<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>E-Waste &amp; the Circular Economy: An Irish SME Context</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tom O'Farrell</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dr Angela Wright</string-name>
          <email>angela.wright@cit.ie</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cork Institute of Technology/CIT</institution>
          ,
          <addr-line>Cork -</addr-line>
          <country country="IE">Ireland</country>
        </aff>
      </contrib-group>
      <fpage>257</fpage>
      <lpage>275</lpage>
      <abstract>
        <p>E-waste is a term given to waste generated by electrical and electronic equipment (WEEE). It is one the fastest growing waste streams in the EU, and it is expected to grow to more than 12 million tonnes by 2020. WEEE raises a dual problem for the environment; on the one hand, the composition of WEEE is highly toxic and represents a serious threat to the environment, and on the other, there are precious materials that can be recovered from WEEE; materials that can be used in the production of other goods. Reverse logistics is mainly the backward flow of used products from consumers to producers. Remanufacturing brings the benefits of availability, economics and security, energy savings, and reduction in the need for dirty processes. The estimated value for all manufactured products in the remanufacturing intensive sectors is €1.5 trillion. The growing problem of E-waste is defined in this research, and the benefits of the services that 'Wisetek', (the company at the core of this research) offer for managing this E-waste issue are outlined. E-waste is a solution for data centres and Wisetek are leaders in the circular economy. Their services include remanufacturing IT equipment and then remarketing to approved buyers. This research study recommends that Wisetek adopt an innovative approach through their strategic decision making to transfer their competencies into the EU. The strong presence that Wisetek have in other key global regions must be enhanced into the European market.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Wisetek are IT asset disposal (ITAD), reuse and data destruction services providers.
Leaders in the circular economy, their services to clients include global site audits of
IT equipment and providing their clients tailored reports. Wisetek’s TotalRMA™ web
portal provides data centres with secure and easy to use online system, that allows data
centre personnel to register redundant product details. Wisetek provide
remanufacturing services of IT equipment. This involves dismantling IT equipment and any
recovered components are tested. Components that are reusable are then re-marketed to
approved buyers, defective or non-usable components are responsibly recycled to the R2
standard (Wisetek.net). This research study is an empirical investigation into the
importance of reverse logistics, remanufacturing and electronic recycling in data centres,
in particular a focus on the data centre hubs in Germany and The Netherlands. Western
Europe has established a number of technology hubs in major cities including Dublin,
London, Amsterdam and Frankfurt, that are growing rapidly. The study examines a
range of topical issues in cloud computing and data centres. The issues of
remanufacturing and reverse logistics, along with recycling of electronic waste (E-waste) with
regard to current legislation, cyber security, corporate social responsibility (CSR) and
efficiencies in data centre infrastructure management are investigated. The next section
presents the research context and research question.
1.1</p>
      <sec id="sec-1-1">
        <title>1.1 Research Context</title>
        <p>
          The circular economy is perhaps the biggest revolution for the global economy in
the last 250 years and is gaining momentum
          <xref ref-type="bibr" rid="ref83">(Timmermans, 2016)</xref>
          ; in 15 years from
now, it could be worth $4.5 trillion. Geissdoerfer et al., (2017) define the Circular
Economy as a regenerative system in which resource input, waste emission and energy
leakage are minimised by slowing, closing and narrowing material and energy loops. A
circular economy requires a transformation of both production and consumption
systems; the standard approach for creation, fabrication and commerce of products is
challenged
          <xref ref-type="bibr" rid="ref13 ref19 ref43 ref52 ref93">(De los Rios and Charnley, 2016)</xref>
          . The concept of the circular economy is, to an
increasing extent, treated as a solution to a series of challenges,
          <xref ref-type="bibr" rid="ref13 ref43 ref52 ref93">(Lieder and Rashid,
2016)</xref>
          such as waste generation, resource scarcity and sustaining economic benefits.
Switching from the current linear model of economy to a circular one, has recently
attracted increased attention from major global companies e.g., Google, Unilever,
Renault, noted by Lewandowski, (2016) and policymakers attending the World Economic
Forum. The reasons for this are very significant financial, social and environmental
benefits
          <xref ref-type="bibr" rid="ref51">(Lewandowski, 2016)</xref>
          . Reverse logistics, indicating the process of this return
flow highlighted by Olariu (2014) encompasses such activities as the movement of
returned products, facilities to accommodate returned items and overall remedy process
for returned items. The area of reverse logistics has recently received considerable
attention, due to a combination of environmental, economic and social factors
          <xref ref-type="bibr" rid="ref59">(Olariu,
2014)</xref>
          . Reverse logistics refers to the series of operations as articulated by Alshamsi
and Diabat (2015) that initiate at the consumer level with the collection of products and
terminate with the re-processing of these products at remanufacturing facilities.
Reverse logistics, which is mainly the backward flows of used products from consumers
to producers, is an important stage while constructing a recovery system
          <xref ref-type="bibr" rid="ref2 ref81 ref86">(Alshamsi and
Diabat, 2015)</xref>
          . A remanufactured component is, by definition,
          <xref ref-type="bibr" rid="ref67">(Robinson, 2014)</xref>
          going
to provide the same service as the original, so that the original component or system
considerably extends its life, therefore, end-of-life scrapping is postponed.
Remanufacturing and refurbishing activities also may be included in the definition of reverse
logistics
          <xref ref-type="bibr" rid="ref67">(Robinson, 2014)</xref>
          . The development of remanufacturing highlighted by Xiong
et al., (2016) in many industries where high-profile manufacturers like Boeing,
Caterpillar, General Electric, IBM, Kodak, Volkswagen and Xerox initiate a business model
in which remanufacturing is an integral part
          <xref ref-type="bibr" rid="ref92">(Xiong et al., 2016)</xref>
          . Remanufacturing
makes up a small share of European manufacturing output, accounting for an estimated
1.9 % of total production value in these sectors. The four key regions estimated to
account for some 70 % of remanufacturing value in Europe are, Germany, the UK,
Ireland, France and Italy. Germany undertakes most remanufacturing by a significant
margin, making up almost a third of the European market (Remanufacturing.eu).
Ewaste is a term given to waste generated by electrical and electronic equipment (WEEE)
          <xref ref-type="bibr" rid="ref39">(Heacock et al., 2016)</xref>
          . This comprises of equipment such as televisions, mobile phones,
computers, IT equipment and household appliances. E-waste is produced in staggering
quantities, estimated globally to be 41.8 million tonnes in 2014
          <xref ref-type="bibr" rid="ref39">(Heacock et al., 2016)</xref>
          .
It is one the fastest growing waste streams in the EU, with some 9 million tonnes
generated in 2005 and expected to grow to more than 12 million tonnes by 2020
(Ec.europa.eu). Baldé et al., (2014) note that in Europe, the total E-waste generation was 11.6
million metric tonnes in 2014. The European countries with the highest E-waste
generation in absolute quantities are, Germany (1.8 million metric tonnes), The United
Kingdom (1.5 million metric tonnes) and France (1.4 million metric tonnes) (Baldé et al.,
2014). Recycling for E-waste will be a necessity, not only to address the shortage of
mineral resources for the electronics industry, but also to decline the environmental
pollution and human health risk
          <xref ref-type="bibr" rid="ref95">(Zeng et al., 2017)</xref>
          . The rapid consumption of new
electronic devices has expanded the volume of E-waste, Gonul Kochan et al., (2016)
and this has created a potential threat to the environment. Recycling of E-waste can
help stem the proliferation of E-waste and its environmental threat
          <xref ref-type="bibr" rid="ref33">(Gonul Kochan et
al., 2016)</xref>
          . In Europe, manual dismantling as a first treatment step has been gradually
replaced by mechanical break up of appliances,
          <xref ref-type="bibr" rid="ref72">(Salhofer et al., 2016)</xref>
          followed by
sorting out of hazardous and valuable components
          <xref ref-type="bibr" rid="ref72">(Salhofer et al., 2016)</xref>
          . Recycling of
electronics is good for the environment when done in an appropriate manner as it
recovers materials for reuse and reduces waste in landfills
          <xref ref-type="bibr" rid="ref13 ref43 ref52 ref93">(Ceballos and Dong, 2016)</xref>
          .
Cloud computing has become the next logical step for the IT industry. It's the new
strategic weapon in enterprise computing and the new norm in every sector of society.
