{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T11:44:40Z","timestamp":1778759080494,"version":"3.51.4"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T00:00:00Z","timestamp":1691712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T00:00:00Z","timestamp":1691712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Department of Robotics, Hanyang University, Ansan 15588, Korea","award":["Hanyang University (HY-2021-0372)"],"award-info":[{"award-number":["Hanyang University (HY-2021-0372)"]}]},{"name":"Department of Robotics, Hanyang University, Ansan 15588, Korea","award":["Hanyang University (HY-2022-0010)"],"award-info":[{"award-number":["Hanyang University (HY-2022-0010)"]}]},{"name":"Department of Robotics, Hanyang University, Ansan 15588, Korea","award":["Hanyang University (HY-2023)"],"award-info":[{"award-number":["Hanyang University (HY-2023)"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s10111-023-00734-6","type":"journal-article","created":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T23:27:01Z","timestamp":1691710021000},"page":"427-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Green cloud computing adoption challenges and practices: a client\u2019s perspective-based empirical investigation"],"prefix":"10.1007","volume":"25","author":[{"given":"Ashfaq","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Rafiq Ahmad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Siffat Ullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Hathal Salamah","family":"Alwageed","sequence":"additional","affiliation":[]},{"given":"Abdullah A.","family":"Al-Atawi","sequence":"additional","affiliation":[]},{"given":"Youngmoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,11]]},"reference":[{"key":"734_CR1","doi-asserted-by":"publisher","first-page":"81828","DOI":"10.1109\/ACCESS.2021.3085707","volume":"9","author":"A Ahmad","year":"2021","unstructured":"Ahmad A, Khan SU, Khan HU, Khan GM, Ilyas M (2021a) Challenges and practices identification via a systematic literature review in the adoption of green cloud computing: client\u2019s side approach. IEEE Access 9:81828\u201381840","journal-title":"IEEE Access"},{"key":"734_CR2","doi-asserted-by":"publisher","first-page":"53491","DOI":"10.1109\/ACCESS.2021.3070785","volume":"9","author":"Z Ahmad","year":"2021","unstructured":"Ahmad Z, Jehangiri AI, Ala\u2019anzy MA, Othman M, Latip R, Zaman SKU, Umar AI (2021b) Scientific workflows management and scheduling in cloud computing: taxonomy, prospects, and challenges. IEEE Access 9:53491\u201353508","journal-title":"IEEE Access"},{"key":"734_CR3","first-page":"101210","volume":"45","author":"MS Ajmal","year":"2021","unstructured":"Ajmal MS, Iqbal Z, Khan FZ, Bilal M, Mehmood RM (2021) Cost-based energy efficient scheduling technique for dynamic voltage and frequency scaling system in cloud computing. Sustain Energy Technol Assess 45:101210","journal-title":"Sustain Energy Technol Assess"},{"key":"734_CR4","doi-asserted-by":"publisher","first-page":"191242","DOI":"10.1109\/ACCESS.2020.3031365","volume":"8","author":"MA Akbar","year":"2020","unstructured":"Akbar MA, Mahmood S, Alsalman H, Razzaq A, Gumaei A, Riaz MT (2020a) Identification and prioritization of cloud based global software development best practices. IEEE Access 8:191242\u2013191262","journal-title":"IEEE Access"},{"key":"734_CR5","doi-asserted-by":"publisher","first-page":"185290","DOI":"10.1109\/ACCESS.2020.3030124","volume":"8","author":"MA Akbar","year":"2020","unstructured":"Akbar MA, Alsalman H, Khan AA, Mahmood S, Meshram C, Gumaei AH, Riaz MT (2020b) Multicriteria decision making taxonomy of cloud-based global software development motivators. IEEE Access 8:185290\u2013185310","journal-title":"IEEE Access"},{"issue":"25","key":"734_CR6","doi-asserted-by":"publisher","first-page":"35571","DOI":"10.1007\/s11042-021-11245-9","volume":"81","author":"MA