot afford, in contrast to the destruction of many medical records and legal documents in the Japan 9.0 magnitude earthquake or the New Orleans Hurricane Katrina disaster. </p>
<p>All kinds of security measures, such as in hardware, software, human resources, and management costs, are cheaper when implemented on a large scale. Most cloud providers replicate users’ data in multiple locations. This increases data redundancy and independence from system failure and provides a level of disaster recovery. In addition, a cloud provider always has the ability to dynamically reallocate security resources for filtering, traffic shaping, or encryption in order to increase support for defensive measures (eg, against distributed denial-of-service attacks). The ability to dynamically scale defensive resources on demand has obvious advantages for resilience [
<xref ref-type="bibr" rid="ref54">54</xref>
].</p>
</sec>
<sec>
<title>Challenges</title>
<p>There are many data security risks in the use of IT, such as hacker attacks, network breaks, natural disasters, separation failure, public management interface, poor encryption key management, and privilege abuse. Specific risks to cloud computing are separation failure, public management interface, poor encryption key management, and privilege abuse.</p>
<p>Cloud computing is usually accessible to many different customers. If the provider fails to separate the resources, it could cause very serious security risks. For example, a customer requests to delete data stored in the virtual infrastructure; as with most operating systems, this may not result in true erasing of the data immediately. The data are still stored on the disk but are just not available [
<xref ref-type="bibr" rid="ref54">54</xref>
]. In the multiple tenancies environment, hardware resources are reused by other customers. In this case, a third party could have access to another customer’s “deleted” data. This presents a higher risk to the cloud customers than with dedicated hardware.</p>
<p>The public management interface is cloud computing’s other Achilles’ heel. As indicated in the ENISA’s cloud computing risk summary [
<xref ref-type="bibr" rid="ref54">54</xref>
]:</p>
<disp-quote>
<p>The customer management interfaces of public cloud providers are Internet accessible and mediate access to larger sets of resources (than traditional hosting providers) and therefore pose an increased risk especially when combined with remote access and Web browser vulnerabilities</p>
</disp-quote>
<p>Strong encryption with key management is one of the core mechanisms that cloud computing systems use to guard against data loss and theft. However, a poor key management procedure may cause loss of encryption keys, disclosure of secret keys or passwords to malicious parties, or unauthorized use for authentication.</p>
<p>Lastly, as cloud use increases, employees may increasingly become targets for criminal organizations. If the malicious insider is a system administrator, then he or she could use his or her privileges to steal critical data.</p>
</sec>
</sec>
<sec>
<title>Legal Aspect</title>
<sec>
<title>Opportunity</title>
<p>Data and privacy protection are essential to building the customer trust needed for cloud computing to reach its full potential. If the providers adopt better and clearer policies and practices, users would be better able to assess the related risks they face. Fortunately, many main providers have commitments to develop best policies and practices to protect customers’ data and privacy [
<xref ref-type="bibr" rid="ref59">59</xref>
-
<xref ref-type="bibr" rid="ref61">61</xref>
]. Besides providers’ commitments to this protection, some organizations, such as the Cloud Security Alliance, have developed a comprehensive guide to deal with security and privacy issues [
<xref ref-type="bibr" rid="ref62">62</xref>
]. The Trusted Computing Group (http://www.trustedcomputinggroup.org/), a not-for-profit organization, suggests a set of hardware and software technologies to enable the construction of trusted platforms. Governments also play a critical role by fostering widespread agreement regulations for both users and providers [
<xref ref-type="bibr" rid="ref63">63</xref>
-
<xref ref-type="bibr" rid="ref66">66</xref>
].</p>
</sec>
<sec>
<title>Challenges</title>
<p>The use of cloud computing presents many legal issues such as contract law, intellectual property rights, data jurisdiction, and privacy [
<xref ref-type="bibr" rid="ref67">67</xref>
-
<xref ref-type="bibr" rid="ref71">71</xref>
]. Among them, data jurisdiction and privacy issues are major concerns.</p>
<p>In the cloud, physical storages could be widely distributed across multiple jurisdictions, each of which may have different laws regarding data security, privacy, usage, and intellectual property [
<xref ref-type="bibr" rid="ref70">70</xref>
,
<xref ref-type="bibr" rid="ref71">71</xref>
]. For example, the US Health Insurance Portability and Accountability Act (HIPAA) [
<xref ref-type="bibr" rid="ref63">63</xref>
] restricts companies from disclosing personal health data to nonaffiliated third parties, and the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act [
<xref ref-type="bibr" rid="ref72">72</xref>
] gives the US government the right to demand data if it declares conditions as being an emergency or necessary to homeland security. Similarly, the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) [
<xref ref-type="bibr" rid="ref64">64</xref>
] limits the powers of organizations to collect, use, or disclose personal information in the course of commercial activities. However, a provider may, without notice to a user, move the user’s information from jurisdiction to jurisdiction. Data in the cloud may have more than one legal location at the same time, with differing legal consequences.</p>
<p>Cloud computing is a shared resource and multitenancy environment for capacity, storage, and network. The privacy risk of this type of environment includes the failure of mechanisms for separating storage, memory, routing, and even reputation between different tenants of the shared infrastructure. The centralized storage and shared tenancy of physical storage space means the cloud users are at higher risk of disclosure of their sensitive data (eg, health records) to unwanted parties [
<xref ref-type="bibr" rid="ref54">54</xref>
].</p>
<p>Poor breach notification is also an important privacy issue [
<xref ref-type="bibr" rid="ref73">73</xref>
]. For example, the PIPEDA proposed a new requirement for organizations to report material data breaches to the Privacy Commissioner of Canada and to notify individuals where there is a risk of harm [
<xref ref-type="bibr" rid="ref64">64</xref>
]. Unfortunately, the breach notification does not really protect a customer’s privacy. A recent survey shows that consumers who have received data breach notifications within the past year are at a much greater risk for fraud than the typical consumer [
<xref ref-type="bibr" rid="ref74">74</xref>
].</p>
</sec>
</sec>
</sec>
<sec>
<title>Cloud Computing Strategic Planning</title>
<p>When a health organization considers moving its service into the cloud, it needs strategic planning to examine the new model’s benefits and risks, assess its capabilities to achieve the goal, and identify strategies designed for its implementation. Several references are available for establishing a cloud strategic plan. For example, Marks and Lozano [
<xref ref-type="bibr" rid="ref75">75</xref>
] describe the cloud computing adoption life cycle method involving 9 stages to help users begin a cloud project. These are proof of concept/pilot project, strategy and roadmap, modeling and architecture, implementation planning, implementation, expansion, integration, collaboration, and maturity. </p>
<p>The Project Management Institute, a not-for-profit membership association for the project management profession, published a white paper on cloud computing that can be used as a reference for any cloud project manager. The paper provides 8 key steps for implementing cloud computing, as well as 2 case studies that support the method [
<xref ref-type="bibr" rid="ref76">76</xref>
].</p>
<p>Stanoevska-Slabeva et al [
<xref ref-type="bibr" rid="ref77">77</xref>
] also provide practical guidelines for moving traditional IT infrastructure toward clouds: initial analysis of demand and readiness for cloud computing, strategic decision to introduce cloud computing, pilot implementation, internal interconnection, inclusion of external resources, and continuous monitoring and evaluation.</p>
<p>The US Federal Health IT Strategic Plan [
<xref ref-type="bibr" rid="ref78">78</xref>
], released in June 2008, can also be used for large government bodies to implement health cloud projects. The Plan charged the Office of the National Coordinator for Health Information Technology with a leadership role for the development and nationwide implementation of an interoperable health IT infrastructure to improve the quality and efficiency of health care. The strategic plan has 2 goals: patient-focused health care and population health, with 4 objectives under each goal. The objectives for both goals are privacy and security, interoperability, adoption, and collaborative governance. The Plan for achieving each goal is detailed through 43 strategies that describe the work needed to achieve each objective. Each strategy is associated with a milestone against which progress can be assessed and a set of illustrative actions to implement each strategy.</p>
<p>Besides the above-discussed strategic planning methods, this paper, based on a study [
<xref ref-type="bibr" rid="ref79">79</xref>
], proposes a health care cloud computing strategic planning (HC
<sup>2</sup>
SP) model that can be used by a health organization to determine its direction, strategy, and resource allocation to migrate from traditional health services to cloud-based services. The model includes 4 stages: identification, evaluation, action, and follow-up (see
<xref ref-type="fig" rid="figure2">Figure 2</xref>
).</p>
<fig id="figure2" position="float">
<label>Figure 2</label>
<caption>
<p>Health care cloud computing strategic planning (HC
<sup>2</sup>
SP) model (SWOT = strengths, weaknesses, opportunities, and threats; VOC = voice of customer).</p>
</caption>
<graphic xlink:href="jmir_v13i3e67_fig2"></graphic>
</fig>
<sec>
<title>Stage 1: Identification</title>
<p>In this HC
