{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:58:54Z","timestamp":1742954334751,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615346"},{"type":"electronic","value":"9789819615353"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1535-3_23","type":"book-chapter","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:24:54Z","timestamp":1739449494000},"page":"221-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Risk Management Model for Cloud-Based Learning Platform in Academic Institution"],"prefix":"10.1007","author":[{"given":"Moe Moe","family":"San","sequence":"first","affiliation":[]},{"given":"Khin May","family":"Win","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,14]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Mannane, N., Bencharhi, Y., Boulafdour, B., Regragui, B.: Survey: Risk assessment models for cloud computing: evaluation criteria. IEEE (2017)","DOI":"10.1109\/CloudTech.2017.8284712"},{"key":"23_CR2","unstructured":"Mohamed, I., Khogali, A., Ammar, H.: A Methodology for the Assessment of Security Risk in Cloud Computing. Sudan University Science and Technology College (2018)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Maniah, Soewito, B., Gaol, F.L., Abdurachman, E: Risk assessment on cloud computing for the learning system in the education environment. In: IEEE 2019 International Conference on Engineering Technology and Education (TALE) (2019)","DOI":"10.1109\/TALE48000.2019.9225941"},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Jouini, M., Rabai, L.B.A.: A security risk management model for cloud computing systems: infrastructure as a service. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.K. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol. 10656, pp. 594\u2013608. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_47","DOI":"10.1007\/978-3-319-72389-1_47"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Malele, V.: Cybersecurity cloud-based online learning: a literature review approach. J. Inf. Syst. Inform. 5(4) (2023). p-ISSN: 2656\u20135935","DOI":"10.51519\/journalisi.v5i4.583"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Jun, L., Zuhua, G.: Research on cloud security risk assessment based on fuzzy entropy weight model. Adv. Sci. Technol. Lett. 139(EEC 2016), 390\u2013395 (2016)","DOI":"10.14257\/astl.2016.139.78"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Hasan, M.Z., Hussain, M.Z., Mubarak, A.: Data security and integrity in cloud computing. In: IEEE International Conference for Advancement in Technology (ICONAT). India (2023)","DOI":"10.1109\/ICONAT57137.2023.10080440"},{"key":"23_CR8","unstructured":"Chatterjee, P., Bose, R., Banerjee, S., Roy, S.: Enhacing data security of cloud based LMS. Wireless Pers. Commun. (4), 1\u201317. Springer (2023)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Cayirci, E., Garaga, A., Santana, A., Roudier, Y.: A cloud adoption risk assessment model. In: IEEE 2014 7th International Conference on Utility and Cloud Computing (2014)","DOI":"10.1109\/UCC.2014.148"},{"key":"23_CR10","first-page":"279","volume":"8","author":"A Nada","year":"2013","unstructured":"Nada, A., Abraham, A.: Modeling security risk factors in a cloud computing environment. J. Inf. Assur. Secur. 8, 279\u2013289 (2013)","journal-title":"J. Inf. Assur. Secur."},{"key":"23_CR11","doi-asserted-by":"publisher","unstructured":"Amini, A., Jamil, N., Ahmad, A.R., Sulaiman, H.: A fuzzy logic based risk assessment approach for evaluating and prioritizing risks in cloud computing environment. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A., Mohammed, F. (eds.) Recent Trends in Information and Communication Technology. IRICT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol. 5. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59427-9_67","DOI":"10.1007\/978-3-319-59427-9_67"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Sivasubramanian, Y., Ahmed, S.Z., Mishra, V.P.: Risk assessment for cloud computing. IRJECE 3(2) (2017)","DOI":"10.24178\/irjece.2017.3.2.07"},{"key":"23_CR13","unstructured":"Pangsuban, P., Nilsook, P., Wannapiroon, P.: Systems analysis of risk assessment for moodle learning in a LAMP environment from log files. In: 6th International e-Learning Conference (2015)"},{"key":"23_CR14","unstructured":"Bendicho, C.: Cyber Security in Cloud: Risk Assessment Models. https:\/\/orcid.org\/0000-0002-8538-0043, vol. 283. Springer (2021)"},{"issue":"4","key":"23_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijeei.2013100101","volume":"4","author":"G Wahlgren","year":"2013","unstructured":"Wahlgren, G., Kowalski, S.: IT security risk management model for cloud computing: a need for a new escalation approach. Int. J. E-Entrepreneurship Innov. 4(4), 1\u201319 (2013)","journal-title":"Int. J. E-Entrepreneurship Innov."},{"key":"23_CR16","unstructured":"Fadhil, I.S., Nizar, N.B., Rostam, R.J.: Security and Privacy Issues in Cloud Computing. https:\/\/www.techriv.org, powered by IEEE. Accessed 14 June 2023"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Abdurachman, E., Gaol, F.L., Soewito, B.: Survey on threats and risks in the cloud computing environment. In: 5th Information Systems International Conference, Procedia Computer Science, vol. 161, pp. 1325\u20131332 (2019)","DOI":"10.1016\/j.procs.2019.11.248"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Sendi, A.S., Cheriet, M.: Cloud computing: a risk assessment model. In: 2014 IEEE International Conference on Cloud Engineering (2014)","DOI":"10.1109\/IC2E.2014.17"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Alguliyev, R., Abdullayeva, F.: Development of fuzzy risk calculation method for a dynamic federation of clouds. Intell. Inf. Manage. 7, 230\u2013241 (2015)","DOI":"10.4236\/iim.2015.74018"},{"key":"23_CR20","unstructured":"San, M.M., Win, K.M.: A framework for secure cloud based computing in higher educational institution. In: CONFERENCE 2018 16th International Conference on Computer Application, UCSY, Myanmar (2018)"}],"container-title":["Lecture Notes in Electrical Engineering","Genetic and Evolutionary Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1535-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:25:01Z","timestamp":1739449501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1535-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615346","9789819615353"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1535-3_23","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICGEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Genetic and Evolutionary Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Miyazaki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icgec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icgec24.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}