{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T00:04:09Z","timestamp":1756771449805,"version":"3.44.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/iceei47359.2019.8988851","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T22:56:26Z","timestamp":1581375386000},"page":"75-80","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Service Provider Security Readiness Model: The Malaysian Perspective"],"prefix":"10.1109","author":[{"given":"Nur Ilyani","family":"Ahmad","sequence":"first","affiliation":[{"name":"Faculty of Information Science &#x0026; Technology (FTSM), Universiti Kebangsaan Malaysia (UKM),Selangor,Malaysia"}]},{"given":"Ibrahim","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Faculty of Information Science &#x0026; Technology (FTSM), Universiti Kebangsaan Malaysia (UKM),Selangor,Malaysia"}]},{"given":"Maslina","family":"Daud","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,Cyber Security Proactive Services Division,Selangor,Malaysia"}]},{"given":"Ahmad Dahari","family":"Jarno","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,Malaysian Security Evaluation Facility (MySEF) Department,Selangor,Malaysia"}]},{"given":"Norlaili Abdul","family":"Hamid","sequence":"additional","affiliation":[{"name":"Faculty of Information Science &#x0026; Technology (FTSM), Universiti Kebangsaan Malaysia (UKM),Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-09-2014-0094"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-01-2015-0001"},{"key":"ref12","first-page":"1","article-title":"A Novel Method on ISO 27001 Reviews: ISMS Compliance Readiness Level Measurement","volume":"2","author":"susanto","year":"2012","journal-title":"J Sci Comput"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2150817"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0005648702010208"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.132"},{"key":"ref16","first-page":"1","article-title":"NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292)","volume":"292","author":"liu","year":"2012","journal-title":"NIST Special Publication 500-292"},{"year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.80"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.16"},{"key":"ref6","first-page":"1","author":"auditors","year":"2017","journal-title":"White Paper &#x2013; Internal Audit Service Catalogue"},{"journal-title":"TECHNICAL CODE INFORMATION AND NETWORK SECURITY-","year":"2018","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231127"},{"year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2379646"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"journal-title":"Processes of Technological Innovation (Issues in Organization and Management Series)","year":"1990","author":"tornatzky","key":"ref9"}],"event":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2019,7,9]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2019,7,10]]}},"container-title":["2019 International Conference on Electrical Engineering and Informatics (ICEEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966551\/8988782\/08988851.pdf?arnumber=8988851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:23:58Z","timestamp":1756754638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8988851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iceei47359.2019.8988851","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}