Akbar","year":"2022","unstructured":"Akbar MA, Mahmood S, Meshram C, Alsanad A, Gumaei A, AlQahtani SA (2022a) Barriers of managing cloud outsource software development projects: a multivocal study. Multimeda Tools Appl 81(25):35571\u201335594","journal-title":"Multimeda Tools Appl"},{"key":"734_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-022-00364-w","author":"MA Akbar","year":"2022","unstructured":"Akbar MA, Khan AA, Mahmood S, Mishra A (2022b) SRCMIMM: the software requirements change management and implementation maturity model in the domain of global software development industry. Inf Technol Manag. https:\/\/doi.org\/10.1007\/s10799-022-00364-w","journal-title":"Inf Technol Manag"},{"key":"734_CR8","doi-asserted-by":"publisher","first-page":"115356","DOI":"10.1109\/ACCESS.2020.3002184","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Dubey K, Amoon M, Altameem T, Abd El-Samie FE, Altameem A, Sharma S, Nasr AA (2020) Energy-efficient hybrid framework for green cloud computing. IEEE Access 8:115356\u2013115369","journal-title":"IEEE Access"},{"key":"734_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305:357\u2013383","journal-title":"Inf Sci"},{"key":"734_CR10","volume":"53","author":"S Bharany","year":"2022","unstructured":"Bharany S, Badotra S, Sharma S, Rani S, Alazab M, Jhaveri RH, Gadekallu TR (2022) Energy efficient fault tolerance techniques in green cloud computing: a systematic survey and taxonomy. Sustain Energy Technol Assess 53:102613","journal-title":"Sustain Energy Technol Assess"},{"key":"734_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jss.2014.08.065","volume":"99","author":"H Chen","year":"2015","unstructured":"Chen H, Zhu X, Guo H, Zhu J, Qin X, Wu J (2015) Towards energy-efficient scheduling for real-time tasks under uncertain cloud computing environment. J Syst Softw 99:20\u201335","journal-title":"J Syst Softw"},{"key":"734_CR12","volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"J Corbin","year":"2014","unstructured":"Corbin J, Strauss A (2014) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage publications, Thousand Oaks"},{"key":"734_CR13","volume-title":"Research design: qualitative, quantitative, and mixed methods approaches","author":"JW Creswell","year":"2017","unstructured":"Creswell JW, Creswell JD (2017) Research design: qualitative, quantitative, and mixed methods approaches. Sage publications, Thousand Oaks"},{"key":"734_CR14","doi-asserted-by":"crossref","unstructured":"Dube P, Grabarnik G, Shwartz L (2012) Suits: how to make a global it service provider sustainable? IEEE Network Operations and Management Symposium, Maui, HI, USA, pp 1352\u20131359","DOI":"10.1109\/NOMS.2012.6212073"},{"issue":"1","key":"734_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-014-0009-1","volume":"3","author":"D Fang","year":"2014","unstructured":"Fang D, Liu X, Liu L, Yang H (2014) OCSO: Off-the-cloud service optimization for green efficient service resource utilization. J Cloud Comput 3(1):1\u201317","journal-title":"J Cloud Comput"},{"key":"734_CR16","volume-title":"Computer analysis and qualitative research","author":"NG Fielding","year":"1998","unstructured":"Fielding NG, Lee NFRM, Lee RM (1998) Computer analysis and qualitative research. Sage, Thousand Oaks"},{"key":"734_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jnca.2015.05.016","volume":"59","author":"K Gai","year":"2016","unstructured":"Gai K, Qiu M, Zhao H, Tao L, Zong Z (2016) Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J Netw Comput Appl 59:46\u201354","journal-title":"J Netw Comput Appl"},{"key":"734_CR18","volume-title":"Theoretical sensitivity. Mill valley","author":"BG Glaser","year":"1978","unstructured":"Glaser BG (1978) Theoretical sensitivity. Mill valley. Sociology