If there is a DOI:
Author last name, author first initial. (Year). Article title. Journal Title, volume(issue), page range. DOI
Cusack, B., & Ghazizadeh, E. (2016). Evaluating single sign-on security failure in cloud services. Business Horizons, 59(6), 605-614. https://https://doi.org/10.1016/j.bushor.2016.08.002
If there is no DOI, then use the home page of the journal website:
Author last name, author first initial. (Year). Article title. Journal Title, volume(issue), page range. Retrieved from journal home page
He, L., Huang, F., Zhang, J., Liu, B., Chen, C., Zhang, Z., & ... Lu, W. (2016). Dynamic secure interconnection for security enhancement in cloud computing. International Journal Of Computers, Communications & Control, 11(3), 348-357. Retrieved from http://univagora.ro/jour/index.php/ijccc/
Author last name, author first initial. (Year). Book title. Publication city and state: Publisher name.
DuFrene, D. D., & Lehman, C. M. (2012). Managing virtual teams. New York, NY: Business Expert Press.
If there is a DOI:
Author last name, author first initial. (Year). Ebook title. DOI
Wankel, C. (2009). Encyclopedia of business in today's world. http://doi.org/10.4135/9781412964289
If there is no DOI, then use the URL of the home page of the database:
Author last name, author first initial. (Year). Ebook title. Retrieved from database home page
Dhivakar, A. (2015). A multi-level security in cloud computing: Image sequencing and RSA algorithm. Hamburg: Anchor. Retrieved from http://www.ebscohost.com
Author last name, author first initial. (Date). Page title. Retrieved from Web page address
NIST. (2016, July 29).Cloud Computing. Retrieved from https://www.nist.gov/programs-projects/cloud-computing