{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:41:40Z","timestamp":1765280500740,"version":"build-2065373602"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04433-z","type":"journal-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T13:26:51Z","timestamp":1760534811000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Customer Experience Survey Management Software: A Secure and Scalable Multi-Tenant Architecture"],"prefix":"10.1007","volume":"6","author":[{"given":"Quoc-Dung","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Nam","family":"Pham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Trang-Nhung","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tam-Nhu","family":"Phan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nguyet-Minh","family":"Phan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"4433_CR1","unstructured":"Ivanovska LP, Miteva A, Lozanoska A. The challenges of touchpoint management of telecommunications companies with empirical analysis for the republic of north macedonia. Economic Development\/Ekonomiski Razvoj. 2022;24(5)."},{"issue":"6","key":"4433_CR2","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1108\/JSTP-05-2015-0111","volume":"26","author":"R Halvorsrud","year":"2016","unstructured":"Halvorsrud R, Kvale K, F\u00f8lstad A. Improving service quality through customer journey analysis. J Serv Theory Pract. 2016;26(6):840\u201367.","journal-title":"J Serv Theory Pract"},{"key":"4433_CR3","unstructured":"Deloitte: 2021 Global Marketing Trends. https:\/\/www2.deloitte.com\/xe\/en\/pages\/strategy-operations\/articles\/2021-global-marketing-trends.html. Accessed: 12 April 2025 (2021)"},{"key":"4433_CR4","doi-asserted-by":"publisher","first-page":"987","DOI":"10.21817\/ijet\/2018\/v10i4\/181004209","volume":"10","author":"HD Denavi","year":"2018","unstructured":"Denavi HD, Emadi SH, Manshadi M. The effect of customer relationship management on customer satisfaction and competitive advantage. International Journal of Engineering and Technology. 2018;10:987\u201394.","journal-title":"International Journal of Engineering and Technology"},{"issue":"2","key":"4433_CR5","first-page":"139","volume":"7","author":"DM Haryandika","year":"2021","unstructured":"Haryandika DM, Santra IK. The effect of customer relationship management on customer satisfaction and customer loyalty. Indonesian Journal of Business and Entrepreneurship (IJBE). 2021;7(2):139\u2013139.","journal-title":"Indonesian Journal of Business and Entrepreneurship (IJBE)"},{"issue":"4","key":"4433_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, et al. A view of cloud computing. Commun ACM. 2010;53(4):50\u20138.","journal-title":"Commun ACM"},{"key":"4433_CR7","unstructured":"AWS: SaaS Tenant Isolation Strategies: Isolating Resources in a Multi-Tenant Environment. https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/saas-tenant-isolation-strategies\/saas-tenant-isolation-strategies.html. Accessed: 12 April 2025 (2020)"},{"key":"4433_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen Q-D, Pham V-N, Dang T-N, Phan T-N. A secure multi-tenant architecture for customer experience survey software. In: International Conference on Future Data and Security Engineering, pp. 2024;48\u201361","DOI":"10.1007\/978-981-96-0437-1_4"},{"key":"4433_CR9","doi-asserted-by":"crossref","unstructured":"Bezemer C-P, Zaidman A. Multi-tenant saas applications: maintenance dream or nightmare? In: Proceedings of the Joint Ercim Workshop on Software Evolution (evol) and International Workshop on Principles of Software Evolution (iwpse), 2010; 88\u201392","DOI":"10.1145\/1862372.1862393"},{"key":"4433_CR10","doi-asserted-by":"crossref","unstructured":"Pinto VHSC, Oliveira RR, Vilela RF, Souza SR. Evaluating the user acceptance testing for multi-tenant cloud applications. In: Proceedings of the 8th International Conference on Cloud Computing and Services Science, 1, 2018; 47\u201356","DOI":"10.5220\/0006664000470056"},{"key":"4433_CR11","doi-asserted-by":"crossref","unstructured":"Maenhaut P-J, Moens H, Ongenae V, De\u00a0Turck F. Migrating legacy software to the cloud: approach and verification by means of two medical software use cases. Software: Practice and Experience 2016;46(1), 31\u201354","DOI":"10.1002\/spe.2320"},{"key":"4433_CR12","doi-asserted-by":"crossref","unstructured":"Pinto VH, Luz HJ, Oliveira RR, Souza PS, Souza SR. A systematic mapping study on the multi-tenant architecture of saas systems. In: 2016 International Conferences on Software Engineering and Knowledge Engineering, 2016; 396\u2013401","DOI":"10.18293\/SEKE2016-068"},{"key":"4433_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.jss.2014.10.034","volume":"100","author":"J Kabbedijk","year":"2015","unstructured":"Kabbedijk J, Bezemer C-P, Jansen S, Zaidman A. Defining multi-tenancy: a systematic mapping study on the academic and the industrial perspective. J Syst Softw. 