{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T09:12:01Z","timestamp":1714986721930},"reference-count":31,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2022,9,3]]},"DOI":"10.1080\/08874417.2021.1954563","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T14:45:52Z","timestamp":1627915552000},"page":"954-964","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["The Security-as-a-Service Market for Small and Medium Enterprises"],"prefix":"10.1080","volume":"62","author":[{"given":"Derek L.","family":"Nazareth","sequence":"first","affiliation":[{"name":"University of Wisconsin-Milwaukee, Milwaukee, Wisconsin, USA"}]},{"given":"Jae","family":"Choi","sequence":"additional","affiliation":[{"name":"Pittsburg State University, Pittsburg, Kansas, USA"}]},{"given":"Thomas L.","family":"Ngo-Ye","sequence":"additional","affiliation":[{"name":"Alabama State University, Montgomery, Alabama, USA"}]}],"member":"301","published-online":{"date-parts":[[2021,8,2]]},"reference":[{"key":"cit0001","volume-title":"Experiencing MIS","author":"Kroenke DM","year":"2016","edition":"7"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.03.006"},{"key":"cit0003","volume-title":"Systems analysis and design","author":"Kendall KE","year":"2014","edition":"9"},{"key":"cit0004","unstructured":"Beal V. Cloud service. Webopedia; 2018 [accessed 2018 Dec 18]. https:\/\/www.webopedia.com\/TERM\/C\/cloud_services.html."},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.05.006"},{"key":"cit0006","first-page":"32","volume":"24","author":"Sullivan T","year":"2002","journal-title":"InfoWorld"},{"issue":"1","key":"cit0007","first-page":"14","author":"Adamuthe A","year":"2019","journal-title":"J Inf Technol Manag"},{"key":"cit0008","unstructured":"IDG Research. Cloud computing 2018: how enterprise adoption is taking shape. Infoworld; 2018 Aug 15 [accessed 2018 Dec 21]. https:\/\/www.infoworld.com\/article\/3297397\/cloud-computing\/cloud-computing-2018-how-enterprise-adoption-is-taking-shape.html."},{"key":"cit0009","unstructured":"Gartner. Gartner forecasts worldwide public cloud revenue to grow 17.3 percent in 2019. Gartner; 2018 Sep 12. [accessed 2018 Dec 21]. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-09-12-gartner-forecasts-worldwide-public-cloud-revenue-to-grow-17-percent-in-2019."},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1145\/2107556.2107564"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103215"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1201\/1078.10580530\/46352.23.4.20060901\/95110.4"},{"key":"cit0013","unstructured":"Cloud Security Alliance. Defined categories of security as a service (preview) \u2013 continuous monitoring as a service. Cloud Security Alliance; 2016 [accessed 2019 Oct 9]. https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/security-as-a-service\/csa-categories-securities-prep.pdf."},{"key":"cit0014","unstructured":"MarketWatch. Security as a service (SECaaS) market growth and size forecast 2021 trending technologies, trends, key players analysis, and industry insights by 2025. MarketWatch; 2021 Jun 21 [accessed 2021 Jul 1]. https:\/\/www.marketwatch.com\/press-release\/security-as-a-service-secaas-market-growth-and-size-forecast-2021-trending-technologies-trends-key-players-analysis-and-industry-insights-by-2025-2021-06-21."},{"key":"cit0015","unstructured":"Persistence Market Research. Security as a service market. Global market study on security-as-a-service (SaaS): focus on network and cloud security to remain high. Persistence Market Research; 2021 Mar [accessed 2021 Jul 1]. https:\/\/www.persistencemarketresearch.com\/market-research\/security-as-a-service-market.asp."},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103350"},{"key":"cit0018","volume-title":"CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide","author":"Gibson D","year":"2017","edition":"4"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1109\/ISORCW.2012.31"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38323-6_7"},{"key":"cit0021","unstructured":"Dobran B. SECaaS: why security as a service is a trend to watch. Phoenixnap.com; 2018 May 29. [accessed 2021 Jul 1]. https:\/\/phoenixnap.com\/blog\/secaas-security-as-a-service."},{"key":"cit0022","unstructured":"Brook C. What is security as a service? A definition of SECaaS, benefits, examples, and more. Digitalguardian.com; 2018 Dec 5 [accessed 2021 Jul 1]. https:\/\/digitalguardian.com\/blog\/what-security-service-definition-secaas-benefits-examples-and-more."},{"key":"cit0023","unstructured":"Peterson A. Top 5 security-as-a-service providers. Technologyadvice.com; 2016 Jul 18. [accessed 2021 Jul 1]. https:\/\/technologyadvice.com\/blog\/information-technology\/top-5-security-as-a-service-providers\/."},{"key":"cit0024","unstructured":"Wexler S. Why security-as-a-service is poised to take off. Cio.com; 2017 Jan 17 [accessed 2021 Jul 1]. https:\/\/www.cio.com\/article\/3156291\/why-security-as-a-service-is-poised-to-take-off.html."},{"key":"cit0025","volume-title":"Industrial dynamics","author":"Forrester JW","year":"1961"},{"key":"cit0026","volume-title":"Busienss dynamics: systems thinking and modeling for a complex world","author":"Sterman JD","year":"2000"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.399"},{"key":"cit0028","volume-title":"Diffusion of Innovations","author":"Rogers EM","year":"1962"},{"key":"cit0029","first-page":"208","volume":"14","author":"Forrester JW","year":"1980","journal-title":"TIMS Stud Manag Sci"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(89)90059-3"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1002\/sdr.1471"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2021.1954563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T19:34:09Z","timestamp":1661974449000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2021.1954563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,2]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9,3]]}},"alternative-id":["10.1080\/08874417.2021.1954563"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2021.1954563","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-08-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}