Businesses, educational institutions, governments, community organizations and
individuals are looking at cloud offerings to manage information, instead of infrastructure
          <xref ref-type="bibr" rid="ref7">(Bojanova et al., 2013)</xref>
          . The cloud computing paradigm has sustained its growth, which
has led to increase an in size and the number of data centres. Data centres with
thousands of computing devices are deployed as back end to provide cloud services (Shuja
et al., 2016). Data centres are physical infrastructures that are used for housing and
operating servers, routers, switches and networking systems, along with, storing and
processing a large amount of data belong to an organisation (Sapdatacentre.com). These
new data centres are the physical manifestation Katz (2009) of what Internet companies
are calling cloud computing. The physical environment of data centres are strictly
regulated and air conditioning is used to control both the temperature and humidity, Jones
et al., (2013) and data centres also have water and smoke detection systems and
sprinkler systems. Powerful cooling systems are required to offset the heat produced by the
servers and more energy is needed for cooling, than for data storage and processing
          <xref ref-type="bibr" rid="ref46">(Jones et al., 2013)</xref>
          . Data centres must provide not only performance guarantees, but
reliability ones as well
          <xref ref-type="bibr" rid="ref88">(Wood, 2011)</xref>
          . Disaster recovery services attempt to protect
applications by continuously replicating to a secondary data centre, that can be switched
to, in the event of catastrophic data centre failure
          <xref ref-type="bibr" rid="ref88">(Wood, 2011)</xref>
          . The aims of this
research study are to provide an analysis of reverse logistics, remanufacturing and
electronic recycling in the data centre hubs of Frankfurt and Amsterdam and how likely is
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Literature Review</title>
      <sec id="sec-2-1">
        <title>Data Centres</title>
        <p>it that the service offerings of Wisetek will fit into these markets in the future. The next
section presents the literature review for this research study.</p>
        <p>
          A data centre (or datacentre) is a facility composed of networked computers and
storage that businesses or other organizations use
          <xref ref-type="bibr" rid="ref69">(Rouse, 2010)</xref>
          . Data centres are
described by Flucker and Tozer (2013) as mission critical facilities; they are essential for
the business to carry out its mission and hence any interruption in service, downtime or
unavailability usually has a significant cost impact
          <xref ref-type="bibr" rid="ref23 ref27">(Flucker and Tozer, 2013)</xref>
          . The
concept of data centres has been around since the late 1950s, when American Airlines and
IBM partnered to create a passenger reservations system, automating one of its key
business areas
          <xref ref-type="bibr" rid="ref89">(Woods, 2014)</xref>
          . Server virtualization technologies first appeared in the
1960s to enable timesharing of expensive hardware between multiple users
          <xref ref-type="bibr" rid="ref18">(Dasgupta
et al., 2011)</xref>
          . Carcary et al., (2013) note that by 2011, it had become the top technology
priority for organizations worldwide to reach $241 billion by 2020. Hao et al., (2010)
state that today’s large data centres are the computational hubs of the next generation
of IT services
          <xref ref-type="bibr" rid="ref38">(Hao et al., 2010)</xref>
          . This is disputed by Fulton III (2016) stating that the
Internet of Things (IoT) would be a cleverer architecture than a colossal hub-and-spoke
topology that testifies to its power to change the landscape of data centres. IoT could,
if it continues to develop the way it has, draw more compute, storage and bandwidth
power towards the edge away from centralized facilities and closer to where these
various streams of data are being gathered
          <xref ref-type="bibr" rid="ref28">(Fulton III, 2016)</xref>
          . A data centre typically houses
a large number of computing and storage nodes, interconnected by a specially designed
network, namely, data centre network (DCN)
          <xref ref-type="bibr" rid="ref91">(Xia et al., 2016)</xref>
          . Data centres that house
the cloud systems, revealed by Preimesberger (2015) that serve up the apps used on
connected devices, are popping up all over the globe and often in cities away from the
traditional core markets
          <xref ref-type="bibr" rid="ref63">(Preimesberger, 2015)</xref>
          . Yesilyurt and Yalman (2016) suggest
that this model has become more desirable for all institutions, organizations and for
personal use thanks to the storage of ‘valuable information’ at low costs, access to such
information from anywhere in the world, as well as its ease of use and low cost
          <xref ref-type="bibr" rid="ref13 ref43 ref52 ref93">(Yesilyurt and Yalman, 2016)</xref>
          . The proprietary rating system begins with Tier 1 data
centres, which are basically warehouses with power and ends with Tier 4 data centres,
which offer 2N redundant power and cooling in addition to a 99.99% uptime guarantee
(Colocationamerica.com). Arno et al., (2012) state that the Tier classifications provide
guidelines and a gradient scale of data centre designs, that can be used in conjunction
with reliability engineering to design or evaluate an existing critical facility
          <xref ref-type="bibr" rid="ref3">(Arno et
al., 2012)</xref>
          .
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Types of Data Centres</title>
        <p>
          Data Centre Hosting is provided by a facility that stores and maintains servers and
applications for clients and it can help companies reduce capital expenditures and
accelerate the implementation of technology with on-demand services (Cyrusone.com).
Guo et al., (2017) outline that colocation data centres who rent out spaces to multiple
tenants to house their servers, are another important but under-explored type of data
centre
          <xref ref-type="bibr" rid="ref34">(Guo et al., 2017)</xref>
          . Masoud et al., (2017) state that internet exchange points
(IXPs) emerged to remedy the deficiency of peering connections among autonomous
systems (ASes) and play an important role in reducing the cost of transit connections
over the Internet
          <xref ref-type="bibr" rid="ref55">(Masoud et al., 2017)</xref>
          . It is outlined by Benson et al., (2010) that as
data centres become increasingly central in Internet communications, both research and
operations communities have begun to explore how to better design and manage them
          <xref ref-type="bibr" rid="ref6">(Benson et al., 2010)</xref>
          . Security and privacy of data are some of the most important issues
of cloud data services
          <xref ref-type="bibr" rid="ref82">(Tang et al., 2016)</xref>
          . It is noted by Silverman (2016) that in
November 2015, Target settled with the consumer class for $10 million plus $6.75 million
in attorney's fees. In May 2016, it settled with the last third of the issuing banks for
nearly $60 million, with just under $20 million in fees and expenses for plaintiffs'
counsel following their data breach. Silverman (2016) further notes that Home Depot settled
its consumer claims at $19.5 million for damages and prevention plus around $8.5
million in fees and costs
          <xref ref-type="bibr" rid="ref80">(Silverman, 2016)</xref>
          .
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>E-Waste</title>
        <p>
          As of 2010, the Environmental Protection Agency, according to Dewey (2013)
reported that of the 2,440,000 tons of disposed of technology waste which included
computers, monitors, hard copy devices, keyboards and mice, televisions, mobile devices
and TV peripherals, 1,790,000 tons were sent to landfill and only 649,000 tons, or 27%,
was recycled
          <xref ref-type="bibr" rid="ref20">(Dewey, 2013)</xref>
          . Rosenfeld and Feng (2011) convey that electronic waste
is responsible for 70% of the heavy metals (including mercury and chromium) found
in landfills
          <xref ref-type="bibr" rid="ref68">(Rosenfeld and Feng, 2011)</xref>
          . In January 2003, the EU issued a directive on
E-waste to deal with increasing quantities and the included hazardous components
          <xref ref-type="bibr" rid="ref23 ref27">(Favot and Marini, 2013)</xref>
          . It is claimed by Peagam et al., (2013) that very little business to
business WEEE is reported as collected in the EU in compliance with the WEEE
Directive, which uses the policy principle of extended producer responsibility (EPR) to
ensure that WEEE is managed correctly
          <xref ref-type="bibr" rid="ref62">(Peagam et al., 2013)</xref>
          . A series of reports
revealed that such major E-waste flows reach China, India, Pakistan, Ghana and Nigeria,
outlined by Kuper and Hojsik (2008) that in these countries, refurbishment and
recycling activities are mostly carried out by the informal E-waste sector, which is
characterized by poor working conditions with insufficient management of hazardous
substances leading to adverse impacts on human health and the environment
          <xref ref-type="bibr" rid="ref1 ref49">(Kuper and
Hojsik, 2008)</xref>
          . As the world’s largest dumping ground for E-waste, much of the
population in Guiyu, China is exposed to heavy metals due to informal E-waste recycling
processes
          <xref ref-type="bibr" rid="ref2 ref81 ref86">(Song and Li, 2015)</xref>
          . Vick (2016) notes that data centre decommissioning has
recently become an evolving function that is more than just IT Asset. Remanufacturing,
by taking back used products, can help firms meet environmental regulations and
improve economic benefits
          <xref ref-type="bibr" rid="ref37">(Han et al., 2016)</xref>
          . Ruth (2009) concludes that significant new
regulations for IT equipment disposal to stringent energy-efficiency specifications for
PCs and monitors to national standards for data centre power savings, Green IT is an
"in" topic
          <xref ref-type="bibr" rid="ref71">(Ruth, 2009)</xref>
          .
