{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:42:27Z","timestamp":1754156547597,"version":"3.41.2"},"reference-count":25,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T00:00:00Z","timestamp":1439164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8,10]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to propose a combined technique of cumulative voting and numerical assignment to prioritize the services of the learning cloud service. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 The approach starts with requirement elicitation, then analyses of the requirements in terms of prioritization and finally classifies the priority of services into groups. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 As a result of the case study the requirements of the College of Art Media and Technology students has been classified into three service groups. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This combined prioritized techniques can involve learners in the decision making process about learning cloud services utilization in the organizations.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ijicc-06-2014-0029","type":"journal-article","created":{"date-parts":[[2015,7,23]],"date-time":"2015-07-23T07:16:03Z","timestamp":1437635763000},"page":"222-231","source":"Crossref","is-referenced-by-count":1,"title":["Prioritization technique for learning cloud services"],"prefix":"10.1108","volume":"8","author":[{"given":"Apitchaka","family":"Singjai","sequence":"first","affiliation":[]},{"given":"Pradorn","family":"Sureephong","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122123332930600_b151","unstructured":"Abbas, O.A.\n                (2008), \u201cComparisons between data clustering algorithms\u201d, \n                  The International Arab Journal of Information Technology\n               , Vol. 5 No. 3, pp. 320-325."},{"key":"key2020122123332930600_b9","doi-asserted-by":"crossref","unstructured":"Aranda, G.N.\n               , \n                  Vizcaino, A.\n               , \n                  Cechich, A.\n                and \n                  Piattini, M.\n                (2007), \u201cHow to choose groupware tools considering stakeholders\u2019 preferences during requirements elicitation?\u201d, in \n                  Haake, J.M.\n               , \n                  Ochoa, S.F.\n                and \n                  Cechich, A.\n                (Eds), \n                  Groupware: Design, Implementation, and Use\n               , Springer \n               Berlin Heidelberg, pp. 319-327.","DOI":"10.1007\/978-3-540-74812-0_25"},{"key":"key2020122123332930600_b20","doi-asserted-by":"crossref","unstructured":"Berander, P.\n                and \n                  Andrews, A.\n                (2005), \u201cRequirement prioritization\u201d, in \n                  Aurum, A.\n                and \n                  Wohlin, C.\n                (Eds), \n                  Engineering and Managing Software Requirement\n               , Springer \n               Berlin Heidelberg, pp. 69-94.","DOI":"10.1007\/3-540-28244-0_4"},{"key":"key2020122123332930600_b3","unstructured":"Berkovich, M.\n               , \n                  Esch, S.\n               , \n                  Leimeister, J.M.\n                and \n                  Krcmar, H.\n                (2010), \u201cTowards requirements engineering for \u2018software as a service\u2019\u201d, \n                  Multikonferenz Wirtschaftsinformatik (MKWI) 2010\n               , pp. 107-108."},{"key":"key2020122123332930600_b8","unstructured":"Burkhardt, F.\n                and \n                  Schroder, M.\n                (2008), \u201cEmotion markup language: requirements with priorities\u201d, May 13, available at: www.w3.org\/2005\/Incubator\/emotion\/XGR-requirements-20080513\/ (accessed August 21, 2013)."},{"key":"key2020122123332930600_b4","doi-asserted-by":"crossref","unstructured":"Davey, B.\n                and \n                  Cope, C.\n                (2008), \u201cRequirements elicitation \u2013 what\u2019s missing?\u201d, \n                  Journal of Issue in Information Science and Information Technology\n               , Vol. 5 No. 1, pp. 543-551.","DOI":"10.28945\/1027"},{"key":"key2020122123332930600_b7","doi-asserted-by":"crossref","unstructured":"Felfernig, A.\n                and \n                  Ninaus, G.\n                (2012), \u201cGroup recommendation algorithms for requirements prioritization\u201d, Third International Workshop on Recommendation Systems for Software Engineering, Zurich, pp. 59-62.","DOI":"10.1109\/RSSE.2012.6233412"},{"key":"key2020122123332930600_b11","unstructured":"IEEE\n                (1990), \n                  IEEE Standard Glossary of Software Engineering Terminology\n               , IEEE (ANSI)."},{"key":"key2020122123332930600_b6","unstructured":"Jalao, E.R.L.\n               , \n                  Shunk, D.L.\n                and \n                  Wu, T.\n                (2012), \u201cPrioritization of applications for software as a service migration using total life cycle costs and the analytic network process\u201d, Proceeding of The World Congress on Engineering 2012, Vol. III, WCE 2012, July 4-6, London."},{"key":"key2020122123332930600_b12","unstructured":"Jiang, L.\n                (2005), \u201cA framework for the requirements engineering process development\u201d, doctoral insertion, Univesity of Calgary, Alta, p. 347."},{"key":"key2020122123332930600_b10","unstructured":"Jo, H.C.B.\n                and \n                  Hannay, E.\n                (2012), \u201cDoes the prioritization technique affect stakeholders\u2019 selection of essential software product features?