<sup>2</sup>
SP model, the first stage is to analyze the current status of the health organization’s service process and identify the fundamental objective of service improvement by hearing the voice of the customer or the patients. The root causes analysis method can be applied to analyze the problems of the current service process. A typical hierarchy of causes would be expressed as follows [
<xref ref-type="bibr" rid="ref80">80</xref>
]:</p>
<p>
<italic>Problem #1</italic>
: The process of patient admission to, or discharge from, hospital is too long. Why? There is too much unnecessary (duplicate) charting. Why? The paper-based charting system is inefficient. Why? There is lack of automated information systems such as EHR/EMR. Why? It involves a lot of up-front IT investments and maintenance.</p>
<p>The objective identification and its scope must be clarified so as to serve the end users (patients) more efficiently and effectively. In addition, the strategic planning team has to define health care service quality indicators and explain their purpose as well as the use of each indicator. This stage of the model provides the strategic planning team with a well-defined scope for the service problem being faced.</p>
</sec>
<sec>
<title>Stage 2: Evaluation</title>
<p>The second stage of the model is to evaluate the opportunities and challenges of adopting cloud computing. ENISA [
<xref ref-type="bibr" rid="ref54">54</xref>
], the Cloud Security Alliance [
<xref ref-type="bibr" rid="ref62">62</xref>
], and NIST [
<xref ref-type="bibr" rid="ref53">53</xref>
] have developed comprehensive guides to evaluate the benefits and risks of adopting cloud computing. A potential user can also apply a strengths, weaknesses, opportunities, and threats (SWOT) analysis to evaluate the feasibility of the cloud-based approach [
<xref ref-type="bibr" rid="ref81">81</xref>
].</p>
<p>Furthermore, the user needs to assess methods to handle the identified issues. Many references are available for this purpose (see
<xref ref-type="table" rid="table2">Table 2</xref>
[
<xref ref-type="bibr" rid="ref51">51</xref>
,
<xref ref-type="bibr" rid="ref53">53</xref>
,
<xref ref-type="bibr" rid="ref62">62</xref>
,
<xref ref-type="bibr" rid="ref71">71</xref>
,
<xref ref-type="bibr" rid="ref82">82</xref>
,
<xref ref-type="bibr" rid="ref83">83</xref>
]). For example, Armbrust et al [
<xref ref-type="bibr" rid="ref51">51</xref>
] report 10 major obstacles for cloud computing. Each obstacle is paired with opportunities (solutions), ranging from straightforward product development to major research projects. Buyya and Ranjan [
<xref ref-type="bibr" rid="ref82">82</xref>
] discuss several cloud-federated management issues, such as data transfer bottlenecks, shared logging, and federation of distributed clusters. They also provide further references to handle the discussed issues. In addition, Kuo et al [
<xref ref-type="bibr" rid="ref83">83</xref>
] propose an XML-based mediator to conquer data lock-in problems.</p>
<table-wrap id="table2" position="float">
<label>Table 2</label>
<caption>
<p>Potential solutions to the cloud computing challenges</p>
</caption>
<table frame="hsides" rules="groups" cellpadding="8" cellspacing="0" border="1" width="1000">
<col width="250" span="1"></col>
<col width="250" span="1"></col>
<col width="500" span="1"></col>
<thead>
<tr valign="top">
<td rowspan="1" colspan="1">Challenges</td>
<td rowspan="1" colspan="1">Resources</td>
<td rowspan="1" colspan="1">Solution Summary</td>
</tr>
</thead>
<tbody>
<tr valign="top">
<td rowspan="1" colspan="1">Management and technical issues</td>
<td rowspan="1" colspan="1">Armbrust et al [
<xref ref-type="bibr" rid="ref51">51</xref>
]</td>
<td rowspan="1" colspan="1">Ten solutions to handle technical, policy, and business issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Buyya and Ranjan [
<xref ref-type="bibr" rid="ref82">82</xref>
]</td>
<td rowspan="1" colspan="1">Further references to handle cloud-federated management issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Kuo et al [
<xref ref-type="bibr" rid="ref83">83</xref>
]</td>
<td rowspan="1" colspan="1">XML-based mediator to handle data lock-in (interoperability) problems</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1">Security and legal issues</td>
<td rowspan="1" colspan="1">Cloud Security Alliance [
<xref ref-type="bibr" rid="ref62">62</xref>
]</td>
<td rowspan="1" colspan="1">Solutions to handle cloud governance and operation issues (12 domains)</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">NIST
<sup>a</sup>
guidelines [
<xref ref-type="bibr" rid="ref53">53</xref>
]</td>
<td rowspan="1" colspan="1">Precaution recommendations to deal with security and privacy issues</td>
</tr>
<tr valign="top">
<td rowspan="1" colspan="1"></td>
<td rowspan="1" colspan="1">Ward and Sipior [
<xref ref-type="bibr" rid="ref71">71</xref>
]</td>
<td rowspan="1" colspan="1">Five strategies for handling data jurisdiction issues</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table2fn1">
<p>
<sup>a</sup>
National Institute of Standards and Technology.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>The Cloud Security Alliance [
<xref ref-type="bibr" rid="ref62">62</xref>
] describes 12 domains of concerns for cloud computing. The domains are divided into 2 broad categories: governance and operations. Solution recommendations are also provided for each domain. The NIST Guidelines on Security and Privacy in Public Cloud Computing [
<xref ref-type="bibr" rid="ref53">53</xref>
] names many key cloud security and privacy issues and the corresponding precaution recommendations for organizations to follow when planning or initiating a public cloud service outsourcing arrangement. Ward and Sipior [
<xref ref-type="bibr" rid="ref71">71</xref>
] focus on jurisdiction issues. They recommend 5 strategies for cloud customers to deal with jurisdiction problems. </p>
</sec>
<sec>
<title>Stage 3: Action</title>
<p>After evaluating the new computing model, the organization will be able to determine whether to adopt the service or not. If the answer is yes, it needs to draw up an implementation plan. This paper proposes a 5-step plan as follows.</p>
<sec>
<title>Step 1: Determine the Cloud Service and Deployment Model</title>
<p>As discussed above, cloud computing can refer to several different service types (SaaS, PaaS, and IaaS) and different deployment models (private, public, community, and hybrid cloud). Each service type or deployment model has its own benefits and risks [
<xref ref-type="bibr" rid="ref55">55</xref>
]. Therefore, the key considerations in contracting for different types of services or deployment models should be different.</p>
</sec>
<sec>
<title>Step 2: Compare Different Cloud Providers</title>
<p>Choosing a proper cloud provider is the most important part of the implementation plan. Different providers may offer different service models, pricing schemes, audit procedures, and privacy and security policies. The organization has to compare different offerings. Also, it needs to evaluate the provider’s reputation and performance before it signs a contract.</p>
</sec>
<sec>
<title>Step 3: Obtain Assurance From Selected Cloud Provider</title>
<p>The organization needs assurances that the selected provider will provide quality of service and follow sound privacy, security, and legal practices and regulations. The quality-of-service assurances include on-demand access, pay-per-use, rapid-elasticity, on-time troubleshooting support, and operational transparency [
<xref ref-type="bibr" rid="ref54">54</xref>
]. The privacy and security assurances cover data confidentiality, integrity, availability, authenticity, authorization, and nonrepudiation. Also, the provider must assure that the data, including all of its backups, are stored only in geographic locations permitted by contract, service level agreement, and regulation.</p>
</sec>
<sec>
<title>Step 4: Consider Future Data Migration</title>
<p>The organization may have to move data and services to another provider or back to an in-house IT environment because the provider ceases business or service operations (eg, the recent discontinuation of Google Health [
<xref ref-type="bibr" rid="ref2">2</xref>
]), has an unacceptable decrease in service quality, or has a contract dispute. Data portability must be considered up front as part of the plan [
<xref ref-type="bibr" rid="ref84">84</xref>
].</p>
</sec>
<sec>
<title>Step 5: Start a Pilot Implementation</title>
<p>Many previous strategic planning methods suggest that an organization with no previous cloud experience start with a pilot implementation [
<xref ref-type="bibr" rid="ref75">75</xref>
,
<xref ref-type="bibr" rid="ref77">77</xref>
]. The pilot should be suitable for providing proof of the advantages of cloud computing for the organization.</p>
</sec>
</sec>
<sec>
<title>Stage 4: Follow-up</title>
<p>The last stage is to deploy the cloud computing infrastructure and develop a follow-up plan. The plan indicates when to measure and how to measure the service improvements. Reasonable targets are established beforehand, and the results of the new services are measured against the specified targets or performance indicators to assess the magnitude of the improvement [
<xref ref-type="bibr" rid="ref80">80</xref>
]. If the new service condition is not satisfied, the health organization needs to review what facts influence the objective achievement. If the main cause of unsatisfied service condition is from the cloud provider, the organization will consult and discuss with the provider to improve service or may consider moving data and services to another provider or back to its in-house IT environment.</p>
</sec>
</sec>
<sec>
<title>Discussion and Conclusion</title>
<p>Cloud computing is a new model of computing that promises to provide more flexibility, less expense, and more efficiency in IT services to end users. It offers potential opportunities for improving EHR adoption, health care services, and research. However, as discussed above, there are still many challenges to fostering the new model in health care. Perhaps the strongest resistance to the adoption of cloud computing in health IT centers concerns data security and legal issues. Fortunately, many main providers (eg, Microsoft, Google, Amazon) have commitments to develop best policies and practices to secure customer’s data and privacy [