2.4
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>E-Waste Legislation</title>
        <p>
          Abu Bakar and Rahimifard (2008) explain that in Europe, 7.3 million tonnes of
WEEE were created in 2002 and the growth rate of WEEE is 3 to 5% per annum, with
a significant amount of this waste used to be dumped into landfills without any
pretreatment, has resulted in the introduction of a European WEEE directive
          <xref ref-type="bibr" rid="ref1 ref49">(Abu Bakar
and Rahimifard, 2008)</xref>
          . Manhart (2011) records that in the last decade, electrical and
electronic equipment (EEE) such as computers, mobile phones and DVD players,
increasingly became mass products in emerging economies and even developing
countries
          <xref ref-type="bibr" rid="ref56">(Manhart, 2011)</xref>
          .
2.5
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>IT Asset Disposition (ITAD)</title>
        <p>
          Disposal or Excess Inventory Management (including Remarketing and
Consignment), is about closing or merging a data centre without a huge loss to your company’s
revenue
          <xref ref-type="bibr" rid="ref85">(Vick, 2016)</xref>
          . IT asset disposal is getting rid of personal computers, servers and
other obsolete or unneeded devices in a secure and environmentally sound manner
          <xref ref-type="bibr" rid="ref12">(Carr, 2007)</xref>
          . Haas et al., (2015) outline that the circular economy is a simple, but
convincing, strategy, which aims at reducing both input of virgin materials and output of
wastes by closing economic and ecological loops of resource flows
          <xref ref-type="bibr" rid="ref35">(Haas et al., 2015)</xref>
          .
There is a window of opportunity to escape the “dump regime”, dumps are being
challenged by the circular economy, which has established instability in the “dump regime”,
          <xref ref-type="bibr" rid="ref45">(Johansson et al., 2012)</xref>
          . Diabat et al., (2013) outline that remanufacturing is the basis
of profit-oriented reverse logistics in which recovered products are restored to a
marketable condition in order to be resold to the primary or secondary market
          <xref ref-type="bibr" rid="ref21">(Diabat et
al., 2013)</xref>
          . Paterson et al., (2017) state that remanufacturing is a product recovery
strategy resulting in end of life products being returned to as new condition or better and
receiving a warranty at least equivalent to the original
          <xref ref-type="bibr" rid="ref61">(Paterson et al., 2017)</xref>
          . It is stated
by McKeen and Smith (2010) that Total Cost of Ownership (TCO) advocates for a
holistic view of IT costs across the enterprise over time, grouped into a series of direct
and indirect cost. Knowing the full costs allows organizations to make optimal
decisions regarding the enhancement, retirement, renewal and/or replacement of critical IT
assets (McKeen and Smith, 20
          <xref ref-type="bibr" rid="ref10">10). Shin et al., (2013</xref>
          ) state that conventional data
centres, based on wired networks, entail high wiring costs, suffer from performance
bottlenecks and have low resilience to network failures
          <xref ref-type="bibr" rid="ref77">(Shin et al., 2013)</xref>
          . Saran (2013)
outlines that tackling energy efficiency in a datacentre’s operations is the main way to
limit its carbon footprint and the cooling system is the biggest culprit in terms of
inefficiency
          <xref ref-type="bibr" rid="ref75">(Saran, 2013)</xref>
          . Hou et al., (2013) conclude that many IT service providers are
in dire need of new servers that can support their applications/services efficiently while
keeping the cost of their data centres under control
          <xref ref-type="bibr" rid="ref41">(Hou et al., 2013)</xref>
          .
2.6
        </p>
      </sec>
      <sec id="sec-2-6">
        <title>Frankfurt and Amsterdam Data Centres</title>
        <p>
          The combined material weight of the servers, networks and storage systems in the
German data centres is 37,500 tonnes, whereas the total product weight of all terminals
comes to 134,300 tonnes
          <xref ref-type="bibr" rid="ref24">(Fichter and Hintemann, 2014)</xref>
          . Frankfurt data centres are
among the world’s most carrier-dense with DE-CIX Frankfurt, the largest Internet
exchange point in the world (Equinix.com). DE-CIX Frankfurt, the flagship in a family
that includes facilities in New York, Istanbul and Dubai is the No.1 Internet traffic hub
on the continent, during peak traffic times, the exchange can move data at a rate
equivalent to processing 4 billion emails per second
          <xref ref-type="bibr" rid="ref36">(Hackett, 2015)</xref>
          . Telecomworldwire.com
claim that Amsterdam is a digital gateway, allowing businesses to reach 80% of Europe
within 50 milliseconds (Telecomworldwire.com). Hackett (2015) concludes that
geographically situated, between several important digital destinations, Frankfurt, London
and Paris, the Amsterdam Internet Exchange serves as one of the biggest traffic routers
in the world, channelling roughly 700,000 terabytes a month
          <xref ref-type="bibr" rid="ref36">(Hackett, 2015)</xref>
          .
2.7
        </p>
      </sec>
      <sec id="sec-2-7">
        <title>General Data Protection Regulations (GDPR)</title>
        <p>
          Directive 95/46/EC on the protection of individuals with regard to the processing of
personal data and on the free movement of such data (the “Data Protection Directive”
or the “Directive”) was adopted as a legislative measure in October 1995
          <xref ref-type="bibr" rid="ref11">(Carey, 2010)</xref>
          .
The Federal Data Protection Commissioners (2017) notes that the current European
Data Protection Directive will be replaced in May 2018 (Ec.europa.eu). Zhang and
Dong (2016) remark that to ensure the security of the outsourced data, data users need
to periodically check data integrity
          <xref ref-type="bibr" rid="ref13 ref43 ref52 ref93">(Zhang and Dong, 2016)</xref>
          . It is explained by Rasheed
(2014) that for many companies the remaining barriers to adopting cloud computing
services are related to security and one of these security issues is the lack of auditability
for various aspects of security in the cloud computing environment
          <xref ref-type="bibr" rid="ref64">(Rasheed, 2014)</xref>
          .
That concludes the Literature Review and the next section presents the Methodology
for this research study.
3
3.1
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <sec id="sec-3-1">
        <title>Case Study Research</title>
        <p>
          Yin (2009: 18) defines a case study as “an empirical inquiry that investigates a
contemporary phenomenon in depth and within its real-life context, especially when the
boundaries between phenomenon and context are not clearly evident”,
          <xref ref-type="bibr" rid="ref94">(Yin, 2009: 18)</xref>
          .
There is a need to clarify and unify the understanding of what is meant by a case study
pointed out by Runeson et al., (2012) and how a good case study is conducted and
reported
          <xref ref-type="bibr" rid="ref70">(Runeson et al., 2012)</xref>
          .
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>The Methodology and Strategy for this Research Study</title>
        <p>This study was exploratory in nature and after an extensive review of the existing
work in the area, in was believed that a post-positivistic approach was the best method
that would afford the most integral range of new data to develop new findings for this
research study. A qualitative research approach was considered as the best way to
accomplish the research objectives outlined earlier in this paper. Given the research
objectives and the research question that needed to be addressed, the researchers believed
however, that a quantitative approach would not generate the rich quality of data
required for this research study, hence, the qualitative path. A thorough review of
secondary research through peer review academic journals, books, newspaper articles,
industry specific magazines, official government statistics, doctorate dissertations,
conference publications and internet websites were undertaken. From this, to create a
process of gathering information from the primary sources, semi structure interviews were
undertaken. First, five semi structured face to face interviews were undertaken with
the board of management of the company at the core of this study – Wisetek, and then,
twelve semi-structured face to face interviews with senior executives in data centres
who had significant experience in the filed were completed. A pilot interview was
conducted first to check for any research issues and to illuminate biased and ensure
reliability and validity.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>The Data Collection Process</title>
        <p>A list of interviewees was developed that would best provide the primary data results
needed to achieve the objectives of this research study. The sample of the interviewees
was purposely selected and directed at senior management in relation to their academic
qualifications and business experience within data centres specifically. The
interviewees were geographically located in the data centre hubs of Frankfurt and Amsterdam
and in Boston, Massachauttes in the USA. An interview guide consisting of four
questions was prepared for the management of Wisetek to obtain a macroenvironmental
overview of the services of Wisetek for data centres and microenvironmental overview
of Wisetek. The questions were discussed in detail and then pilot tested with a business
advisor in the field. From the results of the pilot test, there was obvious ambiguity in
one of the questions that was asked. The questions were then adjusted to allow the
participants a clear understanding of how to answer. These researchers then proceeded
to carry out the interviews with the management of Wisetek. The same process was
followed for the twelve other participants from the data centres. A test was undertaken
with an expert in the field to gains insights and to improve the guide. A concluding
interview guide of 10 questions was finalised after the pilot process. The researchers
believed that these questions were clear and easy to understand and would provide
valuable primary data for this research study.