\u201d, ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ACM, New York, NY, pp. 261-270."},{"key":"key2020122123332930600_b14","unstructured":"Laura, N.\n                and \n                  Corlett, D.\n                (2006), \u201cReflections on success\u201d, A Retrospective of the mLearn Conference Series, Banff, pp. 2002-2005."},{"key":"key2020122123332930600_b15","unstructured":"Mamoun, H.\n                (2010), \u201cRealizing business agility requirements through SOA and cloud computing\u201d, 18th IEEE International Requirements Engineering Conference, Sydney, pp. 379-380."},{"key":"key2020122123332930600_b16","unstructured":"Manish, G.\n                and \n                  Shrikant, M.\n                (2009), \u201cAn approach for selecting software-as-a-service (SaaS) product\u201d, IEEE International Conference on Cloud Computing, Bangalore, pp. 155-158."},{"key":"key2020122123332930600_b13","unstructured":"Nazeer, K.A.A.\n                and \n                  Sebastian, M.P.\n                (2009), \u201cImproving the accuracy and efficientcy of the k-means clustering algorithm\u201d, Proceeding of The World Congress on Engineering Vol I, WCE 2009, July 1-3, London."},{"key":"key2020122123332930600_b19","unstructured":"Panos, F.\n               , \n                  Vassilis, G.\n               , \n                  Leonidas, A.\n                and \n                  Savvas, I.K.\n                (2010), \u201cSupporting the requirements prioritization process using social network analysis techniques\u201d, workshops on enabling technologies: infrastructure for collaborative enterprises, IEEE Computer Society."},{"key":"key2020122123332930600_b1","unstructured":"Singjai, A.\n                and \n                  Sureepong, P.\n                (2012), \u201cRecommendation matrix for selecting education cloud service providers: configuration and customization perspectives\u201d, The 6th Conference on Software, Knowledge, Information Management and Applications, September 9-11, Chengdu."},{"key":"key2020122123332930600_b22","unstructured":"Singh, S.P.\n                and \n                  Yadav, A.\n                (2013), \u201cStudy of k-means and enhanced k-means clustering algorithm\u201d, \n                  International Journal of Advanced Research in Computer Science\n               , Vol. 4 No. 10, pp. 103-107."},{"key":"key2020122123332930600_b21","unstructured":"Sinthamrongruk, T.\n                (2010), \u201cDecision support system for potential evaluation of supply chain and logistics management\u201d, master\u2019s thesis, Chiang Mai University, Chiang Mai, p. 79."},{"key":"key2020122123332930600_b23","unstructured":"STAMFORD\n                (2012), \u201cGartner says worldwide software-as-a-service revenue to reach $14.5 billion in 2012\u201d, March 27, available at: www.gartner.com\/newsroom\/id\/1963815 (accessed August 24, 2013)."},{"key":"key2020122123332930600_b24","unstructured":"Surcel, T.\n                and \n                  Alecu, F.\n                (2008), \u201cApplications of cloud computing\u201d, International Conference of Science and Technology in the Context of the Sustainable Development, Petroleum Gas University, Ploiesti, pp. 177-180."},{"key":"key2020122123332930600_b25","unstructured":"Xin, Z.\n               , \n                  Li, Y.\n                and \n                  Liu, Y.\n                (2011), \u201cA collaborative requirement elicitation technique for SaaS applications\u201d, IEEE International Conference on Service Operations, Logistics, and Informatics, Beijing, pp. 83-88."},{"key":"key2020122123332930600_frd4","doi-asserted-by":"crossref","unstructured":"Aurum, A.\n                and \n                  Wohlin, C.\n                (2005), \n                  Engineering and Managing Software Requirements\n               , Springer, New York, Secaucus, NJ.","DOI":"10.1007\/3-540-28244-0"},{"key":"key2020122123332930600_frd1","unstructured":"Cheng-Sian, C.\n               , \n                  Tzung-Shi, C.\n                and \n                  Hsiu-Ling, H.\n                (2012), \u201cThe implications of learning cloud for education: from the perspectives of learners\u201d, The 7th IEEE International Conference on Wireless, Mobile and Ubiquitous Technologies in Education, IEEE Computer Society, Takamatsu, pp. 157-161."},{"key":"key2020122123332930600_frd2","unstructured":"Muhammad, A.\n               , \n                  Muhammad, R.\n                and \n                  Jaffar, A.\n                (2010), \u201cAnalysis and optimization of software requirements prioritization techniques\u201d, International Conference on Information and Emerging Technologies, Karachi, pp. 1-6."}],"container-title":["International Journal of Intelligent Computing and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IJICC-06-2014-0029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2014-0029\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2014-0029\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:54:21Z","timestamp":1753397661000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijicc\/article\/8\/3\/222-231\/135220"}},"subtitle":[],"editor":[{"given":"Professor","family":"Keshav Dahal and Professor Yacine Ouzrout","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,8,10]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,8,10]]}},"alternative-id":["10.1108\/IJICC-06-2014-0029"],"URL":"https:\/\/doi.org\/10.1108\/ijicc-06-2014-0029","relation":{},"ISSN":["1756-378X"],"issn-type":[{"type":"print","value":"1756-378X"}],"subject":[],"published":{"date-parts":[[2015,8,10]]}}}