<xref ref-type="bibr" rid="ref59">59</xref>
-
<xref ref-type="bibr" rid="ref61">61</xref>
]. Some not-for-profit organizations, such as the Cloud Security Alliance and the Trusted Computing Group, have developed comprehensive guidelines, and hardware and software technologies to enable the construction of trustworthy cloud applications. Governments also foster regulations (eg, HIPAA [
<xref ref-type="bibr" rid="ref63">63</xref>
] and PIPEDA [
<xref ref-type="bibr" rid="ref64">64</xref>
]) to protect cloud users’ data security and privacy. In addition, most legal issues involved in cloud computing usually can be resolved through contract evaluation or negotiations [
<xref ref-type="bibr" rid="ref10">10</xref>
,
<xref ref-type="bibr" rid="ref54">54</xref>
].</p>
<p>When a health organization considers moving its service into the cloud, it needs strategic planning to examine environmental factors such as staffing, budget, technologies, organizational culture, and government regulations that may affect it, assess its capabilities to achieve the goal, and identify strategies designed to move forward. This paper provides useful strategic planning references for potential users to start cloud projects. Also a new model called HC
<sup>2</sup>
SP is proposed that could be applied by a health organization to determine its direction, strategy, and resource allocation to move to the cloud paradigm. The model includes 4 stages: identification, evaluation, action, and follow-up. At the first stage, the organization analyzes the current status of the service process and identifies the fundamental service objective. Stage 2 is to evaluate the opportunities and challenges of adopting cloud computing. By using the SWOT analysis, the organization can determine the internal strength and weakness factors as well as the external opportunity and threat factors of adopting the new model. Some potential solutions to handle cloud issues have been also provided. Then, in stage 3, the organization draws up a cloud computing implementation plan. The author suggests that this should include at least the following: determine the cloud service and deployment model, compare different cloud providers, obtain assurance from the selected cloud provider, consider future data migration, and start a pilot implementation. The last stage is to deploy the cloud computing infrastructure and develop a follow-up plan to measure the health care service improvements. </p>
<p>As the Chief Executive Officer of a cloud IT company commented [
<xref ref-type="bibr" rid="ref85">85</xref>
]:</p>
<disp-quote>
<p>If you woke up this morning and read in The Wall Street Journal that, say, Overstock.com has stopped using UPS and FedEx and the U.S. mail, and had bought fleets of trucks and started leasing airport hubs and delivering products themselves, you would say they were out of their minds. Why is that much more insane than a health care company spending $2 billion a year on (traditional) information technology?</p>
</disp-quote>
<p>Cloud computing presents a compelling opportunity for consumers of IT and producers of information services [
<xref ref-type="bibr" rid="ref86">86</xref>
,
<xref ref-type="bibr" rid="ref87">87</xref>
]. Gartner Research also found that cloud computing ranked as the top technical priority of chief information officers in 2011 [
<xref ref-type="bibr" rid="ref88">88</xref>
]. However, adopting cloud computing is a complex process involving many factors. It needs rigorous evaluation before introducing the new computing model to an organization. This paper focuses on 4 aspects of evaluation and strategic planning, which will assist health organizations in determining whether (or how) to migrate from traditional to cloud-based health services.</p>
</sec>
</body>
<back>
<ack>
<p>The paper has benefited greatly from the reviewers’ insightful comments and suggestions. The author would like to thank Professor Francis Lau and Mr George Fraser for proofreading the manuscript.</p>
</ack>
<fn-group>
<fn fn-type="conflict">
<p>None declared</p>
</fn>
</fn-group>
<glossary>
<title>Abbreviations</title>
<def-list>
<def-item>
<term id="abb1">Amazon S3</term>
<def>
<p>Amazon Simple Storage Service</p>
</def>
</def-item>
<def-item>
<term id="abb2">AWS</term>
<def>
<p>Amazon Web Services</p>
</def>
</def-item>
<def-item>
<term id="abb3">CPU</term>
<def>
<p>central processing unit</p>
</def>
</def-item>
<def-item>
<term id="abb4">EC2</term>
<def>
<p>Elastic Compute Cloud</p>
</def>
</def-item>
<def-item>
<term id="abb5">EHR</term>
<def>
<p>electronic health record</p>
</def>
</def-item>
<def-item>
<term id="abb6">ENISA</term>
<def>
<p>European Network and Information Security Agency</p>
</def>
</def-item>
<def-item>
<term id="abb7">HC2SP</term>
<def>
<p>health care cloud computing strategic planning</p>
</def>
</def-item>
<def-item>
<term id="abb8">HIPAA</term>
<def>
<p>Health Insurance Portability and Accountability Act</p>
</def>
</def-item>
<def-item>
<term id="abb9">IaaS</term>
<def>
<p>infrastructure as a service</p>
</def>
</def-item>
<def-item>
<term id="abb10">IT</term>
<def>
<p>information technology</p>
</def>
</def-item>
<def-item>
<term id="abb11">NIST</term>
<def>
<p>National Institute of Standards and Technology</p>
</def>
</def-item>
<def-item>
<term id="abb12">PaaS</term>
<def>
<p>platform as a service</p>
</def>
</def-item>
<def-item>
<term id="abb13">PATRIOT</term>
<def>
<p>Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism</p>
</def>
</def-item>
<def-item>
<term id="abb14">PIPEDA</term>
<def>
<p>Personal Information Protection and Electronic Documents Act</p>
</def>
</def-item>
<def-item>
<term id="abb15">SaaS</term>
<def>
<p>software as a service</p>
</def>
</def-item>
<def-item>
<term id="abb16">SSAHA</term>
<def>
<p>sequence search and alignment by hashing</p>
</def>
</def-item>
<def-item>
<term id="abb17">SWOT</term>
<def>
<p>strengths, weaknesses, opportunities, and threats</p>
</def>
</def-item>
</def-list>
</glossary>
<ref-list>
<ref id="ref1">
<label>1</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mell</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Grance</surname>
<given-names>T</given-names>
</name>
</person-group>
<article-title>The NIST definition of cloud computing</article-title>
<source>Commun ACM</source>
<year>2010</year>
<volume>53</volume>
<issue>6</issue>
<fpage>50</fpage>
</element-citation>
</ref>
<ref id="ref2">
<label>2</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Brown</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Weihl</surname>
<given-names>B</given-names>
</name>
</person-group>
<source>Official Google Blog</source>
<year>2011</year>
<month>6</month>
<day>24</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>An Update on Google Health and Google PowerMeter
<ext-link ext-link-type="uri" xlink:href="http://googleblog.blogspot.com/2011/06/update-on-google-health-and-google.html">http://googleblog.blogspot.com/2011/06/update-on-google-health-and-google.html</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60gjQjyd9"></ext-link>
</element-citation>
</ref>
<ref id="ref3">
<label>3</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Armbrust</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Fox</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Griffith</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Joseph</surname>
<given-names>AD</given-names>
</name>
<name>
<surname>Katz</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Konwinski</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Patterson</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Rabkin</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Stoica</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Zaharia</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>A view of cloud computing</article-title>
<source>Commun ACM</source>
<year>2010</year>
<volume>53</volume>
<issue>4</issue>
<fpage>50</fpage>
<lpage>58</lpage>
<pub-id pub-id-type="doi">10.1145/1721654.1721672</pub-id>
</element-citation>
</ref>
<ref id="ref4">
<label>4</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<collab>Technology firms and health care: heads in the cloud: digitising America's health records could be a huge business</collab>
</person-group>
<article-title>Will it?</article-title>
<source>The Economist (US)</source>
<year>2011</year>
<volume>399</volume>
<issue>8727</issue>
<fpage>63</fpage>
</element-citation>
</ref>
<ref id="ref5">
<label>5</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>ZJ</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>K</given-names>
</name>
</person-group>
<article-title>Cloud computing for agent-based urban transportation systems</article-title>
<source>IEEE Intell Syst</source>
<year>2011</year>
<volume>26</volume>
<issue>1</issue>
<fpage>73</fpage>
<lpage>79</lpage>
</element-citation>
</ref>
<ref id="ref6">
<label>6</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Behrend</surname>
<given-names>TS</given-names>
</name>
<name>
<surname>Wiebe</surname>
<given-names>EN</given-names>
</name>
<name>
<surname>London</surname>
<given-names>JE</given-names>
</name>
<name>
<surname>Johnson</surname>
<given-names>EC</given-names>
</name>
</person-group>
<article-title>Cloud computing adoption and usage in community colleges</article-title>
<source>Behav Inf Technol</source>
<year>2011</year>
<volume>30</volume>
<issue>2</issue>
<fpage>231</fpage>
<lpage>240</lpage>
<pub-id pub-id-type="doi">10.1080/0144929X.2010.489118</pub-id>
</element-citation>
</ref>
<ref id="ref7">
<label>7</label>
<element-citation publication-type="webpage">
<source>DarkGovernment</source>
<year>2009</year>
<month>7</month>
<day>23</day>
<date-in-citation>2011-07-11</date-in-citation>
<comment>NSA Embraces Cloud Computing
<ext-link ext-link-type="uri" xlink:href="http://www.darkgovernment.com/news/nsa-embraces-cloud-computing">http://www.darkgovernment.com/news/nsa-embraces-cloud-computing</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNQBw5S"></ext-link>
</element-citation>
</ref>
<ref id="ref8">
<label>8</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chatman</surname>
<given-names>C</given-names>
</name>
</person-group>
<article-title>How cloud computing is changing the face of health care information technology</article-title>
<source>J Health Care Compliance</source>
<year>2010</year>
<month>6</month>
<volume>12</volume>
<issue>3</issue>
<fpage>37</fpage>
<lpage>70</lpage>
</element-citation>