3.4</p>
      </sec>
      <sec id="sec-3-4">
        <title>Data Analysis</title>
        <p>
          There are seven key methods of analysis, four of which are the pattern-based
methods of thematic analysis, interpretative phenomenological analysis, grounded theory
and pattern-based discourse analysis
          <xref ref-type="bibr" rid="ref8">(Braun, 2013)</xref>
          . Coding and categorising are ways
of analysing that can be applied to all sorts of data and are not focused on a specific
method of data collection as pointed out by
          <xref ref-type="bibr" rid="ref25 ref26">(Flick, 2007a)</xref>
          . This is not the only way of
analysing data, but it is the most prominent one, if the data result comes from
interviews, focus groups or observations. The main activities are to search for relevant parts
of the data and to analyse them by comparing them with other data and by naming and
classifying them
          <xref ref-type="bibr" rid="ref25 ref26">(Flick, 2007a)</xref>
          . Thematic analysis focuses on the data at hand
(Rosenblatt, 2015) rather than demanding a process of repeated analysis, repeated grounds of
data gathering and multiple stages of theory development. Flick (2007b) notes that for
the design of case study triangulation, similar questions arise as for designs in
qualitative research in general. Triangulation can be used in the context of one of the basic
designs in qualitative research. You can plan a case study using a variety of data sorts
or different methods or theoretical approaches.
4
4.1
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Main Findings and Discussion</title>
      <sec id="sec-4-1">
        <title>Competitive Edge</title>
        <p>
          Supporting
          <xref ref-type="bibr" rid="ref37 ref61">(Han et al., 2016; Paterson et al., 2017)</xref>
          , this current research has found
that Wiseteks’ services provide a competitive edge for data centres from their quality,
efficiency, innovation and customer responsiveness in services of data sanitisation and
remanufacturing. This current research has found that 83% of respondents determine
that the circular economy and remanufacturing provide a competitive edge to data
centres through providing end of life value to the IT assets, converting end of life assets
into revenue and decreasing the cost of replacement assets. Similar to Jayaram and Xu
(2016) who found that firms that have a closer alignment between external and internal
knowledge appear to excel in both quality and efficiency
          <xref ref-type="bibr" rid="ref13 ref43 ref52 ref93">(Jayaram and Xu, 2016)</xref>
          .
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Influencers of Change</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref23 ref27 ref62">(Favot and Marini, 2013; Peagam et al., 2013)</xref>
          this current research
study has found that the key core influencers of change for data centres are from the
changes in technology and legislation. There exists an environment of responsible
recycling and of green IT and green computing in companies. This current research has
found that 66% of respondents determine that legislation is the key core influencer of
change while 33% of respondents believe that with the growth of data centres, scaling,
cost reduction and getting value is the key core influencer of change. Seeberger et al.,
(2016) previously found that the USA is a major producer of E-waste, although its
management practice and policy regulation are not sufficient to meet the challenge.
4.3
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Exporting of Competency</title>
        <p>
          In line with
          <xref ref-type="bibr" rid="ref14 ref22 ref44">(Clegg, 2011; Eicher, 2016; Joardar et al., 2014)</xref>
          , this current research
study has found that the exporting of competency as assessed in Wisetek is through
auditing the standards set by Wisetek and the consistency in the facilities in geographic
regions. This current research has found that 66% of respondents believe that auditing
of facilities is how the exporting of competency is viewed. Hillier (2016) previously
outlined that the acquisition of one firm by another is, of course, an investment made
under uncertainty and the basic principles of valuation apply. One firm should acquire
another only if doing so generates a positive net present value for the acquiring firm
          <xref ref-type="bibr" rid="ref40">(Hillier, 2016)</xref>
          .
4.4
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>Competency Assessment</title>
        <p>
          In line with
          <xref ref-type="bibr" rid="ref29 ref9">(Cadle et al., 2014; Gander, 2017; Gębczyńska, 2016)</xref>
          , this current
research study has found that competency is assessed in Wisetek internally and externally
through their critical success factors (CSF’s), key performance indicators (KPI’s), Lean
manufacturing and certification programmes. This research found that 60% of
participants believe that Wisetek’s competency is assessed through their certification and
manufacturing. It has been previously highlighted by Zhang et al., (2016) that Lean
Manufacturing has a higher implementation rate than Six Sigma in the logistics
industry. This is because process variations, what Six Sigma tackles, are often not a main
concern in logistics processes due to the absence of physical transformation (Zhang et
al., 2016).
4.5
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>Understanding of IT Asset Disposition</title>
        <p>
          Supporting
          <xref ref-type="bibr" rid="ref12 ref35 ref45">(Carr, 2007; Haas et al., 2015; Johansson et al., 2012)</xref>
          this current
research has found that IT Asset Disposition is understood as the disposal of switches and
servers other unwanted IT equipment from data centres. This current research has found
that 100% of respondents in Germany and The Netherlands determine that the IT Assets
need to have their data shredded before disposal to eliminate the risk of data breaches.
It has been outlined by Lowe (2011) that a critically important part of data lifecycle
management is destroying data at the end of a medium's useful life. If this step is
overlooked, it can lead to disastrous results. Recommended methods for destroying data on
magnetic media are shredding, degaussing, department of defence level data overwrite,
smelting and encryption from the beginning
          <xref ref-type="bibr" rid="ref53">(Lowe, 2011)</xref>
          .
4.6
        </p>
      </sec>
      <sec id="sec-4-6">
        <title>The Services Expected from an IT Asset Disposition Services Company</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref80 ref82">(Tang et al., 2016; Silverman, 2016;)</xref>
          this current research found that
services expected from an IT Asset Disposition Services Company are a full service of
in house certified data destruction of sensitive equipment containing private and
protected data. This current research found that 100% of respondents from Germany and
50% of respondents from The Netherlands believe that destruction of data and handling
of private and protected data is the top priority. It is stated by Salisch and Mayfield
(2017) that the financial, operational and reputational damage from a data breach can
be enormous and can imperil the very existence of a breached organisation
          <xref ref-type="bibr" rid="ref50 ref73">(Salisch and
Mayfield, 2017)</xref>
          .
4.7
        </p>
      </sec>
      <sec id="sec-4-7">
        <title>Capital expenditure v running cost expenditure</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref41 ref58">(Hou et al., 2013; McKeen and Smith, 2010; Saran, 2010)</xref>
          , another
finding of this current research is the importance of capital expenditure v running cost
expenditure in decision making, when evaluating IT Asset purchase provides variable
information. This current research has found that 40% of respondents in Germany and
100% of respondents in The Netherlands believe that OPEX and total cost of ownership
(TCO) is becoming more important in evaluating IT Assets. According to Gendron
(2014) when IT infrastructure are acquired, they are traditionally treated as CAPEX.
They are recorded as an asset on the balance sheet and depreciated over time. Buying
infrastructure for in-house installation is CAPEX and buying services from a cloud
vendor is OPEX. There is a trade-off between CAPEX and OPEX that occurs when
moving applications to an external cloud
          <xref ref-type="bibr" rid="ref32">(Gendron, 2014)</xref>
          .
4.8
        </p>
      </sec>
      <sec id="sec-4-8">
        <title>Corporate Social Responsibility</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref20 ref23 ref27 ref68">(Dewey, 2013; Favot and Marini, 2013; Rosenfeld and Feng, 2011)</xref>
          ,
this current research found that Green IT is what companies want to be part of. It is
outlined by Dalvi-Esfahani et al., (2017) that some suggestions are made to foster and
enhance psychological drivers in order to motivate managers to adopt Green IT in
organisations, though there is a need to formulate proper strategies and educational
methods to reinforce individual factors of decision-makers more towards environmental
sustainability
          <xref ref-type="bibr" rid="ref17">(Dalvi-Esfahani et al., 2017)</xref>
          .