2015;100:139\u201348.","journal-title":"J Syst Softw"},{"key":"4433_CR14","doi-asserted-by":"publisher","first-page":"341","DOI":"10.54660\/.IJMRGE.2021.2.6.341-348","volume":"2","author":"AY Reddy","year":"2021","unstructured":"Reddy AY, Kumar MU. Design and development of multi-tenancy security issues in cloud computing. International Journal of Multidisciplinary Research and Growth Evaluation. 2021;2:341\u20138.","journal-title":"International Journal of Multidisciplinary Research and Growth Evaluation"},{"key":"4433_CR15","doi-asserted-by":"crossref","unstructured":"Ochei LC, Petrovski A, Bass JM. Evaluating degrees of tenant isolation in multitenancy patterns: A case study of cloud-hosted version control system (vcs). In: 2015 International Conference on Information Society (i-Society), 2015; 59\u201366","DOI":"10.1109\/i-Society.2015.7366859"},{"key":"4433_CR16","doi-asserted-by":"crossref","unstructured":"Decat M, Bogaerts J, Lagaisse B, Joosen W. Amusa: middleware for efficient access control management of multi-tenant saas applications. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015; 2141\u20132148","DOI":"10.1145\/2695664.2695708"},{"key":"4433_CR17","volume-title":"Cloud Security and Privacy: an Enterprise Perspective on Risks and Compliance","author":"T Mather","year":"2009","unstructured":"Mather T, Kumaraswamy S, Latif S. Cloud Security and Privacy: an Enterprise Perspective on Risks and Compliance. California: O\u2019Reilly Media Inc; 2009."},{"key":"4433_CR18","doi-asserted-by":"crossref","unstructured":"Aulbach S, Grust T, Jacobs D, Kemper A, Rittinger J. Multi-tenant databases for software as a service: schema-mapping techniques. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, 2008; 1195\u20131206","DOI":"10.1145\/1376616.1376736"},{"issue":"4","key":"4433_CR19","doi-asserted-by":"publisher","first-page":"13","DOI":"10.14257\/ijseia.2016.10.4.02","volume":"10","author":"M Samrajesh","year":"2016","unstructured":"Samrajesh M, Gopalan N. Towards multivariable architecture for saas multi-tenant applications. International Journal of Software Engineering and Its Applications. 2016;10(4):13\u201326.","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"4433_CR20","doi-asserted-by":"crossref","unstructured":"Cao Y, Lung C-H, Ajila SA. Constraint-based multi-tenant saas deployment using feature modeling and xml filtering techniques. In: 2015 IEEE 39th Annual Computer Software and Applications Conference, vol. 3, 2015; 454\u2013459","DOI":"10.1109\/COMPSAC.2015.255"},{"key":"4433_CR21","doi-asserted-by":"crossref","unstructured":"Makki M, Van\u00a0Landuyt D, Walraven S, Joosen W. Scalable and manageable customization of workflows in multi-tenant saas offerings. In: Proceedings of the 31st Annual Acm Symposium on Applied Computing, 2016; 432\u2013439","DOI":"10.1145\/2851613.2851627"},{"key":"4433_CR22","doi-asserted-by":"crossref","unstructured":"Mietzner R, Unger T, Titze R, Leymann F. 2009; Combining different multi-tenancy patterns in service-oriented applications. In: 2009 IEEE International Enterprise Distributed Object Computing Conference, 131\u2013140","DOI":"10.1109\/EDOC.2009.13"},{"issue":"12","key":"4433_CR23","first-page":"46","volume":"81","author":"FF Reichheld","year":"2003","unstructured":"Reichheld FF. The one number you need to grow. Harv Bus Rev. 2003;81(12):46\u201355.","journal-title":"Harv Bus Rev"},{"issue":"4","key":"4433_CR24","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1177\/002224299606000403","volume":"60","author":"C Fornell","year":"1996","unstructured":"Fornell C, Johnson MD, Anderson EW, Cha J, Bryant BE. The american customer satisfaction index: nature, purpose, and findings. J Mark. 1996;60(4):7\u201318.","journal-title":"J Mark"},{"key":"4433_CR25","doi-asserted-by":"crossref","unstructured":"Chen H, Chiang RH, Storey VC. Business intelligence and analytics: From big data to big impact. MIS quarterly, 2012; 1165\u20131188","DOI":"10.2307\/41703503"},{"key":"4433_CR26","unstructured":"Provos N, Mazieres