</ref>
<ref id="ref9">
<label>9</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dudley</surname>
<given-names>JT</given-names>
</name>
<name>
<surname>Pouliot</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Morgan</surname>
<given-names>AA</given-names>
</name>
<name>
<surname>Butte</surname>
<given-names>AJ</given-names>
</name>
</person-group>
<article-title>Translational bioinformatics in the cloud: an affordable alternative</article-title>
<source>Genome Med</source>
<year>2010</year>
<volume>2</volume>
<issue>8</issue>
<fpage>51</fpage>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.genomemedicine.com/content/2/8/51"></ext-link>
</comment>
<pub-id pub-id-type="doi">10.1186/gm172</pub-id>
<pub-id pub-id-type="medline">20691073</pub-id>
<pub-id pub-id-type="pii">gm172</pub-id>
<pub-id pub-id-type="pmcid">PMC2945008</pub-id>
<pub-id pub-id-type="pmid">20691073</pub-id>
</element-citation>
</ref>
<ref id="ref10">
<label>10</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schweitzer</surname>
<given-names>EJ</given-names>
</name>
</person-group>
<article-title>Reconciliation of the cloud computing model with US federal electronic health record regulations</article-title>
<source>J Am Med Inform Assoc</source>
<year>2011</year>
<month>7</month>
<day>4</day>
<pub-id pub-id-type="doi">10.1136/amiajnl-2011-000162</pub-id>
<pub-id pub-id-type="medline">21727204</pub-id>
<pub-id pub-id-type="pii">amiajnl-2011-000162</pub-id>
</element-citation>
</ref>
<ref id="ref11">
<label>11</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Haughton</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>Year of the underdog: Cloud-based EHRs</article-title>
<source>Health Manag Technol</source>
<year>2011</year>
<volume>32</volume>
<issue>1</issue>
<fpage>9</fpage>
<pub-id pub-id-type="pmid">21905480</pub-id>
</element-citation>
</ref>
<ref id="ref12">
<label>12</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kabachinski</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>What's the forecast for cloud computing in healthcare?</article-title>
<source>Biomed Instrum Technol</source>
<year>2011</year>
<volume>45</volume>
<issue>2</issue>
<fpage>146</fpage>
<lpage>50</lpage>
<pub-id pub-id-type="doi">10.2345/0899-8205-45.2.146</pub-id>
<pub-id pub-id-type="medline">21466336</pub-id>
<pub-id pub-id-type="pmid">21466336</pub-id>
</element-citation>
</ref>
<ref id="ref13">
<label>13</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rosenthal</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Mork</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>MH</given-names>
</name>
<name>
<surname>Stanford</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Koester</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Reynolds</surname>
<given-names>P</given-names>
</name>
</person-group>
<article-title>Cloud computing: a new business paradigm for biomedical information sharing</article-title>
<source>J Biomed Inform</source>
<year>2010</year>
<month>4</month>
<volume>43</volume>
<issue>2</issue>
<fpage>342</fpage>
<lpage>53</lpage>
<pub-id pub-id-type="doi">10.1016/j.jbi.2009.08.014</pub-id>
<pub-id pub-id-type="medline">19715773</pub-id>
<pub-id pub-id-type="pii">S1532-0464(09)00115-4</pub-id>
<pub-id pub-id-type="pmid">19715773</pub-id>
</element-citation>
</ref>
<ref id="ref14">
<label>14</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Anderson</surname>
<given-names>NR</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>ES</given-names>
</name>
<name>
<surname>Brockenbrough</surname>
<given-names>JS</given-names>
</name>
<name>
<surname>Minie</surname>
<given-names>ME</given-names>
</name>
<name>
<surname>Fuller</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Brinkley</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Tarczy-Hornoch</surname>
<given-names>P</given-names>
</name>
</person-group>
<article-title>Issues in biomedical research data management and analysis: needs and barriers</article-title>
<source>J Am Med Inform Assoc</source>
<year>2007</year>
<volume>14</volume>
<issue>4</issue>
<fpage>478</fpage>
<lpage>88</lpage>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://jamia.bmj.com/cgi/pmidlookup?view=long&pmid=17460139"></ext-link>
</comment>
<pub-id pub-id-type="doi">10.1197/jamia.M2114</pub-id>
<pub-id pub-id-type="medline">17460139</pub-id>
<pub-id pub-id-type="pii">M2114</pub-id>
<pub-id pub-id-type="pmcid">PMC2244904</pub-id>
<pub-id pub-id-type="pmid">17460139</pub-id>
</element-citation>
</ref>
<ref id="ref15">
<label>15</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dudley</surname>
<given-names>JT</given-names>
</name>
<name>
<surname>Butte</surname>
<given-names>AJ</given-names>
</name>
</person-group>
<article-title>In silico research in the era of cloud computing</article-title>
<source>Nat Biotechnol</source>
<year>2010</year>
<month>11</month>
<volume>28</volume>
<issue>11</issue>
<fpage>1181</fpage>
<lpage>5</lpage>
<pub-id pub-id-type="doi">10.1038/nbt1110-1181</pub-id>
<pub-id pub-id-type="medline">21057489</pub-id>
<pub-id pub-id-type="pii">nbt1110-1181</pub-id>
<pub-id pub-id-type="pmid">21057489</pub-id>
</element-citation>
</ref>
<ref id="ref16">
<label>16</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wall</surname>
<given-names>DP</given-names>
</name>
<name>
<surname>Kudtarkar</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Fusaro</surname>
<given-names>VA</given-names>
</name>
<name>
<surname>Pivovarov</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Patil</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Tonellato</surname>
<given-names>PJ</given-names>
</name>
</person-group>
<article-title>Cloud computing for comparative genomics</article-title>
<source>BMC Bioinformatics</source>
<year>2010</year>
<volume>11</volume>
<fpage>259</fpage>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.biomedcentral.com/1471-2105/11/259"></ext-link>
</comment>
<pub-id pub-id-type="doi">10.1186/1471-2105-11-259</pub-id>
<pub-id pub-id-type="medline">20482786</pub-id>
<pub-id pub-id-type="pii">1471-2105-11-259</pub-id>
<pub-id pub-id-type="pmcid">PMC3098063</pub-id>
<pub-id pub-id-type="pmid">20482786</pub-id>
</element-citation>
</ref>
<ref id="ref17">
<label>17</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Schatz</surname>
<given-names>MC</given-names>
</name>
<name>
<surname>Langmead</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Salzberg</surname>
<given-names>SL</given-names>
</name>
</person-group>
<article-title>Cloud computing and the DNA data race</article-title>
<source>Nat Biotechnol</source>
<year>2010</year>
<month>7</month>
<volume>28</volume>
<issue>7</issue>
<fpage>691</fpage>
<lpage>3</lpage>
<pub-id pub-id-type="doi">10.1038/nbt0710-691</pub-id>
<pub-id pub-id-type="medline">20622843</pub-id>
<pub-id pub-id-type="pii">nbt0710-691</pub-id>
<pub-id pub-id-type="pmcid">PMC2904649</pub-id>
<pub-id pub-id-type="pmid">20622843</pub-id>
</element-citation>
</ref>
<ref id="ref18">
<label>18</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Avila-Garcia</surname>
<given-names>MS</given-names>
</name>
<name>
<surname>Trefethen</surname>
<given-names>AE</given-names>
</name>
<name>
<surname>Brady</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Gleeson</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Goodman</surname>
<given-names>D</given-names>
</name>
</person-group>
<article-title>Lowering the barriers to cancer imaging</article-title>
<source>eScience 2008: IEEE 4th International Conference on eScience</source>
<year>2008</year>
<conf-name>The 4th IEEE International Conference on eScience</conf-name>
<conf-date>December 8-12, 2008</conf-date>
<conf-loc>Indiana, USA</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/eScience.2008.33</pub-id>
</element-citation>
</ref>
<ref id="ref19">
<label>19</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bateman</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Wood</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>Cloud computing</article-title>
<source>Bioinformatics</source>
<year>2009</year>
<month>6</month>
<day>15</day>
<volume>25</volume>
<issue>12</issue>
<fpage>1475</fpage>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://bioinformatics.oxfordjournals.org/cgi/pmidlookup?view=long&pmid=19435745"></ext-link>
</comment>
<pub-id pub-id-type="doi">10.1093/bioinformatics/btp274</pub-id>
<pub-id pub-id-type="medline">19435745</pub-id>
<pub-id pub-id-type="pii">btp274</pub-id>
<pub-id pub-id-type="pmid">19435745</pub-id>
</element-citation>
</ref>
<ref id="ref20">
<label>20</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kudtarkar</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Deluca</surname>
<given-names>TF</given-names>
</name>
<name>
<surname>Fusaro</surname>
<given-names>VA</given-names>
</name>
<name>
<surname>Tonellato</surname>
<given-names>PJ</given-names>
</name>
<name>
<surname>Wall</surname>
<given-names>DP</given-names>
</name>
</person-group>
<article-title>Cost-effective cloud computing: a case study using the comparative genomics tool, roundup</article-title>
<source>Evol Bioinform Online</source>
<year>2010</year>
<volume>6</volume>
<fpage>197</fpage>
<lpage>203</lpage>
<comment>
<ext-link ext-link-type="uri" xlink:href="http://www.la-press.com/article.php?article_id=2422"></ext-link>
</comment>
<pub-id pub-id-type="doi">10.4137/EBO.S6259</pub-id>
<pub-id pub-id-type="medline">21258651</pub-id>
<pub-id pub-id-type="pmcid">PMC3023304</pub-id>
<pub-id pub-id-type="pmid">21258651</pub-id>
</element-citation>
</ref>
<ref id="ref21">
<label>21</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Memon</surname>
<given-names>FN</given-names>
</name>
<name>
<surname>Owen</surname>
<given-names>AM</given-names>
</name>
<name>
<surname>Sanchez-Graillet</surname>
<given-names>O</given-names>
</name>
<name>
<surname>Upton</surname>
<given-names>GJ</given-names>
</name>
<name>
<surname>Harrison</surname>
<given-names>AP</given-names>
</name>
</person-group>
<article-title>Identifying the impact of G-quadruplexes on Affymetrix 3' arrays using cloud computing</article-title>
<source>J Integr Bioinform</source>
<year>2010</year>
<volume>7</volume>
<issue>2</issue>
<fpage>111</fpage>
<pub-id pub-id-type="doi">10.2390/biecoll-jib-2010-111</pub-id>
<pub-id pub-id-type="medline">20134078</pub-id>
<pub-id pub-id-type="pii">421</pub-id>
<pub-id pub-id-type="pmid">20134078</pub-id>
</element-citation>
</ref>