4.9
        </p>
      </sec>
      <sec id="sec-4-9">
        <title>Benefits for the Data Centre Market</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref12 ref45">(Carr, 2007; Johansson et al., 2012)</xref>
          , this current research found that
the benefits to the data centre market, from and ITAD services company are, that it
generates value and provides a competitive advantage to data centres. Contrary to Shin
et al., (2013) noting that data centres have performance bottlenecks and have low
resilience to network failures. This current research has found that 40% of participants from
Germany and 50% of participants from The Netherlands believe that income from the
disposal of E-waste is a benefit for the data centre market. It was previously stated by
Shuva et al., (2016) that E-waste can be viewed as a resource for metals, as it does not
only contain the common metals like iron (Fe), aluminium (Al), lead (Pb) and copper
(Cu) but also traces of precious and rare elements such as gold (Au), silver (Ag), tin
(Sn), selenium (Se), tellurium (Te), platinum (Pt), palladium (Pd), tantalum (Ta), cobalt
(Co) and indium (In). The recovery of these trace elements is vital, not just because it
has high commercial values, but also for resource efficiency
          <xref ref-type="bibr" rid="ref79">(Shuva et al., 2016)</xref>
          .
4.10
        </p>
      </sec>
      <sec id="sec-4-10">
        <title>Certification Programme</title>
        <p>
          In line with Peagam et al., (2013) and Ruth (2009) another important finding of the
current research is the value of a certification programme. It provides assurance that
compliance with regulations is met. This current research has found that 100% of
participants from Germany and The Netherlands believe that a certificate programme will
motivate and help the industry as long as the certification has meaning and will add
value. Renckens (2015) that non-state certification programmes can emerge as a result
of both failed or absent governmental regulation and international cooperation, the case
of E-waste recycling certification shows that even when an international agreement
with widespread membership exists, non-state regulation covering problems dealt with
under the agreement can still emerge. Established to be used globally, these
programmes do add important elements to existing public E-waste legislation in countries
that have ratified the Basel Convention or which have promulgated legislation dealing
with collection and take-back of E-waste, hazardous content of electronic devices, or
recycling practices
          <xref ref-type="bibr" rid="ref66">(Renckens, 2015)</xref>
          .
4.11
        </p>
      </sec>
      <sec id="sec-4-11">
        <title>Services to build on WEEE</title>
        <p>
          In support of Abu Bakar and Rahimifard (2008) and Manhart (2011), this current
research found that 100% of participants from Germany and 50% of participants from
The Netherlands believe that services who build on the existing WEEE requirements
are to provide transparency and a clearer framework of the regulations along with
integrating the certificates with ISO standards. “It has been previously highlighted by Khan
et al., (2014) that key players particularly the developing countries, should have a voice
in the decision of WEEE management. It is important to have a neutral arena where the
solution for WEEE management can be achieved by mutual consultation
          <xref ref-type="bibr" rid="ref48">(Khan et al.,
2014)</xref>
          .
4.12
        </p>
      </sec>
      <sec id="sec-4-12">
        <title>Changes and trends in collection targets</title>
        <p>
          Contrary to
          <xref ref-type="bibr" rid="ref23 ref27 ref62 ref71">(Favot and Marini, 2013; Peagam et al., 2013; Ruth, 2009)</xref>
          , this current
research has found that 60% of participants from Germany and 25% of participants
from The Netherlands are aware of focus groups that are working on E-waste legislation
and they are unaware of any lobby groups that are dedicated to collection targets. It has
been previously stated by Atasu et al., (2016) that the issue of the disposal of waste
electrical and electronic equipment (WEEE), firms are frequently unaware of the threats
posed by such legislation, poor at anticipating its provisions and effects, and generally
not very skilful at representing their interests in the political process
          <xref ref-type="bibr" rid="ref4">(Atasu et al., 2016)</xref>
          .
4.13
        </p>
      </sec>
      <sec id="sec-4-13">
        <title>Data protection for end of life equipment</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref11 ref13 ref43 ref52 ref64 ref93">(Carey, 2010; Ec.europa.eu; Rasheed, 2014; Zhang and Dong, 2016)</xref>
          ,
another important finding of this current research is the stringent controls and rigorous
audits of returned material to protect against data breaches. This current research found
that 60% of participants from Germany and 75% of participants from The Netherlands
have procedures in place to prevent data breaches of end of life equipment. It is stated
by Martin et al., (2017) that transparency and control in a firms’ data management
practices can suppress the negative effects of customer data vulnerability. Mere access to
personal data inflates feelings of violation and reduces trust. The negative effects, as
well as spillover vulnerabilities from rival firms’ breaches, on firm performance. The
severity of the breach hurts the local firm but helps the rival firm
          <xref ref-type="bibr" rid="ref54">(Martin et al., 2017)</xref>
          .
4.14
        </p>
      </sec>
      <sec id="sec-4-14">
        <title>Remanufacturing as a Key Business Driver</title>
        <p>
          In support of
          <xref ref-type="bibr" rid="ref37 ref61 ref67 ref92">(Han et al., 2016; Paterson et al., 2017; Robinson, 2014; Xiong et al.,
2016)</xref>
          , another important finding of this current research is that remanufacturing is a
key business driver. This current research found that 60% of participants from Germany
and 25% of participants from The Netherlands believe that remanufacturing is a cost
driver that facilitates pricing models. It is stated by Kwak and Kim (2017) that the
potential of generating green profits through remanufacturing needs to be supported by
optimal pricing and production planning. Potential concerns and barriers to OEM
remanufacturing, which include unproven economic profitability and the environmental
sustainability of remanufacturing, imbalance between the supply of end-of-life
products and demand for remanufactured products and the risk of cannibalizing new product
sales
          <xref ref-type="bibr" rid="ref50 ref73">(Kwak and Kim, 2017)</xref>
          . This concludes the discussion of the main findings. The
next section presents the recommendations and final comments.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>This research study has evaluated Wisetek as an international organisation operating
in different key geographic regions. The operational excellence has been the most
distinct value associated with the success of the company to date, however, as an
international organisation, there are many challenges for Wisetek operating in a global market,
with significant competition from other large players. This research study has
determined that it is imperative for the future success of Wisetek to expand and enhance its
shareholder value. There is an immense opportunity to develop innovative strategies
that will enhance the ability for Wisetek to grow in Europe and Wisetek should
commence a plan to transfer their competencies into Germany and The Netherlands. The
marketing of Wisetek needs to focus on becoming more visual in these geographic
regions and not, however, just during times when organisations require their services.
The marketing expertise and budgets that larger competitors of Wisetek possess
suggests that these competitors will continue to be a visual presence in the target markets
and on a global stage. Wisetek cannot underestimate the influence that high profile
organisations can have on the market of the country that they are operating in.</p>
    </sec>
    <sec id="sec-6">
      <title>References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Abu</given-names>
            <surname>Bakar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            and
            <surname>Rahimifard</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>“An integrated framework for planning of recycling activities in electrical and electronic sector”</article-title>
          ,
          <source>International Journal of Computer Integrated Manufacturing</source>
          ,
          <volume>21</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>617</fpage>
          -
          <lpage>630</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alshamsi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Diabat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>“A reverse logistics network design”</article-title>
          ,
          <source>Journal of Manufacturing Systems</source>
          , pp.
          <fpage>589</fpage>
          -
          <lpage>598</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Arno</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friedl</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gross</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Schuerger</surname>
            ,
            <given-names>R. J.</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>“Reliability of Data Centers by Tier Classification”</article-title>
          ,
          <source>IEEE Transactions on Industry Applications</source>
          ,
          <volume>48</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>777</fpage>
          -
          <lpage>783</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Atasu</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van Wassenhove</surname>
            ,
            <given-names>L. N.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Webber</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Owls, Sheep and Dodos: Coping with Environmental Legislation”</article-title>
          , in
          <string-name>
            <surname>Atasu</surname>
          </string-name>
          , A. (ed) Environmentally Responsible Supply Chains, Cham, Switzerland: Springer, pp.
