{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:00:31Z","timestamp":1753354831284},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/ccis.2011.6045126","type":"proceedings-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T16:57:09Z","timestamp":1318525029000},"source":"Crossref","is-referenced-by-count":7,"title":["Business intelligence in the cloud: A case of Pakistan"],"prefix":"10.1109","author":[{"given":"Surat","family":"Khan","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Faizullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Siqi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"abell'o","year":"0","journal-title":"ON-LINE ANALYTICAL PROCESSING Universitat Polit'ecnica de Catalunya"},{"key":"ref11","author":"pareek","year":"2007","journal-title":"Business Intelligence for Telecommunications"},{"key":"ref12","author":"celina","year":"0","journal-title":"Approach to Building and Implementing Business Intelligence Systems"},{"key":"ref13","author":"lee","year":"0","journal-title":"Jeff Voas DRAFT Cloud Computing Synopsis and Recommendations Recommendation of the National Institute of Standards and Technology (NIST)"},{"key":"ref14","article-title":"The European Network and Information Security Agency (ENISA)","year":"0","journal-title":"Cloud Computing Security Risk Assessment"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","year":"0"},{"key":"ref18","year":"0","journal-title":"Secure your cloud applications&#x2026;inside and out IBM Application Security Services for Cloud"},{"key":"ref19","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2011.541"},{"key":"ref3","article-title":"Delivering software as a service","author":"dubey","year":"2007","journal-title":"The McKinsey Quarterly"},{"key":"ref6","article-title":"Cloud computing after Amazon and Sony: ready for primetime","author":"weber","year":"0","journal-title":"BBC News website 20 May 2011 Last updated at 00 10 GM"},{"key":"ref5","author":"weber","year":"0","journal-title":"Cloud computing How to get your business ready BBC News website"},{"key":"ref8","author":"celina","year":"0","journal-title":"Business Intelligence Systems in the Holistic Infrastructure Development Supporting Decision-Making in Organizations University of Economics"},{"key":"ref7","author":"kalakota","year":"2000","journal-title":"e-Business Roadmap for Success"},{"key":"ref2","author":"hostmann","year":"0","journal-title":"Gartners Business Intelligence and Performance Management Framework"},{"key":"ref1","article-title":"Business Intelligence Certification Guide","author":"reinschmidt","year":"2000","journal-title":"IBM International Technical Support Organization"},{"key":"ref9","year":"0","journal-title":"Database Concepts 10g Release 2 (10 2)"},{"key":"ref20","author":"singh yadav","year":"0","journal-title":"CLOUD A Computing Infrastructure On Demand Commercially Available Cloud Services"},{"key":"ref22","author":"pearson","year":"0","journal-title":"Privacy Security and Trust Issues Arising from Cloud Computing Cloud and Security Research Lab HP Labs Bristol"},{"key":"ref21","author":"wayne","year":"0","journal-title":"Cloud Hooks Security and Privacy Issues in Cloud Computing"}],"event":{"name":"2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)","location":"Beijing, China","start":{"date-parts":[[2011,9,15]]},"end":{"date-parts":[[2011,9,17]]}},"container-title":["2011 IEEE International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6034549\/6045020\/06045126.pdf?arnumber=6045126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T22:19:11Z","timestamp":1490048351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6045126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ccis.2011.6045126","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}