<ref id="ref22">
<label>22</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vaquero</surname>
<given-names>LM</given-names>
</name>
<name>
<surname>Rodero-Merino</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Caceres</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Lindner</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>A break in the clouds: towards a cloud definition</article-title>
<source>ACM SIGCOMM Comput Commun Rev</source>
<year>2008</year>
<month>1</month>
<volume>39</volume>
<issue>1</issue>
<fpage>50</fpage>
<lpage>55</lpage>
<pub-id pub-id-type="doi">10.1145/1496091.1496100</pub-id>
</element-citation>
</ref>
<ref id="ref23">
<label>23</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Iyer</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Henderson</surname>
<given-names>JC</given-names>
</name>
</person-group>
<article-title>Preparing for the future: understanding the seven capabilities of cloud computing</article-title>
<source>MIS Q Exec</source>
<year>2010</year>
<volume>9</volume>
<issue>2</issue>
<fpage>117</fpage>
<lpage>131</lpage>
</element-citation>
</ref>
<ref id="ref24">
<label>24</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vouk</surname>
<given-names>MA</given-names>
</name>
</person-group>
<article-title>Cloud computing: issues, research and implementations</article-title>
<source>J Comput Inf Technol</source>
<year>2008</year>
<volume>16</volume>
<issue>4</issue>
<fpage>235</fpage>
<lpage>246</lpage>
<pub-id pub-id-type="doi">10.2498/cit.1001391</pub-id>
</element-citation>
</ref>
<ref id="ref25">
<label>25</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Han</surname>
<given-names>Y</given-names>
</name>
</person-group>
<article-title>On the clouds: a new way of computing</article-title>
<source>Inf Technol Libr 2010 June; 87-92</source>
<year>2010</year>
<month>6</month>
<day>1</day>
<volume>29</volume>
<issue>2</issue>
</element-citation>
</ref>
<ref id="ref26">
<label>26</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cervone</surname>
<given-names>HF</given-names>
</name>
</person-group>
<article-title>An overview of virtual and cloud computing</article-title>
<source>OCLC Syst Serv</source>
<year>2010</year>
<volume>26</volume>
<issue>3</issue>
<fpage>162</fpage>
<lpage>165</lpage>
<pub-id pub-id-type="doi">10.1108/10650751011073607</pub-id>
</element-citation>
</ref>
<ref id="ref27">
<label>27</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>IBM and Juniper Networks Solutions Brief</collab>
</person-group>
<source>IBM Global Services</source>
<year>2009</year>
<date-in-citation>2011-07-25</date-in-citation>
<comment>IBM and Juniper Networks: Delivering Solutions That Transform Your Networking Infrastructure
<ext-link ext-link-type="ftp" xlink:href="ftp://public.dhe.ibm.com/common/ssi/ecm/en/jns03002usen/JNS03002USEN.PDF">ftp://public.dhe.ibm.com/common/ssi/ecm/en/jns03002usen/JNS03002USEN.PDF</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60ko8hVTK"></ext-link>
</element-citation>
</ref>
<ref id="ref28">
<label>28</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sittig</surname>
<given-names>DF</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>H</given-names>
</name>
</person-group>
<article-title>Eight rights of safe electronic health record use</article-title>
<source>JAMA</source>
<year>2009</year>
<month>9</month>
<day>9</day>
<volume>302</volume>
<issue>10</issue>
<fpage>1111</fpage>
<lpage>3</lpage>
<pub-id pub-id-type="doi">10.1001/jama.2009.1311</pub-id>
<pub-id pub-id-type="medline">19738098</pub-id>
<pub-id pub-id-type="pii">302/10/1111</pub-id>
<pub-id pub-id-type="pmid">19738098</pub-id>
</element-citation>
</ref>
<ref id="ref29">
<label>29</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>Y</given-names>
</name>
</person-group>
<article-title>Application of cloud computing in the health information system</article-title>
<source>Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM)</source>
<year>2010</year>
<conf-name>International Conference on Computer Application and System Modeling</conf-name>
<conf-date>October 22-24, 2010</conf-date>
<conf-loc>Taiyuan, China</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/ICCASM.2010.5619051</pub-id>
</element-citation>
</ref>
<ref id="ref30">
<label>30</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>He</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Jin</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Xiang</surname>
<given-names>T</given-names>
</name>
</person-group>
<article-title>A cloud computing solution for hospital information system</article-title>
<source>Proceedings of the 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)</source>
<year>2010</year>
<conf-name>IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010)</conf-name>
<conf-date>October 29-31, 2010</conf-date>
<conf-loc>Xiamen, China</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/ICICISYS.2010.5658278</pub-id>
</element-citation>
</ref>
<ref id="ref31">
<label>31</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Botts</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Thoms</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Noamani</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Horan</surname>
<given-names>TA</given-names>
</name>
</person-group>
<article-title>Cloud computing architectures for the underserved: public health cyberinfrastructures through a network of healthATMs</article-title>
<source>Proceedings of the 2010 43rd Hawaii International Conference on System Sciences (HICSS)</source>
<year>2010</year>
<conf-name>The 43rd Hawaii International Conference on System Sciences</conf-name>
<conf-date>January 5-8 , 2010</conf-date>
<conf-loc>Hawaii, USA</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/HICSS.2010.107</pub-id>
</element-citation>
</ref>
<ref id="ref32">
<label>32</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>CT</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>LT</given-names>
</name>
<name>
<surname>Chou</surname>
<given-names>WL</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>KC</given-names>
</name>
</person-group>
<article-title>Implementation of a medical image file accessing system on cloud computing</article-title>
<source>Proceedings of the 2010 IEEE 13th International Conference on Computational Science and Engineering (CSE)</source>
<year>2010</year>
<conf-name>The 13th IEEE International Conference on Computational Science and Engineering</conf-name>
<conf-date>December 11-13, 2010</conf-date>
<conf-loc>Hong Kong, China</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/CSE.2010.48</pub-id>
</element-citation>
</ref>
<ref id="ref33">
<label>33</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Hoang</surname>
<given-names>DB</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L</given-names>
</name>
</person-group>
<article-title>Mobile cloud for assistive healthcare (MoCAsH)</article-title>
<source>Proceedings of the</source>
<year>2010</year>
<conf-name>the IEEE Asia-Pacific Services Computing Conference</conf-name>
<conf-date>December 6-10 , 2010</conf-date>
<conf-loc>Hangzhou, China</conf-loc>
<publisher-loc>Asia-Pacific</publisher-loc>
<publisher-name>:</publisher-name>
<pub-id pub-id-type="doi">10.1109/APSCC.2010.102</pub-id>
</element-citation>
</ref>
<ref id="ref34">
<label>34</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Guo</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>X</given-names>
</name>
</person-group>
<article-title>The building of cloud computing environment for e-health</article-title>
<source>Proceedings of the 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT)</source>
<year>2010</year>
<conf-name>The IEEE International Conference on E-Health Networking</conf-name>
<conf-date>July 1-3, 2010</conf-date>
<conf-loc>Lyon, France</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/EDT.2010.5496512</pub-id>
</element-citation>
</ref>
<ref id="ref35">
<label>35</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Alagoz</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Valdez</surname>
<given-names>AC</given-names>
</name>
<name>
<surname>Wilkowska</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Ziefle</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Dorner</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Holzinger</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>From cloud computing to mobile Internet, from user focus to culture and hedonism: the crucible of mobile health care and wellness applications</article-title>
<source>Proceedings of the 2010 5th International Conference on Pervasive Computing and Applications (ICPCA)</source>
<year>2010</year>
<conf-name>The 5th International Conference on pervasive Computing and Applications (ICPCA)</conf-name>
<conf-date>December 1-3, 2010</conf-date>
<conf-loc>Maribor, Slovenia</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/ICPCA.2010.5704072</pub-id>
</element-citation>
</ref>
<ref id="ref36">
<label>36</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Rolim</surname>
<given-names>CO</given-names>
</name>
<name>
<surname>Koch</surname>
<given-names>FL</given-names>
</name>
<name>
<surname>Westphall</surname>
<given-names>CB</given-names>
</name>
<name>
<surname>Werner</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Fracalossi</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Salvador</surname>
<given-names>GS</given-names>
</name>
</person-group>
<article-title>A cloud computing solution for patient's data collection in health care institutions</article-title>
<year>2010</year>
<month>2</month>
<day>10</day>
<conf-name>In: Proceedings of the 2nd International Conference on eHealth, Telemedicine, and Social Medicine</conf-name>
<conf-date>February 10-16, 2010</conf-date>
<conf-loc>New York, NY: IEEE</conf-loc>
<pub-id pub-id-type="doi">10.1109/eTELEMED.2010.19</pub-id>
</element-citation>
</ref>
<ref id="ref37">
<label>37</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Nkosi</surname>
<given-names>MT</given-names>
</name>
<name>
<surname>Mekuria</surname>
<given-names>F</given-names>
</name>
</person-group>
<article-title>Cloud computing for enhanced mobile health applications</article-title>
<source>Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom)</source>
<year>2010</year>
<conf-name>The 2nd IEEE International Conference on Cloud Computing Technology and Science</conf-name>
<conf-date>Nov 30- Dec 3, 2010</conf-date>