Press, CA"},{"key":"734_CR19","doi-asserted-by":"crossref","unstructured":"Goyal Y, Arya MS, Nagpal S (2015) Energy efficient hybrid policy in green cloud computing. In: Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, pp 1065\u20131069","DOI":"10.1109\/ICGCIoT.2015.7380621"},{"issue":"3","key":"734_CR20","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/s11277-019-06119-1","volume":"105","author":"AH Ismail","year":"2019","unstructured":"Ismail AH, El-Bahnasawy NA, Hamed HF (2019) AGCM: active queue management-based green cloud model for mobile edge computing. Wirel Pers Commun 105(3):765\u2013785","journal-title":"Wirel Pers Commun"},{"key":"734_CR21","doi-asserted-by":"crossref","unstructured":"Joy N, Chandrasekaran K, Binu A (2015) A study on energy efficient cloud computing. In: Proceedings of the 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, pp 1\u20136","DOI":"10.1109\/ICCIC.2015.7435661"},{"key":"734_CR22","unstructured":"Khan RA, Khan SU (2015) A survey based study on communication and coordination challenges in offshore software development outsourcing relationships from vendors\u2019 perspective. In: Proceedings of the 4th international multi-topic conference (IMTIC), Mehran University"},{"key":"734_CR23","doi-asserted-by":"crossref","unstructured":"Khan RA, Khan SU (2018) A preliminary structure of software security assurance model. In: Proceedings of the 13th international conference on global software engineering, Gothenburg, Sweden, pp 137\u2013140","DOI":"10.1145\/3196369.3196385"},{"issue":"1","key":"734_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-sen.2010.0038","volume":"6","author":"SU Khan","year":"2012","unstructured":"Khan SU, Niazi M, Ahmad R (2012) Empirical investigation of success factors for offshore software development outsourcing vendors. IET Softw 6(1):1\u201315","journal-title":"IET Softw"},{"key":"734_CR25","first-page":"345","volume":"52","author":"RU Khan","year":"2015","unstructured":"Khan RU, Khan SU, Khan R, Ali S (2015) Motivators in green IT-outsourcing from vendor\u2019s perspective: a systematic literature review. Proc Pak Acad Sci 52:345\u2013360","journal-title":"Proc Pak Acad Sci"},{"key":"734_CR26","unstructured":"Khan RA, Wang J, Arif M, Khan SU, Idris MY (2016) An exploratory study of communication and coordination challenges in offshore software development outsourcing: results of systematic literature review and empirical study. Sci Int (Lahore) 28(5):4819\u20134836"},{"key":"734_CR27","doi-asserted-by":"publisher","first-page":"112879","DOI":"10.1109\/ACCESS.2019.2924404","volume":"7","author":"RA Khan","year":"2019","unstructured":"Khan RA, Idris MY, Khan SU, Ilyas M, Ali S, Din AU, Murtaza G, Khan AW, Jan SU (2019) An evaluation framework for communication and coordination processes in offshore software development outsourcing relationship: using fuzzy methods. IEEE Access 7:112879\u2013112906","journal-title":"IEEE Access"},{"key":"734_CR28","doi-asserted-by":"crossref","unstructured":"Khan RA, Khan SU, Ilyas M, Idris MY (2020) The state of the art on secure software engineering: a systematic mapping study. In Proceedings of the evaluation and assessment in software engineering, Trondheim, Norway, pp 487\u2013492","DOI":"10.1145\/3383219.3383290"},{"key":"734_CR29","doi-asserted-by":"publisher","first-page":"19139","DOI":"10.1109\/ACCESS.2021.3052311","volume":"9","author":"RA Khan","year":"2021","unstructured":"Khan RA, Khan SU, Khan HU, Ilyas M (2021) Systematic mapping study on security approaches in secure software engineering. IEEE Access 9:19139\u201319160","journal-title":"IEEE Access"},{"key":"734_CR30","doi-asserted-by":"publisher","first-page":"58458","DOI":"10.1109\/ACCESS.2022.3178301","volume":"10","author":"RA Khan","year":"2022","unstructured":"Khan RA, Khan SU, Alzahrani M, Ilyas