{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:13:53Z","timestamp":1730207633208,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cispee.2016.7777739","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:34:22Z","timestamp":1481592862000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["The ethics in cloud computing"],"prefix":"10.1109","author":[{"given":"Oktay","family":"Tontas","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","volume":"3","author":"chana","year":"2013","journal-title":"International Journal in Foundations of Computer Science & Technology (IJFCST)"},{"journal-title":"Columbia University Computing History","year":"0","author":"grosch","key":"ref11"},{"journal-title":"IBM RedBlook","article-title":"Cloud Computing Simplified: The Thoughts on Cloud Way","year":"0","key":"ref12"},{"article-title":"Understanding the cloud computing stack SaaS, PaaS, IaaS","year":"0","author":"kepes","key":"ref13"},{"year":"0","key":"ref14"},{"article-title":"What Is Platform as a Service (PaaS)?","year":"2009","author":"keene","key":"ref15"},{"article-title":"Moving your Infrastructure to the Cloud - How to Maximize Benefits and Avoid Pitfalls","year":"0","author":"kepes","key":"ref16"},{"journal-title":"Building Ethically Healthy Organizations","year":"0","author":"gill","key":"ref17"},{"journal-title":"Ethics and Technology Controversies Questions and Strategies for Ethical Computing","year":"2015","author":"tavani","key":"ref18"},{"journal-title":"Cyber Security Primer","year":"0","key":"ref19"},{"journal-title":"Committee of Sponsoring Organizations of the Treadway Commission (COSO)","year":"0","key":"ref4"},{"key":"ref3","first-page":"14","author":"marinescu","year":"2013","journal-title":"Cloud Computing Theory and Practice"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_1"},{"key":"ref5","first-page":"161","volume":"6","year":"2016","journal-title":"Journal of Integrative Humanism"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Kaleidoscope.2015.7383624"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.123"},{"journal-title":"Computer Weekly","article-title":"Deperimeterization changing today's security practices","year":"2009","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref9","first-page":"1","author":"sen","year":"2013","journal-title":"Architectures and Protocols for Secure Information Technology Infrastructures"},{"journal-title":"Ten Commandments of Computer Ethics","year":"2014","author":"thomson","key":"ref20"}],"event":{"name":"2016 2nd International Conference of the Portuguese Society for Engineering Education (CISPEE)","start":{"date-parts":[[2016,10,20]]},"location":"Vila Real, Portugal","end":{"date-parts":[[2016,10,21]]}},"container-title":["2016 2nd International Conference of the Portuguese Society for Engineering Education (CISPEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7756177\/7777713\/07777739.pdf?arnumber=7777739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:28:56Z","timestamp":1483622936000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777739\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cispee.2016.7777739","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}