<conf-loc>Indianapolis, USA</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/CloudCom.2010.31</pub-id>
</element-citation>
</ref>
<ref id="ref38">
<label>38</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<collab>Rao GSVRK</collab>
<name>
<surname>Sundararaman</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Parthasarathi</surname>
<given-names>J</given-names>
</name>
</person-group>
<article-title>Dhatri: a pervasive cloud initiative for primary healthcare services</article-title>
<source>Proceedings of the 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN)</source>
<year>2010</year>
<conf-name>The 14th IEEE International Conference on Intelligence in Next Generation Networks (ICIN)</conf-name>
<conf-date>October 11-14, 2010</conf-date>
<conf-loc>Berlin, Germany</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/ICIN.2010.5640918</pub-id>
</element-citation>
</ref>
<ref id="ref39">
<label>39</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Koufi</surname>
<given-names>V</given-names>
</name>
<name>
<surname>Malamateniou</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Vassilacopoulos</surname>
<given-names>G</given-names>
</name>
</person-group>
<article-title>Ubiquitous access to cloud emergency medical services</article-title>
<source>Proceedings of the 2010 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB)</source>
<year>2010</year>
<conf-name>The 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB)</conf-name>
<conf-date>November 3-5, 2010</conf-date>
<conf-loc>Corfu, Greece</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/ITAB.2010.5687702</pub-id>
</element-citation>
</ref>
<ref id="ref40">
<label>40</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Arrais</surname>
<given-names>JP</given-names>
</name>
<name>
<surname>Oliveira</surname>
<given-names>JL</given-names>
</name>
</person-group>
<article-title>On the exploitation of cloud computing in bioinformatics</article-title>
<source>Proceedings of the 2010 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB)</source>
<year>2010</year>
<conf-name>The IEEE 10th International Conference on Information Technology and Applications in Biomedicine (ITAB)</conf-name>
<conf-date>November 3-5, 2010</conf-date>
<conf-loc>Corfu, Greece</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/ITAB.2010.5687653</pub-id>
</element-citation>
</ref>
<ref id="ref41">
<label>41</label>
<element-citation publication-type="webpage">
<source>Amazon Web Services</source>
<year>2011</year>
<date-in-citation>2011-07-20</date-in-citation>
<comment>AWS Case Study: Harvard Medical School
<ext-link ext-link-type="uri" xlink:href="http://aws.amazon.com/solutions/case-studies/harvard/">http://aws.amazon.com/solutions/case-studies/harvard/</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNYfCi1"></ext-link>
</element-citation>
</ref>
<ref id="ref42">
<label>42</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Business Wire</collab>
</person-group>
<source>The Free Library</source>
<year>2008</year>
<date-in-citation>2011-07-25</date-in-citation>
<comment>DiskAgent Launches New Remote Backup and Loss Protection Software as a Service Offering
<ext-link ext-link-type="uri" xlink:href="http://www.thefreelibrary.com/DiskAgent(TM)+Launches+New+Remote+Backup+and+Loss+Protection+Software...-a0182194404">http://www.thefreelibrary.com/DiskAgent(TM)+Launches+New+Remote+Backup+and+Loss+Protection+Software...-a0182194404</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="1312946350828095"></ext-link>
</element-citation>
</ref>
<ref id="ref43">
<label>43</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Strukhoff</surname>
<given-names>R</given-names>
</name>
<name>
<surname>O'Gara</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Moon</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Romanski</surname>
<given-names>P</given-names>
</name>
<name>
<surname>White</surname>
<given-names>E</given-names>
</name>
</person-group>
<source>SYS-CON Media, Inc</source>
<year>2009</year>
<month>3</month>
<day>20</day>
<date-in-citation>2011-07-18</date-in-citation>
<comment>Cloud Expo: Healthcare Clients Adopt Electronic Health Records with Cloud-Based Services
<ext-link ext-link-type="uri" xlink:href="http://cloudcomputing.sys-con.com/node/886530">http://cloudcomputing.sys-con.com/node/886530</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNgwnG7"></ext-link>
</element-citation>
</ref>
<ref id="ref44">
<label>44</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Editorial Staff</collab>
</person-group>
<source>HealthImaging.com</source>
<year>2010</year>
<month>2</month>
<day>16</day>
<date-in-citation>2011-07-19</date-in-citation>
<comment>Acumen Nabs ONC Cloud Computing Contract
<ext-link ext-link-type="uri" xlink:href="http://www.healthimaging.com/index.php?option=com_articles&view=article&id=20648:acumen-nabs-onc-cloud-computing-contract&division=hiit">http://www.healthimaging.com/index.php?option=com_articles&view=article&id=20648:acumen-nabs-onc-cloud-computing-contract&division=hiit</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNoT21d"></ext-link>
</element-citation>
</ref>
<ref id="ref45">
<label>45</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Korea IT Times</collab>
</person-group>
<source>IT Times</source>
<year>2010</year>
<month>7</month>
<day>20</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>Telstra Plans Launch of E-Health Cloud Services, Tip of the Iceberg for Opportunity
<ext-link ext-link-type="uri" xlink:href="http://www.koreaittimes.com/story/9826/telstra-plans-launch-e-health-cloud-services-tip-iceberg-opportunity">http://www.koreaittimes.com/story/9826/telstra-plans-launch-e-health-cloud-services-tip-iceberg-opportunity</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNrsOz0"></ext-link>
</element-citation>
</ref>
<ref id="ref46">
<label>46</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>IBM Press Room</collab>
</person-group>
<source>IBM</source>
<year>2010</year>
<month>11</month>
<day>22</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>European Union Consortium Launches Advanced Cloud Computing Project With Hospital and Smart Power Grid Provider
<ext-link ext-link-type="uri" xlink:href="http://www-03.ibm.com/press/us/en/pressrelease/33067.wss">http://www-03.ibm.com/press/us/en/pressrelease/33067.wss</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNuNDjt"></ext-link>
</element-citation>
</ref>
<ref id="ref47">
<label>47</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Danek</surname>
<given-names>J</given-names>
</name>
</person-group>
<source>Public Works Government Services Canada</source>
<year>2009</year>
<month>10</month>
<day>6</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>Cloud Computing and the Canadian Environment
<ext-link ext-link-type="uri" xlink:href="http://www.scribd.com/doc/20818613/Cloud-Computing-and-the-Canadian-Environment">http://www.scribd.com/doc/20818613/Cloud-Computing-and-the-Canadian-Environment</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNvZJD2"></ext-link>
</element-citation>
</ref>
<ref id="ref48">
<label>48</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Avery</surname>
<given-names>P</given-names>
</name>
</person-group>
<source>IT Business Edge</source>
<year>2009</year>
<month>8</month>
<day>26</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>Research Indicates Increase in Cloud Computing
<ext-link ext-link-type="uri" xlink:href="http://www.itbusinessedge.com/cm/community/kn/blog/research-indicates-increase-in-cloud-computing/?cs=35256">http://www.itbusinessedge.com/cm/community/kn/blog/research-indicates-increase-in-cloud-computing/?cs=35256</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kNxLIhD"></ext-link>
</element-citation>
</ref>
<ref id="ref49">
<label>49</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cherry</surname>
<given-names>S</given-names>
</name>
</person-group>
<article-title>Forecast for cloud computing: up, up, and away</article-title>
<source>IEEE Spectrum</source>
<year>2009</year>
<month>10</month>
<volume>46</volume>
<issue>10</issue>
<fpage>68</fpage>
</element-citation>
</ref>
<ref id="ref50">
<label>50</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Bannerman</surname>
<given-names>PL</given-names>
</name>
</person-group>
<article-title>Cloud Computing Adoption Risks: State of Play</article-title>
<source>Proceedings of the 17th Asia Pacific Software Engineering Conference Cloud Workshop</source>
<year>2010</year>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<fpage>10</fpage>
<lpage>16</lpage>
</element-citation>
</ref>
<ref id="ref51">
<label>51</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Armbrust</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Fox</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Griffith</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Joseph</surname>
<given-names>AD</given-names>
</name>
<name>
<surname>Katz</surname>
<given-names>RH</given-names>
</name>
<name>
<surname>Konwinski</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Patterson</surname>
<given-names>DA</given-names>
</name>
<name>
<surname>Rabkin</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Stoica</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Zaharia</surname>
<given-names>M</given-names>
</name>
</person-group>
<source>EECS Department, UC Berkeley</source>
<year>2009</year>
<date-in-citation>2011-09-08</date-in-citation>
<comment>Above the Clouds: A Berkeley View of Cloud Computing. Technical Report
<ext-link ext-link-type="uri" xlink:href="http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf">http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="61YCjBAXv"></ext-link>
</element-citation>
</ref>
<ref id="ref52">
<label>52</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Everett</surname>
<given-names>C</given-names>
</name>
</person-group>
<article-title>Cloud computing: a question of trust</article-title>
<source>Comput Fraud Secur</source>
<year>2009</year>
<month>6</month>
<day>10</day>
<issue>6</issue>
<fpage>5</fpage>
<lpage>7</lpage>
<pub-id pub-id-type="doi">10.1016/S1361-3723(09)70071-5</pub-id>
</element-citation>
</ref>
<ref id="ref53">
<label>53</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Jansen</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Grance</surname>
<given-names>T</given-names>
</name>
</person-group>