          <fpage>179</fpage>
          -
          <lpage>197</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baldé</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuehr</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Huisman</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>The global E-waste monitor</article-title>
          , Bonn, Germany: United Nations University.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Benson</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anand</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and Zhang,
          <string-name>
            <surname>M.</surname>
          </string-name>
          (
          <year>2010</year>
          ) “
          <article-title>Understanding data centre traffic characteristics”</article-title>
          ,
          <source>SIGCOMM Computer Communications</source>
          ,
          <volume>40</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>92</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bojanova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , Zhang, J. and
          <string-name>
            <surname>Voas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>“Cloud Computing”</article-title>
          , IT Professional,
          <volume>15</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>12</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Braun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>Successful qualitative research: a practical guide for beginners, California</article-title>
          , USA: SAGE.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cadle</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paul</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Turner</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Business Analysis Techniques: 99 essential tools for success</article-title>
          ,
          <string-name>
            <surname>Swindon</surname>
            <given-names>UK</given-names>
          </string-name>
          : British Computer Society.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Carcary</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doherty</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Conway</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2013</year>
          ) “
          <article-title>The Adoption of Cloud Computing by Irish SMEs - an Exploratory Study”</article-title>
          ,
          <source>Electronic Journal of Information Systems Evaluation</source>
          ,
          <volume>16</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>258</fpage>
          -
          <lpage>269</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Carey</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2010</year>
          )
          <article-title>Data Protection: A Practical Guide to Irish and</article-title>
          EU Law, Dublin: Round Hall.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Carr</surname>
            ,
            <given-names>D. F.</given-names>
          </string-name>
          (
          <year>2007</year>
          ) “I.T. Asset Disposal”, Baseline, (
          <volume>76</volume>
          ), pp.
          <fpage>61</fpage>
          -
          <lpage>61</lpage>
          , available at http://search.ebscohost.com/login.aspx
          <article-title>?direct=true&amp;amp;db=bch&amp;amp;AN=26451857&amp;amp; site=ehost-live&amp;amp;scope=site</article-title>
          , accessed at 12:
          <fpage>14</fpage>
          , 12th February.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Ceballos</surname>
            ,
            <given-names>D. M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>The formal electronic recycling industry: Challenges and opportunities in occupational and environmental health research”</article-title>
          , Environment International,
          <volume>95</volume>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Clegg</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Strategy: theory &amp; practice</article-title>
          , London, UK: SAGE.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Colocationamerica</surname>
          </string-name>
          .
          <source>com “Data Center Tier Rating Breakdown - Tier 1</source>
          ,
          <issue>2</issue>
          ,
          <issue>3</issue>
          ,
          <fpage>4</fpage>
          -
          <lpage>CLA</lpage>
          ”, available at https://www.colocationamerica.com
          <article-title>/data-centre/tier-standards-overview</article-title>
          .htm, accessed at 18:
          <fpage>50</fpage>
          , 6th June.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. 16. Cyrusone.
          <article-title>com “Data Center Hosting - Definition of Data Center Hosting”</article-title>
          , available at https://cyrusone.com/resources/glossary/data-centre-hosting/, accessed at 14:
          <fpage>29</fpage>
          , 23rd April.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. 17.
          <string-name>
            <surname>Dalvi-Esfahani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramayah</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Nilashi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2017</year>
          ) “
          <article-title>Modelling upper echelons' behavioural drivers of Green IT/IS adoption using an integrated Interpretive Structural Modelling - Analytic Network Process approach”</article-title>
          ,
          <source>Telematics and Informatics</source>
          ,
          <volume>34</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>583</fpage>
          -
          <lpage>603</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Dasgupta</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verma</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neogi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kothari</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>“Workload Management for Power Efficiency in Virtualized Data Centres”</article-title>
          ,
          <source>Communications of the ACM</source>
          ,
          <volume>54</volume>
          (
          <issue>7</issue>
          ), pp.
          <fpage>131</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. De los Rios, I. C. and
          <string-name>
            <surname>Charnley</surname>
            ,
            <given-names>F. J. S.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Skills and capabilities for a sustainable and circular economy: The changing role of design”</article-title>
          ,
          <source>Journal of Cleaner Production</source>
          , available at https://cit.summon.serialssolutions.com
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Dewey</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>“Coping with technology graveyards”</article-title>
          ,
          <source>Grand Rapids Business Journal</source>
          ,
          <volume>31</volume>
          (
          <issue>15</issue>
          ), pp.
          <fpage>15</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Diabat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdallah</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Refaie</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Svetinovic</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Govindan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>“Strategic Closed-Loop Facility Location Problem with Carbon Market Trading”</article-title>
          ,
          <source>IEEE Transactions on Engineering Management</source>
          ,
          <volume>60</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>398</fpage>
          -
          <lpage>408</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Eicher</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Corruption in International Business: The Challenge of Cultural and Legal Diversity</article-title>
          , London, UK: Gower.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Favot</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Marini</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>“A Statistical Analysis of Prices of Electrical and Electronic Equipment after the Introduction of the WEEE Directive”</article-title>
          ,
          <source>Journal of Industrial Ecology</source>
          ,
          <volume>17</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>827</fpage>
          -
          <lpage>834</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Fichter</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hintemann</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>“Beyond Energy”</article-title>
          ,
          <source>Journal of Industrial Ecology</source>
          ,
          <volume>18</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>846</fpage>
          -
          <lpage>858</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Flick</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          (2007a)
          <article-title>Designing qualitative research</article-title>
          , London, UK: SAGE.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Flick</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          (2007b)
          <article-title>Managing quality in qualitative research</article-title>
          , London, UK: SAGE.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Flucker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Tozer</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>“Data Centre Energy Efficiency Analysis to minimize total cost of ownership”</article-title>
          , Building Services Engineering Research &amp; Technology,
          <volume>34</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>103117</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Fulton</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“IoT Could Drive Micro Data Centers for Telcos”, Data Centre Knowledge</article-title>
          , available at http://www.datacentreknowledge.com/archives/2016/08/29/iotcould-drive
          <article-title>-micro-data-centres-for-telcos/</article-title>
          , accessed at 12:
          <fpage>13</fpage>
          , 12th April.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Gander</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Strategic analysis: a creative and cultural industries perspective</article-title>
          , Abingdon, Oxon, UK: Routledge.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Gębczyńska</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>Strategy implementation efficiency on the process level”</article-title>
          ,
          <source>Business Process Management Journal</source>
          ,
          <volume>22</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>1079</fpage>
          -
          <lpage>1098</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Geissdoerfer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savaget</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bocken</surname>
            ,
            <given-names>N. M. P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hultink</surname>
            ,
            <given-names>E. J.</given-names>
          </string-name>
          (
          <year>2017</year>
          ) “
          <article-title>The Circular Economy - A new sustainability paradigm?”</article-title>
          ,
          <source>Journal of Cleaner Production</source>
          ,
          <volume>143</volume>
          , pp.
          <fpage>757768</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Gendron</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Wiley and</article-title>
          SAS Business Series:
          <article-title>Business Intelligence and the Cloud: Strategic Implementation Guide</article-title>
          , New Jersey, USA: Wiley.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <given-names>Gonul</given-names>
            <surname>Kochan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Pourreza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Tran</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Prybutok</surname>
            ,
            <given-names>V. R.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Determinants and logistics of E-waste recycling”</article-title>
          ,
          <source>The International Journal of Logistics Management</source>
          ,
          <volume>27</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>52</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2017</year>
          ) “
          <article-title>Colocation Data Centre Demand Response using Nash Bargaining Theory”</article-title>
          ,
          <source>IEEE Transactions on Smart Grid</source>
          , pp.
          <source>(99)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          , available at http://ieeexplore.ieee.org.cit.idm.oclc.org/document/7803550/, accessed at 12:
          <fpage>12</fpage>
          , 11th February.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Haas</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krausmann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wiedenhofer</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Heinz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>“How Circular is the Global Economy?: An Assessment of Material Flows, Waste Production and Recycling in the European Union and</article-title>
          the World in
          <year>2005</year>
          ”,
          <source>Journal of Industrial Ecology</source>
          ,
          <volume>19</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>765</fpage>
          -
          <lpage>777</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Hackett</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2015</year>
          ) “International Internet Hubs”, Fortune,
          <volume>171</volume>
          (
          <issue>8</issue>
          ), pp.
          <fpage>265</fpage>
          -
          <lpage>265</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Shang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>Reverse channel selection under remanufacturing risks: Balancing profitability</article-title>
          and robustness”,
          <source>International Journal of Production Economics</source>
          ,
          <volume>182</volume>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Hao</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>R. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keim</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dayal</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Vennelakanti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2010</year>
          )
          <article-title>“Application of Visual Analytics for Thermal State Management in Large Data Centres”</article-title>
          ,
          <source>Computer Graphics Forum</source>
          ,
          <volume>29</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>1895</fpage>
          -
          <lpage>1904</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Heacock</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kelly</surname>
            ,
            <given-names>C. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwadwo</surname>
            <given-names>Ansong</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Birnbaum</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. S.</surname>
          </string-name>
          , Bergman,
          <string-name>
            <given-names>Å. L.</given-names>
            ,
            <surname>Bruné</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.N.</given-names>
            ,
            <surname>Buka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Carpenter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. O.</given-names>
            ,
            <surname>Aimin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Kamel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Landrigan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            ,
            <surname>Magalini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Diaz-Barriga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Neira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Omar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Pascale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Ruchirawat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Sly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            and
            <surname>Sly</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. D.</surname>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“E-waste and Harm to Vulnerable Populations: A Growing Global Problem”</article-title>
          ,
          <source>Environmental Health Perspectives</source>
          ,
          <volume>124</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>550</fpage>
          -
          <lpage>555</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Hillier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Corporate finance</article-title>
          , New York, USA:
          <string-name>
            <surname>McGraw-Hill Education</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Hou</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2013</year>
          ) “
          <article-title>Cost effective data centre servers”</article-title>
          .