M (2022a) Security assurance model of software development for global software development vendors. IEEE Access 10:58458\u201358487","journal-title":"IEEE Access"},{"key":"734_CR31","doi-asserted-by":"crossref","unstructured":"Khan RA, Khan SU, Ilyas M (2022b) Exploring security procedures in secure software engineering: a systematic mapping study. In: The international conference on evaluation and assessment in software engineering, Gothenburg, Sweden, pp 433\u2013439","DOI":"10.1145\/3530019.3531336"},{"key":"734_CR32","doi-asserted-by":"publisher","first-page":"5456","DOI":"10.1109\/ACCESS.2022.3140181","volume":"10","author":"RA Khan","year":"2022","unstructured":"Khan RA, Khan SU, Khan HU, Ilyas M (2022c) Systematic literature review on security risks and its practices in secure software development. IEEE Access 10:5456\u20135481","journal-title":"IEEE Access"},{"issue":"1","key":"734_CR33","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TCC.2013.2","volume":"1","author":"F Larumbe","year":"2013","unstructured":"Larumbe F, Sanso B (2013) A tabu search algorithm for the location of data centers and software components in green cloud computing networks. IEEE Trans Cloud Comput 1(1):22\u201335","journal-title":"IEEE Trans Cloud Comput"},{"issue":"3","key":"734_CR34","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10664-005-1290-x","volume":"10","author":"TC Lethbridge","year":"2005","unstructured":"Lethbridge TC, Sim SE, Singer J (2005) Studying software engineers: data collection techniques for software field studies. Empir Softw Eng 10(3):311\u2013341","journal-title":"Empir Softw Eng"},{"issue":"2","key":"734_CR35","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.future.2011.04.012","volume":"28","author":"J Li","year":"2012","unstructured":"Li J, Li B, Wo T, Hu C, Huai J, Liu L, Lam K (2012) CyberGuarder: a virtualization security assurance architecture for green cloud computing. Futur Gener Comput Syst 28(2):379\u2013390","journal-title":"Futur Gener Comput Syst"},{"issue":"16","key":"734_CR36","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.3390\/en13164117","volume":"13","author":"A Lis","year":"2020","unstructured":"Lis A, Sudolska A, Pietryka I, Kozakiewicz A (2020) Cloud computing and energy efficiency: mapping the thematic structure of research. Energies 13(16):4117","journal-title":"Energies"},{"key":"734_CR37","first-page":"8887","volume":"975","author":"S Panwar","year":"2015","unstructured":"Panwar S, Rathi K (2015) A survey on green cloud computing. Int J Comput Appl 975:8887","journal-title":"Int J Comput Appl"},{"key":"734_CR38","unstructured":"Pragya MMG (2015) Analysis of energy efficient scheduling algorithms in green cloud computing. Int J Adv Res Comput Eng Technol (IJARCET) 4(5):1\u2013180"},{"key":"734_CR39","doi-asserted-by":"crossref","unstructured":"Rahman M, Gao J, Tsai WT (2013) Energy saving in mobile cloud computing. In: Proceedings of the 2013 IEEE international conference on cloud engineering (IC2E). IEEE, pp.285\u2013291","DOI":"10.1109\/IC2E.2013.37"},{"key":"734_CR40","doi-asserted-by":"crossref","unstructured":"Rawas S, Itani W, Zaart A, Zekri A (2015) Towards greener services in cloud computing: research and future directives. In: Proceedings of the 2015 international conference on applied research in computer science and engineering (ICAR). IEEE, pp 1\u20138","DOI":"10.1109\/ARCSE.2015.7338145"},{"key":"734_CR41","doi-asserted-by":"crossref","unstructured":"Rawat S, Kumar P, Sagar S, Singh I, Garg K (2017) An analytical evaluation of challenges in Green cloud computing. In: Proceedings of the 2017 International conference on infocom technologies and unmanned systems (trends and future directions) (ICTUS). IEEE, pp 351\u2013355","DOI":"10.1109\/ICTUS.2017.8286031"},{"key":"734_CR42","doi-asserted-by":"crossref","unstructured":"Rubyga