<source>National Institute of Standards and Technology, US Department of Commerce</source>
<year>2011</year>
<month>1</month>
<date-in-citation>2011-09-08</date-in-citation>
<comment>Guidelines on Security and Privacy in Public Cloud Computing
<ext-link ext-link-type="uri" xlink:href="http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf">http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="61YDDUYzT"></ext-link>
</element-citation>
</ref>
<ref id="ref54">
<label>54</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>European Network and Information Security Agency</collab>
</person-group>
<source>ENISA</source>
<year>2009</year>
<date-in-citation>2011-09-08</date-in-citation>
<comment>Cloud Computing: Benefits, Risks and Recommendations for Information Security
<ext-link ext-link-type="uri" xlink:href="http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment">http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="61YDDp324"></ext-link>
</element-citation>
</ref>
<ref id="ref55">
<label>55</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L</given-names>
</name>
</person-group>
<article-title>Security models and requirements for healthcare application clouds</article-title>
<source>Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD)</source>
<year>2010</year>
<conf-name>The 3rd IEEE International Conference on Cloud</conf-name>
<conf-date>July 5-10, 2010</conf-date>
<conf-loc>Miami, FL, USA</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/CLOUD.2010.62</pub-id>
</element-citation>
</ref>
<ref id="ref56">
<label>56</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Baliga</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ayre</surname>
<given-names>RWA</given-names>
</name>
<name>
<surname>Hinton</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Tucker</surname>
<given-names>RS</given-names>
</name>
</person-group>
<article-title>Green cloud computing: balancing energy in processing, storage, and transport</article-title>
<source>Proc IEEE</source>
<year>2011</year>
<volume>99</volume>
<issue>1</issue>
<fpage>149</fpage>
<lpage>167</lpage>
<pub-id pub-id-type="doi">10.1109/JPROC.2010.2060451</pub-id>
</element-citation>
</ref>
<ref id="ref57">
<label>57</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Durkee</surname>
<given-names>D</given-names>
</name>
</person-group>
<article-title>Why cloud computing will never be free</article-title>
<source>Commun ACM</source>
<year>2010</year>
<volume>53</volume>
<issue>5</issue>
<fpage>70</fpage>
<lpage>69</lpage>
<pub-id pub-id-type="doi">10.1145/1735223.1735243</pub-id>
</element-citation>
</ref>
<ref id="ref58">
<label>58</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>European Network and Information Security Agency</collab>
</person-group>
<source>ENISA</source>
<year>2009</year>
<month>11</month>
<date-in-citation>2011-07-23</date-in-citation>
<comment>An SME Perspective on Cloud Computing: Survey
<ext-link ext-link-type="uri" xlink:href="http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey/">http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey/</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO1c8l6"></ext-link>
</element-citation>
</ref>
<ref id="ref59">
<label>59</label>
<element-citation publication-type="webpage">
<source>Microscoft Corp</source>
<year>2010</year>
<month>11</month>
<date-in-citation>2011-09-07</date-in-citation>
<comment>Privacy in the Cloud: A Microsoft Perspective
<ext-link ext-link-type="uri" xlink:href="http://www.microsoft.com/privacy/cloudcomputing.aspx">http://www.microsoft.com/privacy/cloudcomputing.aspx</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="61WdQxiyd"></ext-link>
</element-citation>
</ref>
<ref id="ref60">
<label>60</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Google Privacy Center</collab>
</person-group>
<source>Google</source>
<year>2010</year>
<month>10</month>
<day>3</day>
<date-in-citation>2011-08-06</date-in-citation>
<comment>Privacy Policy
<ext-link ext-link-type="uri" xlink:href="http://www.google.com/google-d-s/intl/en/privacy.html">http://www.google.com/google-d-s/intl/en/privacy.html</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO3Cyfl"></ext-link>
</element-citation>
</ref>
<ref id="ref61">
<label>61</label>
<element-citation publication-type="webpage">
<source>Amazon Web Services</source>
<year>2008</year>
<month>10</month>
<day>01</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>AWS Privacy Notice
<ext-link ext-link-type="uri" xlink:href="http://aws.amazon.com/privacy/">http://aws.amazon.com/privacy/</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO4Fxhu"></ext-link>
</element-citation>
</ref>
<ref id="ref62">
<label>62</label>
<element-citation publication-type="webpage">
<source>Cloud Security Alliance</source>
<year>2009</year>
<month>12</month>
<date-in-citation>2011-07-25</date-in-citation>
<comment>Security Guidance for Critical Areas of Focus in Cloud Computing V2.1
<ext-link ext-link-type="uri" xlink:href="http://www.cloudsecurityalliance.org/csaguide.pdf">http://www.cloudsecurityalliance.org/csaguide.pdf</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO5MSs7"></ext-link>
</element-citation>
</ref>
<ref id="ref63">
<label>63</label>
<element-citation publication-type="webpage">
<source>US Department of Health & Human Services</source>
<year>1996</year>
<date-in-citation>2011-07-26</date-in-citation>
<comment>The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules
<ext-link ext-link-type="uri" xlink:href="http://www.hhs.gov/ocr/privacy/">http://www.hhs.gov/ocr/privacy/</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO6ZCde"></ext-link>
</element-citation>
</ref>
<ref id="ref64">
<label>64</label>
<element-citation publication-type="webpage">
<source>Minister of Justice, Canada</source>
<year>2011</year>
<month>1</month>
<day>1</day>
<date-in-citation>2011-08-05</date-in-citation>
<comment>Personal Information Protection and Electronic Documents Act (PIPEDA)
<ext-link ext-link-type="uri" xlink:href="http://laws.justice.gc.ca/PDF/Readability/P-8.6.pdf">http://laws.justice.gc.ca/PDF/Readability/P-8.6.pdf</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO7iHR0"></ext-link>
</element-citation>
</ref>
<ref id="ref65">
<label>65</label>
<element-citation publication-type="webpage">
<source>European Commission</source>
<date-in-citation>2011-08-06</date-in-citation>
<comment>EuroPriSe: The European Privacy Seal for IT Products and IT-Based Services
<ext-link ext-link-type="uri" xlink:href="https://www.european-privacy-seal.eu/">https://www.european-privacy-seal.eu/</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kO8f1ro"></ext-link>
</element-citation>
</ref>
<ref id="ref66">
<label>66</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>United Nations</collab>
</person-group>
<source>United Nations Commission on International Trade Law</source>
<year>2010</year>
<date-in-citation>2011-08-05</date-in-citation>
<comment>UNCITRAL Legislative Guide on Secured Transactions
<ext-link ext-link-type="uri" xlink:href="http://www.uncitral.org/pdf/english/texts/security-lg/e/09-82670_Ebook-Guide_09-04-10English.pdf">http://www.uncitral.org/pdf/english/texts/security-lg/e/09-82670_Ebook-Guide_09-04-10English.pdf</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60lQfpIr4"></ext-link>
</element-citation>
</ref>
<ref id="ref67">
<label>67</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Pearson</surname>
<given-names>S</given-names>
</name>
</person-group>
<article-title>Taking account of privacy when designing cloud computing services</article-title>
<source>Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD'09)</source>
<year>2009</year>
<conf-name>the IEEE First international workshop on software engineering challenges for Cloud Computing (ICSE)</conf-name>
<conf-date>May 16-24, 2009</conf-date>
<conf-loc>Vancouver, BC, Canada</conf-loc>
<publisher-loc>New York, NY</publisher-loc>
<publisher-name>IEEE</publisher-name>
<pub-id pub-id-type="doi">10.1109/CLOUD.2009.5071532</pub-id>
</element-citation>
</ref>
<ref id="ref68">
<label>68</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Svantesson</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Clarke</surname>
<given-names>R</given-names>
</name>
</person-group>
<article-title>Privacy and consumer risks in cloud computing</article-title>
<source>Comput Law Secur Rev</source>
<year>2010</year>
<volume>26</volume>
<issue>4</issue>
<fpage>391</fpage>
<lpage>397</lpage>
<pub-id pub-id-type="doi">10.1016/j.clsr.2010.05.005</pub-id>
</element-citation>
</ref>
<ref id="ref69">
<label>69</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Mather</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Kumaraswamy</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Latif</surname>
<given-names>S</given-names>
</name>
</person-group>
<source>Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)</source>
<year>2009</year>
<publisher-loc>Sebastopol, CA</publisher-loc>
<publisher-name>O'Reilly Media, Inc.</publisher-name>
</element-citation>
</ref>
<ref id="ref70">
<label>70</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kuner</surname>
<given-names>C</given-names>
</name>
</person-group>
<article-title>Data protection law and international jurisdiction on the Internet (part 1)</article-title>
<source>Int J Law Inf Technol</source>
<year>2010</year>
<volume>18</volume>
<issue>2</issue>
<fpage>176</fpage>
<lpage>201</lpage>
<pub-id pub-id-type="doi">10.1093/ijlit/eaq002</pub-id>
</element-citation>
</ref>
<ref id="ref71">
<label>71</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ward</surname>
<given-names>BT</given-names>
</name>
<name>
<surname>Sipior</surname>
<given-names>JC</given-names>
</name>
</person-group>
<article-title>The Internet jurisdiction risk of cloud computing</article-title>
<source>Inf Syst Manag</source>
<year>2010</year>
<volume>27</volume>
<issue>4</issue>
<fpage>334</fpage>
<lpage>339</lpage>
<pub-id pub-id-type="doi">10.1080/10580530.2010.514248</pub-id>
</element-citation>
</ref>
<ref id="ref72">
<label>72</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Financial Crimes Enforcement Network</collab>
<collab>US Department of Treasury</collab>
</person-group>
<source>FinCEN</source>
<date-in-citation>2011-07-13</date-in-citation>
<comment>Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001. no date
<ext-link ext-link-type="uri" xlink:href="http://www.fincen.gov/statutes_regs/patriot/index.html">http://www.fincen.gov/statutes_regs/patriot/index.html</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kQGBI3G"></ext-link>