          <source>IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)</source>
          ,
          <fpage>23</fpage>
          -
          <lpage>27</lpage>
          Feb.
          <year>2013</year>
          ,
          <fpage>179</fpage>
          -
          <lpage>187</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Huff</surname>
            ,
            <given-names>A. S.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Designing research for publication, California</article-title>
          , USA: SAGE, p.
          <fpage>348</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Jayaram</surname>
          </string-name>
          , J. and
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Determinants of quality and efficiency performance in service operation”</article-title>
          ,
          <source>International Journal of Operations &amp; Production Management</source>
          ,
          <volume>36</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>265</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Joardar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2014</year>
          ) “Expanding international business research on foreignness”,
          <source>Management Research Review</source>
          ,
          <volume>37</volume>
          (
          <issue>12</issue>
          ), pp.
          <fpage>1018</fpage>
          -
          <lpage>1025</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45. 45.
          <string-name>
            <surname>Johansson</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krook</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eklund</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linköpings</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Tekniska</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , (
          <year>2012</year>
          ).
          <article-title>“Transforming dumps into gold mines</article-title>
          .
          <source>Experiences from Swedish case studies”</source>
          ,
          <source>Environmental Innovation and Societal Transitions</source>
          ,
          <volume>5</volume>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hillier</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Comfort</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Clarke-Hill</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2013</year>
          ) “
          <article-title>Towards sustainable data centre operations in the UK”</article-title>
          ,
          <source>Journal of Property Investment &amp; Finance</source>
          ,
          <volume>31</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>89</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>R. H.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>“Tech Titans Building Boom</article-title>
          ” IEEE Spectrum, available at http://spectrum.ieee.org/green-tech/buildings/tech-titans
          <string-name>
            <surname>-</surname>
          </string-name>
          building-boom,
          <source>accessed at 17:03</source>
          , 7th February.
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lodhi</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akhtar</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Khokar</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>“Challenges of waste of electric and electronic equipment (WEEE): Toward a better management in a global scenario”</article-title>
          ,
          <source>Management of Environmental Quality: An International Journal</source>
          ,
          <volume>25</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>166</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Kuper</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Hojsik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Poisoning the poor: electronic waste in Ghana</article-title>
          , Amsterdam: Greenpeace.
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Kwak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2017</year>
          ) “
          <article-title>Green profit maximization through integrated pricing and production planning for a line of new and remanufactured products”</article-title>
          ,
          <source>Journal of Cleaner Production</source>
          ,
          <volume>142</volume>
          , pp.
          <fpage>3454</fpage>
          -
          <lpage>3470</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Lewandowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Designing the Business Models for Circular Economy - Towards the Conceptual Framework”</article-title>
          , Sustainability,
          <volume>8</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>43</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Lieder</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Rashid</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>Towards circular economy implementation: a comprehensive review in context of manufacturing industry”</article-title>
          ,
          <source>Journal of Cleaner Production</source>
          ,
          <volume>115</volume>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Lowe</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2011a</year>
          ) “
          <article-title>Five ways to intentionally destroy your data” TechRepublic</article-title>
          , available at http://www.techrepublic.com/blog/the-enterprise
          <article-title>-cloud/five-ways-to-intentionally-destroyyour-data/</article-title>
          , accessed at 20:
          <fpage>40</fpage>
          , 18th May.
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>K. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Palmatier</surname>
            ,
            <given-names>R. W.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>“Data Privacy: Effects on Customer and Firm Performance”</article-title>
          ,
          <source>Journal of Marketing</source>
          ,
          <volume>81</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>36</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Masoud</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jaradat</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Jannoud</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>“A measurement study of internet exchange points (IXPs): history and future prediction”</article-title>
          ,
          <source>Turkish Journal of Electrical Engineering &amp; Computer Sciences</source>
          ,
          <volume>25</volume>
          , pp.
          <fpage>376</fpage>
          -
          <lpage>389</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Manhart</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2011</year>
          ) “
          <article-title>International Cooperation for Metal Recycling from Waste Electrical and Electronic Equipment”</article-title>
          ,
          <source>Journal of Industrial Ecology</source>
          ,
          <volume>15</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>13</fpage>
          -
          <lpage>30</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57.
          <string-name>
            <surname>McGaughey</surname>
            ,
            <given-names>S. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumaraswamy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Liesch</surname>
            ,
            <given-names>P. W.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Institutions, entrepreneurship and co-evolution in international business”</article-title>
          ,
          <source>Journal of World Business</source>
          ,
          <volume>51</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>871</fpage>
          -
          <lpage>881</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>McKeen</surname>
            ,
            <given-names>J. D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>H. A.</given-names>
          </string-name>
          (
          <year>2010</year>
          )
          <article-title>“Developments in Practice XXXVII: Total Cost of Ownership”</article-title>
          ,
          <source>Communications of the Association for Information Systems</source>
          ,
          <volume>27</volume>
          , pp.
          <fpage>627</fpage>
          -
          <lpage>636</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Olariu</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>“An Overview on Retail Reverse Logistics”</article-title>
          , Studies and
          <string-name>
            <given-names>Scientific</given-names>
            <surname>Researches</surname>
          </string-name>
          .
          <source>Economics Edition</source>
          , (
          <volume>19</volume>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          60.
          <string-name>
            <surname>Olufowote</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2017</year>
          ) “Limitations of Research”, in Allen, M. (ed)
          <source>The SAGE Encyclopaedia of Communication Research Methods</source>
          , California, USA: SAGE.
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          61.
          <string-name>
            <surname>Paterson</surname>
            ,
            <given-names>D. A. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ijomah</surname>
            ,
            <given-names>W. L.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Windmill</surname>
            ,
            <given-names>J. F. C.</given-names>
          </string-name>
          (
          <year>2017</year>
          ) “
          <article-title>End-of-Life decision tool with emphasis on Remanufacturing”</article-title>
          ,
          <source>Journal of Cleaner Production</source>
          , available at http://dx.doi.org.
          <source>cit.idm.oclc.org/10</source>
          .1016/j.jclepro.
          <year>2017</year>
          .
          <volume>02</volume>
          .011, accessed at 18:
          <fpage>57</fpage>
          , 20th February.
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          62.
          <string-name>
            <surname>Peagam</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McIntyre</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basson</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          and France,
          <string-name>
            <surname>C.</surname>
          </string-name>
          (
          <year>2013</year>
          ) “
          <article-title>Business-to-Business Information Technology User Practices at End of Life in The United Kingdom</article-title>
          , Germany and France”,
          <source>Journal of Industrial Ecology</source>
          ,
          <volume>17</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>224</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          63.
          <string-name>
            <surname>Preimesberger</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>“Why Edge Data Centres Play an Increased Role in Global Connectivity”</article-title>
          , eWeek, pp.
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          64.
          <string-name>
            <surname>Rasheed</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>“Data and infrastructure security auditing in cloud computing environments”</article-title>
          ,
          <source>International Journal of Information Management</source>
          ,
          <volume>34</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>364</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          65.
          <string-name>
            <surname>Remanufacturing</surname>
          </string-name>
          .eu “The European Remanufacturing Network - ERN”, available at https://www.remanufacturing.eu/wp-content/uploads/2016/01/study.pdf, accessed at 14:
          <fpage>40</fpage>
          , 25th February.
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          66.
          <string-name>
            <surname>Renckens</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2015</year>
          ) “
          <article-title>The Basel Convention, US politics and the emergence of non-state Ewaste recycling certification” International Environmental Agreements: Politics, Law</article-title>
          and Economics,
          <volume>15</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>141</fpage>
          -
          <lpage>158</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          67.
          <string-name>
            <surname>Robinson</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2014</year>
          ) “What is Reverse Logistics? Is It Different than Traditional Logistics?”, available at http://cerasis.com/
          <year>2014</year>
          /02/19/what-is
          <string-name>
            <surname>-</surname>
          </string-name>
          reverse-logistics/, accessed at 16:
          <fpage>45</fpage>
          , 23rd February.
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          68.