D. A future-adaptable password scheme. In: USENIX Annual Technical Conference, FREENIX Track, vol. 1999, 1999; 81\u201391"},{"key":"4433_CR27","doi-asserted-by":"crossref","unstructured":"Jones M, Bradley J, Sakimura N. Json web token (jwt). Technical report, IETF. RFC 7519 2015;","DOI":"10.17487\/RFC7519"},{"key":"4433_CR28","unstructured":"Chong F, Carraro G, Wolter R. Multi-tenant data architecture. MSDN Library, Microsoft Corporation, 2006;14\u201330"},{"issue":"53","key":"4433_CR29","first-page":"8","volume":"800","author":"JT Force","year":"2013","unstructured":"Force JT, Initiative T. Security and privacy controls for federal information systems and organizations. NIST Spec Publ. 2013;800(53):8\u201313.","journal-title":"NIST Spec Publ"},{"key":"4433_CR30","doi-asserted-by":"crossref","unstructured":"Priovolos T, Maroulis S, Kalogeraki V. Escape: Elastic caching for big data systems. In: 2019 38th Symposium on Reliable Distributed Systems (SRDS), 2019; 93\u20139309","DOI":"10.1109\/SRDS47363.2019.00020"},{"key":"4433_CR31","doi-asserted-by":"crossref","unstructured":"Chi X, Liu B, Niu Q, Wu Q. Web load balance and cache optimization design based nginx under high-concurrency environment. In: 2012 Third International Conference on Digital Manufacturing & Automation, 2012; 1029\u20131032","DOI":"10.1109\/ICDMA.2012.241"},{"key":"4433_CR32","volume-title":"Angular: Up and Running: Learning Angular","author":"S Seshadri","year":"2018","unstructured":"Seshadri S. Angular: Up and Running: Learning Angular. California: Step by Step. O\u2019Reilly Media Inc; 2018."},{"key":"4433_CR33","volume-title":"Learning JavaScript Design Patterns: A JavaScript and React Developer\u2019s Guide","author":"A Osmani","year":"2023","unstructured":"Osmani A. Learning JavaScript Design Patterns: A JavaScript and React Developer\u2019s Guide. California: O\u2019Reilly Media Inc; 2023."},{"key":"4433_CR34","doi-asserted-by":"publisher","DOI":"10.1002\/9780470940105","volume-title":"Cloud Computing: Principles and Paradigms","author":"R Buyya","year":"2011","unstructured":"Buyya R, Broberg J, Goscinski A. Cloud Computing: Principles and Paradigms. 1st ed. New York: Wiley; 2011.","edition":"1"},{"key":"4433_CR35","volume-title":"SQL Antipatterns: Avoiding the Pitfalls of Database Programming","author":"B Karwin","year":"2017","unstructured":"Karwin B. SQL Antipatterns: Avoiding the Pitfalls of Database Programming. 1st ed. Texas: Pragmatic Programmers; 2017.","edition":"1"},{"issue":"2","key":"4433_CR36","doi-asserted-by":"publisher","first-page":"104","DOI":"10.34306\/ijcitsm.v2i2.84","volume":"2","author":"S Maesaroh","year":"2022","unstructured":"Maesaroh S, Gunawan H, Lestari A, Tsaurie MSA, Fauji M. Query optimization in mysql database using index. International Journal of Cyber and IT Service Management. 2022;2(2):104\u201310.","journal-title":"International Journal of Cyber and IT Service Management"},{"key":"4433_CR37","unstructured":"Tod Golding - AWS SaaS Factory: SaaS Architecture Fundamentals: AWS Whitepaper. https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/saas-architecture-fundamentals\/saas-architecture-fundamentals.html. Accessed: 27 July 2025 (2022)"},{"key":"4433_CR38","doi-asserted-by":"crossref","unstructured":"Mietzner R, Leymann F, Papazoglou MP. Defining composite configurable saas application packages using sca, variability descriptors and multi-tenancy patterns. In: 2008 Third International Conference on Internet and Web Applications and Services, 2008; 156\u2013161","DOI":"10.1109\/ICIW.2008.68"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04433-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04433-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04433-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T13:26:59Z","timestamp":1760534819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04433-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":38,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4433"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04433-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"30 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no Conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This study does not violate and does not involve moral and ethical statement.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors were aware of the publication of the paper and agreed to its publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"907"}}