</element-citation>
</ref>
<ref id="ref73">
<label>73</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Cavoukian</surname>
<given-names>A</given-names>
</name>
</person-group>
<source>Information and Privacy Commissioner, Ontario, Canada</source>
<year>2009</year>
<month>11</month>
<date-in-citation>2011-07-13</date-in-citation>
<comment>A Discussion Paper on Privacy Externalities, Security Breach Notification and the Role of Independent Oversight
<ext-link ext-link-type="uri" xlink:href="http://www.ipc.on.ca/images/Resources/privacy_externalities.pdf">http://www.ipc.on.ca/images/Resources/privacy_externalities.pdf</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kQ6Ist2"></ext-link>
</element-citation>
</ref>
<ref id="ref74">
<label>74</label>
<element-citation publication-type="webpage">
<source>Javelin Strategy & Research</source>
<year>2011</year>
<date-in-citation>2011-07-23</date-in-citation>
<comment>Data Breach Notifications: Victims Face Four Times Higher Risk of Fraud
<ext-link ext-link-type="uri" xlink:href="https://www.javelinstrategy.com/brochure-158">https://www.javelinstrategy.com/brochure-158</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kOBDUIf"></ext-link>
</element-citation>
</ref>
<ref id="ref75">
<label>75</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Marks</surname>
<given-names>EA</given-names>
</name>
<name>
<surname>Lozano</surname>
<given-names>B</given-names>
</name>
</person-group>
<source>Executive's Guide to Cloud Computing</source>
<year>2010</year>
<publisher-loc>Hoboken, NJ</publisher-loc>
<publisher-name>Wiley</publisher-name>
</element-citation>
</ref>
<ref id="ref76">
<label>76</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>White Paper</collab>
</person-group>
<source>Project Management Institute (PMI)</source>
<year>2011</year>
<date-in-citation>2011-07-23</date-in-citation>
<comment>Cloud Computing: The New Strategic Weapon
<ext-link ext-link-type="uri" xlink:href="http://www.pmi.org/~/media/PDF/Home/CloudComputing_FINAL.ashx">http://www.pmi.org/~/media/PDF/Home/CloudComputing_FINAL.ashx</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kPwduxn"></ext-link>
</element-citation>
</ref>
<ref id="ref77">
<label>77</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Stanoevska-Slabeva</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Wozniak</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Hoyer</surname>
<given-names>V</given-names>
</name>
</person-group>
<person-group person-group-type="editor">
<name>
<surname>Stanoevska-Slabeva</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Wozniak</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Ristol</surname>
<given-names>S</given-names>
</name>
</person-group>
<article-title>Practical guidelines for evolving IT infrastructure towards grids and clouds</article-title>
<source>Stanoevska- Slabeva K, Wozniak T, Ristol S. editors. Grid and Cloud Computing: A Business Perspective on Technology and Applications</source>
<year>2010</year>
<publisher-loc>Berlin</publisher-loc>
<publisher-name>Springer</publisher-name>
<fpage>225</fpage>
<lpage>243</lpage>
</element-citation>
</ref>
<ref id="ref78">
<label>78</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<collab>US Department of Health & Human Services</collab>
<collab>Office of the National Coordinator for Health Information Technology</collab>
</person-group>
<source>The ONC-Coordinated Federal Health IT Strategic Plan: 2008-2012</source>
<year>2008</year>
<publisher-loc>Washington, DC</publisher-loc>
<publisher-name>ONC-HIT</publisher-name>
</element-citation>
</ref>
<ref id="ref79">
<label>79</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kuo</surname>
<given-names>AM</given-names>
</name>
<name>
<surname>Borycki</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Kushniruk</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>TS</given-names>
</name>
</person-group>
<article-title>A healthcare Lean Six Sigma System for postanesthesia care unit workflow improvement</article-title>
<source>Qual Manag Health Care</source>
<year>2011</year>
<volume>20</volume>
<issue>1</issue>
<fpage>4</fpage>
<lpage>14</lpage>
<pub-id pub-id-type="doi">10.1097/QMH.0b013e3182033791</pub-id>
<pub-id pub-id-type="medline">21192203</pub-id>
<pub-id pub-id-type="pii">00019514-201101000-00004</pub-id>
<pub-id pub-id-type="pmid">21192203</pub-id>
</element-citation>
</ref>
<ref id="ref80">
<label>80</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lee</surname>
<given-names>TS</given-names>
</name>
<name>
<surname>Kuo</surname>
<given-names>MH</given-names>
</name>
</person-group>
<article-title>Toyota A3 report: a tool for process improvement in healthcare</article-title>
<source>Stud Health Technol Inform</source>
<year>2009</year>
<volume>143</volume>
<fpage>235</fpage>
<lpage>40</lpage>
<pub-id pub-id-type="medline">19380942</pub-id>
<pub-id pub-id-type="pmid">19380942</pub-id>
</element-citation>
</ref>
<ref id="ref81">
<label>81</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marston</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Bandyopadhyay</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ghalsasi</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>Cloud computing: the business perspective</article-title>
<source>Decis Support Syst</source>
<year>2011</year>
<volume>51</volume>
<issue>1</issue>
<fpage>176</fpage>
<lpage>189</lpage>
<pub-id pub-id-type="doi">10.1016/j.dss.2010.12.006</pub-id>
</element-citation>
</ref>
<ref id="ref82">
<label>82</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Buyya</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Ranjan</surname>
<given-names>R</given-names>
</name>
</person-group>
<article-title>Special section: Federated resource management in grid and cloud computing systems</article-title>
<source>Future Generation Comput Syst</source>
<year>2010</year>
<volume>26</volume>
<issue>8</issue>
<fpage>1189</fpage>
<lpage>1191</lpage>
<pub-id pub-id-type="doi">10.1016/j.future.2010.06.003</pub-id>
</element-citation>
</ref>
<ref id="ref83">
<label>83</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kuo</surname>
<given-names>MH</given-names>
</name>
<name>
<surname>Kushniruk</surname>
<given-names>AW</given-names>
</name>
<name>
<surname>Borycki</surname>
<given-names>EM</given-names>
</name>
</person-group>
<article-title>Design and implementation of a health data interoperability mediator</article-title>
<source>Stud Health Technol Inform</source>
<year>2010</year>
<volume>155</volume>
<fpage>101</fpage>
<lpage>7</lpage>
<pub-id pub-id-type="medline">20543316</pub-id>
<pub-id pub-id-type="pmid">20543316</pub-id>
</element-citation>
</ref>
<ref id="ref84">
<label>84</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Gagliardi</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Muscella</surname>
<given-names>S</given-names>
</name>
</person-group>
<person-group person-group-type="editor">
<name>
<surname>Antonopoulos</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Gillam</surname>
<given-names>L</given-names>
</name>
</person-group>
<article-title>Cloud computing: data confidentiality and interoperability challenges</article-title>
<source>Antonopoulos N, Gillam L. editors. Cloud Computing: Principles, Systems and Applications (Computer Communications and Networks)</source>
<year>2010</year>
<publisher-loc>London</publisher-loc>
<publisher-name>Springer</publisher-name>
<fpage>257</fpage>
<lpage>270</lpage>
</element-citation>
</ref>
<ref id="ref85">
<label>85</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Knowledge@Wharton</collab>
</person-group>
<source>Wharton Business School, University of Pennsylvania</source>
<year>2009</year>
<month>4</month>
<day>1</day>
<date-in-citation>2011-07-15</date-in-citation>
<comment>No Man Is an Island: The Promise of Cloud Computing
<ext-link ext-link-type="uri" xlink:href="http://knowledge.wharton.upenn.edu/article.cfm?articleid=2190">http://knowledge.wharton.upenn.edu/article.cfm?articleid=2190</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kOCuNNL"></ext-link>
</element-citation>
</ref>
<ref id="ref86">
<label>86</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Creeger</surname>
<given-names>M</given-names>
</name>
</person-group>
<article-title>CTO roundtable: cloud computing</article-title>
<source>Commun ACM</source>
<year>2009</year>
<volume>52</volume>
<issue>8</issue>
<fpage>50</fpage>
<lpage>56</lpage>
<pub-id pub-id-type="doi">10.1145/1536616.1536633</pub-id>
</element-citation>
</ref>
<ref id="ref87">
<label>87</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fox</surname>
<given-names>A</given-names>
</name>
</person-group>
<article-title>Computer science. Cloud computing: what's in it for me as a scientist?</article-title>
<source>Science</source>
<year>2011</year>
<month>1</month>
<day>28</day>
<volume>331</volume>
<issue>6016</issue>
<fpage>406</fpage>
<lpage>7</lpage>
<pub-id pub-id-type="doi">10.1126/science.1198981</pub-id>
<pub-id pub-id-type="medline">21273473</pub-id>
<pub-id pub-id-type="pii">331/6016/406</pub-id>
<pub-id pub-id-type="pmid">21273473</pub-id>
</element-citation>
</ref>
<ref id="ref88">
<label>88</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>Gartner Newsroom</collab>
</person-group>
<source>Gartner, Inc</source>
<year>2011</year>
<month>1</month>
<day>21</day>
<date-in-citation>2011-07-14</date-in-citation>
<comment>Gartner Executive Programs Worldwide Survey of More Than 2,000 CIOs Identifies Cloud Computing as Top Technology Priority for CIOs in 2011
<ext-link ext-link-type="uri" xlink:href="http://www.gartner.com/it/page.jsp?id=1526414">http://www.gartner.com/it/page.jsp?id=1526414</ext-link>
</comment>
<ext-link ext-link-type="webcite" xlink:href="60kOEKBmh"></ext-link>
</element-citation>
</ref>
</ref-list>
</back>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000555 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000555 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     PMC:3222190
   |texte=   Opportunities and Challenges of Cloud Computing to Improve Health Care Services
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/RBID.i   -Sk "pubmed:21937354" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd   \
       | NlmPubMed2Wicri -a CyberinfraV1 

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024