          <string-name>
            <surname>Rosenfeld</surname>
            ,
            <given-names>P. E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>The Risks of Hazardous Wastes</article-title>
          , Oxford, UK: William Andrew.
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          69.
          <string-name>
            <surname>Rouse</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2010</year>
          ) “
          <article-title>What is data centre?”</article-title>
          , Techtarget, available at http://searchdatacentre.techtarget.com/definition/data-centre,
          <source>accessed at 13:05</source>
          , 9th February.
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          70.
          <string-name>
            <surname>Runeson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Host</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rainer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Regnell</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Case Study Research in Software Engineering: Guidelines and Examples</article-title>
          , New Jersey, USA: Wiley.
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          71.
          <string-name>
            <surname>Ruth</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>“Green IT More Than a Three Percent Solution?”</article-title>
          , IEEE Internet Computing,
          <volume>13</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>74</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          72.
          <string-name>
            <surname>Salhofer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steuer</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramusch</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and Beigl,
          <string-name>
            <surname>P.</surname>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“WEEE management in Europe and China - A comparison”</article-title>
          ,
          <source>Waste Management</source>
          ,
          <volume>57</volume>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          73.
          <string-name>
            <surname>Salisch</surname>
            ,
            <given-names>W. J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Mayfield</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>“Multi-layered security: ten important steps to protect your business data”</article-title>
          ,
          <source>Film Journal International</source>
          ,
          <volume>120</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>88</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          74.
          <string-name>
            <surname>Sapdatacentre</surname>
          </string-name>
          .com “
          <article-title>How a Data Centre Works”</article-title>
          , available at http://www.sapdatacentre.com/article/data_centre_functionality/, accessed at 17:
          <fpage>18</fpage>
          , 6th February.
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          75.
          <string-name>
            <surname>Saran</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>“Driving Datacentre Efficiency to Meet Future Demand”</article-title>
          ,
          <source>Computer Weekly</source>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          76.
          <string-name>
            <surname>Seeberger</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grandhi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mase</surname>
            ,
            <given-names>W. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reponen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ho</surname>
          </string-name>
          , S.-m. and
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“E-waste management in the United States and public health implications”</article-title>
          ,
          <source>Journal of Environmental Health</source>
          ,
          <volume>79</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          77.
          <string-name>
            <surname>Shin</surname>
            ,
            <given-names>J. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirer</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weatherspoon</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Kirovski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2013</year>
          ) “
          <article-title>On the feasibility of completely wireless datacentres”</article-title>
          ,
          <source>IEEE/ACM Transactions on Networking (TON)</source>
          ,
          <volume>21</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>1666</fpage>
          -
          <lpage>1679</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          78.
          <string-name>
            <surname>Shuja</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Madani</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilal</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hayat</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sarwar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2012</year>
          ) “
          <article-title>Energy-efficient data centres”</article-title>
          ,
          <source>Computing</source>
          ,
          <volume>94</volume>
          (
          <issue>12</issue>
          ), pp.
          <fpage>973</fpage>
          -
          <lpage>994</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          79.
          <string-name>
            <surname>Shuva</surname>
            ,
            <given-names>M. A. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rhamdhani</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brooks</surname>
            ,
            <given-names>G. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Masood</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Reuter</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>Thermodynamics data of valuable elements relevant to E-waste processing through primary and secondary copper production: a review”</article-title>
          ,
          <source>Journal of Cleaner Production</source>
          ,
          <volume>131</volume>
          , pp.
          <fpage>795</fpage>
          -
          <lpage>809</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>
          80.
          <string-name>
            <surname>Silverman</surname>
            ,
            <given-names>D. L.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Developments in data security breach liability”</article-title>
          ,
          <source>Business Lawyer</source>
          ,
          <volume>72</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>185</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          81.
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>“A review on human health consequences of metals exposure to E-waste in China”</article-title>
          ,
          <source>Environmental Pollution</source>
          ,
          <volume>196</volume>
          , pp.
          <fpage>450</fpage>
          -
          <lpage>461</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref82">
        <mixed-citation>
          82.
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cui</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Buyya</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Ensuring Security and Privacy Preservation for Cloud Data Services”</article-title>
          ,
          <source>ACM Computing Surveys</source>
          ,
          <volume>49</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref83">
        <mixed-citation>
          83.
          <string-name>
            <surname>Timmermans</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Digital supply chains connect circular economy”</article-title>
          ,
          <source>Logistics Management</source>
          ,
          <volume>55</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>18</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref84">
        <mixed-citation>
          84.
          <string-name>
            <surname>Telecomworldwire</surname>
          </string-name>
          .com “
          <article-title>Equinix invests USD113 million in new Amsterdam data centre”</article-title>
          , available at http://search.ebscohost.com.cit.idm.oclc.org/login.aspx
          <article-title>?direct=true&amp;amp;db=bwh&amp;amp;AN= 6DUU2825201956&amp;amp;site=ehost-live</article-title>
          ,
          <source>accessed at 18:33</source>
          , 25th January.
        </mixed-citation>
      </ref>
      <ref id="ref85">
        <mixed-citation>
          85.
          <string-name>
            <surname>Vick</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“Data Centre Decommissioning - AER Worldwide Aftermarket, ITAD</article-title>
          and Reverse Logistics services”, available at http://www.aerworldwide.com/datacentredecommissioning/, accessed at 15:
          <fpage>21</fpage>
          , 30th January.
        </mixed-citation>
      </ref>
      <ref id="ref86">
        <mixed-citation>
          86.
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , G. T. and
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Student Research and Report Writing: From Topic Selection to the Complete Paper</article-title>
          , Chichester, UK: Wiley-Blackwell.
        </mixed-citation>
      </ref>
      <ref id="ref87">
        <mixed-citation>
          87.
          <string-name>
            <surname>Wiles</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>What are Qualitative Research Ethics?</article-title>
          , London, UK: Bloomsbury Publishing, p.
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref88">
        <mixed-citation>
          88.
          <string-name>
            <surname>Wood</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Improving data centre resource management, deployment and availability with virtualization</article-title>
          ,
          <source>Doctor of Philosophy (PhD)</source>
          , Massachusetts, USA: University of Massachusetts Amherst.
        </mixed-citation>
      </ref>
      <ref id="ref89">
        <mixed-citation>
          89.
          <string-name>
            <surname>Woods</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2014</year>
          ) “
          <article-title>The evolution of the data centre: Timeline from the Mainframe to the Cloud”</article-title>
          , Silicone Angle, available at http://siliconangle.com/blog/2014/03/05/the-evolutionofthe
          <article-title>-data-centre-timeline-from-the-mainframe-to-the-cloud-tc0114/</article-title>
          , accessed at 16:
          <fpage>59</fpage>
          , 2nd February.
        </mixed-citation>
      </ref>
      <ref id="ref90">
        <mixed-citation>
          90.
          <string-name>
            <surname>Wisetek</surname>
          </string-name>
          .net “Corporate Profile - Wisetek”, available at http://www.wisetek.net/corporateprofile, accessed at 12:
          <fpage>22</fpage>
          , 25th February.
        </mixed-citation>
      </ref>
      <ref id="ref91">
        <mixed-citation>
          91.
          <string-name>
            <surname>Xia</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Xie</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>“A Survey on Data Centre Networking (DCN): Infrastructure and Operations”</article-title>
          ,
          <source>IEEE Communications Surveys and Tutorials</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref92">
        <mixed-citation>
          92.
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>Manufacturer-remanufacturing vs supplier remanufacturing in a closed-loop supply chain”</article-title>
          ,
          <source>International Journal of Production Economics</source>
          ,
          <volume>176</volume>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref93">
        <mixed-citation>
          93.
          <string-name>
            <surname>Yesilyurt</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yalman</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2016</year>
          ) “
          <article-title>New approach for ensuring cloud computing security: using data hiding methods”</article-title>
          , Sardana,
          <volume>41</volume>
          (
          <issue>11</issue>
          ), pp.
          <fpage>1289</fpage>
          -
          <lpage>1298</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref94">
        <mixed-citation>
          94.
          <string-name>
            <surname>Yin</surname>
            ,
            <given-names>R. K.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Case study research: design and methods</article-title>
          . Applied social research methods, California, USA: SAGE, p.
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref95">
        <mixed-citation>
          95.
          <string-name>
            <surname>Zeng</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiang</surname>
            ,
            <given-names>J. F.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>“Innovating E-waste management: From macroscopic to microscopic scales”</article-title>
          ,
          <source>Science of The Total Environment</source>
          ,
          <volume>575</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>