G, SathiaBhama PR (2016) A survey of computing strategies for green cloud. In: Proceedings of the 2016 second international conference on science technology engineering and management (ICONSTEM). IEEE, pp 141\u2013145","DOI":"10.1109\/ICONSTEM.2016.7560939"},{"issue":"2","key":"734_CR43","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson P, H\u00f6st M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131\u2013164","journal-title":"Empir Softw Eng"},{"key":"734_CR44","unstructured":"Shinde V, Kadu D, Painjane S (2015) Study on green cloud computing and environmental feasibility. Int J Sci Res Dev 3(9):865\u2013867"},{"key":"734_CR45","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.rser.2016.04.034","volume":"62","author":"J Shuja","year":"2016","unstructured":"Shuja J, Gani A, Shamshirband S, Ahmad RW, Bilal K (2016) Sustainable cloud data centers: a survey of enabling techniques and technologies. Renew Sustain Energy Rev 62:195\u2013214","journal-title":"Renew Sustain Energy Rev"},{"issue":"1","key":"734_CR46","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TGCN.2018.2890034","volume":"3","author":"G Skourletopoulos","year":"2018","unstructured":"Skourletopoulos G, Mavromoustakis CX, Mastorakis G, Batalla JM, Song H, Sahalos JN, Pallis E (2018) Elasticity debt analytics exploitation for green mobile cloud computing: an equilibrium model. IEEE Trans Green Commun Netw 3(1):122\u2013131","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"4","key":"734_CR47","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1016\/j.jss.2012.10.003","volume":"86","author":"D \u0160mite","year":"2013","unstructured":"\u0160mite D, Wohlin C, Aurum A, Jabangwe R, Numminen E (2013) Offshore insourcing in software development: structuring the decision-making process. J Syst Softw 86(4):1054\u20131067","journal-title":"J Syst Softw"},{"issue":"1","key":"734_CR48","first-page":"1263","volume":"4","author":"G Sriram","year":"2022","unstructured":"Sriram G (2022) Green cloud computing: an approach towards sustainability. Int Res J Modernization Eng Technol Sci 4(1):1263\u20131268","journal-title":"Int Res J Modernization Eng Technol Sci"},{"key":"734_CR49","doi-asserted-by":"crossref","unstructured":"Wajid U, Pernici B, Francis G (2013) Energy efficient and CO2 aware cloud computing: requirements and case study. In: Proceedings of the 2013 IEEE international conference on systems, man, and cybernetics. IEEE, pp 121\u2013126","DOI":"10.1109\/SMC.2013.28"},{"issue":"3","key":"734_CR50","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6579","volume":"34","author":"Y Xu","year":"2022","unstructured":"Xu Y, Abnoosian K (2022) A new metaheuristic-based method for solving the virtual machines migration problem in the green cloud computing. Concurr Comput Pract Exp 34(3):e6579","journal-title":"Concurr Comput Pract Exp"},{"key":"734_CR51","volume-title":"Case study research: design and methods","author":"RK Yin","year":"2009","unstructured":"Yin RK (2009) Case study research: design and methods. Sage, Thousand Oaks"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-023-00734-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10111-023-00734-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-023-00734-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T01:04:11Z","timestamp":1697850251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10111-023-00734-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,11]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["734"],"URL":"https:\/\/doi.org\/10.1007\/s10111-023-00734-6","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2793337\/v1","asserted-by":"object"}]},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,11]]},"assertion":[{"value":"8 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}