{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:32Z","timestamp":1750308272724,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T00:00:00Z","timestamp":1308528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,20]]},"DOI":"10.1145\/2181101.2181110","type":"proceedings-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:19:38Z","timestamp":1334060378000},"page":"34-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Cloud computing adoption assessment model (CAAM)"],"prefix":"10.1145","author":[{"given":"Usman","family":"Nasir","sequence":"first","affiliation":[{"name":"Keele University, UK"}]},{"given":"Mahmood","family":"Niazi","sequence":"additional","affiliation":[{"name":"Keele University, UK"}]}],"member":"320","published-online":{"date-parts":[[2011,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.010"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1996.tb00813.x"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1551644.1551646"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00498.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_1_8_1","first-page":"9","article-title":"Core IS capabilities for exploiting information technology","volume":"39","author":"Feeny D. F.","year":"1998","unstructured":"Feeny , D. F. and Willcocks , L. P. 1998 . Core IS capabilities for exploiting information technology . Sloan Management Review 39 , 9 -- 21 . Feeny, D. F. and Willcocks, L. P. 1998. Core IS capabilities for exploiting information technology. Sloan Management Review 39, 9--21.","journal-title":"Sloan Management Review"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Feuerlicht G. Sn\u00e1\u0161el V. Szczepaniak P. Abraham A. and Kacprzyk J. 2010. Next Generation SOA: Can SOA Survive Cloud Computing? In Advances in Intelligent Web Mastering - 2 Springer Berlin\/Heidelberg 19--29.  Feuerlicht G. Sn\u00e1\u0161el V. Szczepaniak P. Abraham A. and Kacprzyk J. 2010. Next Generation SOA: Can SOA Survive Cloud Computing? In Advances in Intelligent Web Mastering - 2 Springer Berlin\/Heidelberg 19--29.","DOI":"10.1007\/978-3-642-10687-3_2"},{"volume-title":"Proceedings of the Proceedings of the 7th international conference on Economics of grids, clouds, systems, and services, Ischia, Italy 2010 Springer-Verlag, 93--104","author":"Heinle C.","key":"e_1_3_2_1_10_1","unstructured":"Heinle , C. and Strebel , J . 2010. IaaS adoption determinants in enterprises . In Proceedings of the Proceedings of the 7th international conference on Economics of grids, clouds, systems, and services, Ischia, Italy 2010 Springer-Verlag, 93--104 . Heinle, C. and Strebel, J. 2010. IaaS adoption determinants in enterprises. In Proceedings of the Proceedings of the 7th international conference on Economics of grids, clouds, systems, and services, Ischia, Italy 2010 Springer-Verlag, 93--104."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.112"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.37"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2009.8.1.c4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806338.1806341"},{"key":"e_1_3_2_1_15_1","unstructured":"Kitchenham B. and Charters S. 2007. Guidelines for performing Systematic Literature Reviews in Software Engineering. EBSE Technical Reports.  Kitchenham B. and Charters S. 2007. Guidelines for performing Systematic Literature Reviews in Software Engineering. EBSE Technical Reports."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.20"},{"key":"e_1_3_2_1_17_1","unstructured":"McKinsey & Co. 2009. Clearing the air on cloud computing McKinsey and Co. USA  McKinsey & Co. 2009. Clearing the air on cloud computing McKinsey and Co. USA"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.03.037"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00987314"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.309.6954.597"},{"volume-title":"Draft NIST Working Definition of Cloud Computing Information Technology Laboratory","key":"e_1_3_2_1_21_1","unstructured":"NIST 2009. Draft NIST Working Definition of Cloud Computing Information Technology Laboratory , National Institute of Standards and Technology , USA. NIST 2009. Draft NIST Working Definition of Cloud Computing Information Technology Laboratory, National Institute of Standards and Technology, USA."},{"key":"e_1_3_2_1_22_1","volume-title":"Sprouts: Working Papers on Information Systems 7.","author":"Ranganathan C.","year":"2007","unstructured":"Ranganathan , C. and Balaji , S . 2007 . Critical Capabilities for Offshore Outsourcing of Information Systems . Sprouts: Working Papers on Information Systems 7. Ranganathan, C. and Balaji, S. 2007. Critical Capabilities for Offshore Outsourcing of Information Systems. Sprouts: Working Papers on Information Systems 7."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.11.005"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the International Conference on Information Sysytems ICIS","author":"Xin M.","year":"2008","unstructured":"Xin , M. and Levina , N . 2008. Software-as-a Service Model: Elaborating Client-Side Adoption Factors . In Proceedings of the International Conference on Information Sysytems ICIS , Paris 2008 . Xin, M. and Levina, N. 2008. Software-as-a Service Model: Elaborating Client-Side Adoption Factors. In Proceedings of the International Conference on Information Sysytems ICIS, Paris 2008."},{"key":"e_1_3_2_1_25_1","unstructured":"Yanosky R. 2008 From Users to Choosers: The Cloud and the Changing Shape of Enterprise Authority. In The Tower and the Cloud EDUCASE 126--136.  Yanosky R. 2008 From Users to Choosers: The Cloud and the Changing Shape of Enterprise Authority. In The Tower and the Cloud EDUCASE 126--136."},{"volume-title":"Case Study Research: Design and Methods","author":"Yin R.","key":"e_1_3_2_1_26_1","unstructured":"Yin , R. 2002. Case Study Research: Design and Methods , Third Edition, Applied Social Research Methods Series, Vol 5. Sage Publications, Inc . Yin, R. 2002. Case Study Research: Design and Methods, Third Edition, Applied Social Research Methods Series, Vol 5. Sage Publications, Inc."}],"event":{"name":"Profes '11: Conference on Product Focused Software Development and Process Improvement","sponsor":["Dipartimento di Informatica \"Renato M. Capocelli\", Universit\u00e0 degli Studi di Salerno, Italy Dipartimento di Informatica \"Renato M. Capocelli\", Universit\u00e0 degli Studi di Salerno, Italy","SER&Practices SER&Practices","Universit\u00e0 di Bari Universit\u00e0 di Bari","Daisy-Net Daisy-Net","Exprevia Exprevia SpA","Project Management Institute Project Management Institute","UNIBA Department of Informatics, UNIBA"],"location":"Torre Canne Brindisi Italy","acronym":"Profes '11"},"container-title":["Proceedings of the 12th International Conference on Product Focused Software Development and Process Improvement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2181101.2181110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2181101.2181110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:24:09Z","timestamp":1750267449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2181101.2181110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,20]]},"references-count":26,"alternative-id":["10.1145\/2181101.2181110","10.1145\/2181101"],"URL":"https:\/\/doi.org\/10.1145\/2181101.2181110","relation":{},"subject":[],"published":{"date-parts":[[2011,6,20]]},"assertion":[{"value":"2011-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}