Fig. 11From: Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspectiveCurrent best practice for mitigating cloud lock-in risksBack to article page