{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:21:14Z","timestamp":1765959674676,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T00:00:00Z","timestamp":1345420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,20]]},"DOI":"10.1145\/2361999.2362007","type":"proceedings-article","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T12:51:11Z","timestamp":1346763071000},"page":"45-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Does cloud computing deliver the promised benefits for IT industry?"],"prefix":"10.1145","author":[{"given":"Nattakarn","family":"Phaphoom","sequence":"first","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]},{"given":"Nilay","family":"Oza","sequence":"additional","affiliation":[{"name":"University of Helsinki, Helsinki, Finland"}]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]},{"given":"Pekka","family":"Abrahamsson","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2012,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.23"},{"key":"e_1_3_2_1_2_1","unstructured":"Varia J. 2010. Architecting for the Cloud: Best Practices. White Paper. Amazon Web Services.  Varia J. 2010. Architecting for the Cloud: Best Practices. White Paper. Amazon Web Services."},{"key":"e_1_3_2_1_3_1","unstructured":"Sun Microsystems. 2009. Introduction to Cloud Comp. architecture.  Sun Microsystems. 2009. Introduction to Cloud Comp. architecture."},{"key":"e_1_3_2_1_4_1","unstructured":"Herbert L. and Erickson J. 2009. The ROI Of Software-As-A-Service. White Paper. Forrester Research Inc.  Herbert L. and Erickson J. 2009. The ROI Of Software-As-A-Service. White Paper. Forrester Research Inc."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985500.1985509"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536633"},{"key":"e_1_3_2_1_9_1","volume-title":"Tech. Rep. UCB\/EECS-2009-28, EECS Department, U. C.","author":"Armbrust M.","year":"2009","unstructured":"Armbrust , M. , Fox , A. , Griffith , R. , Joseph , A. D. , Katz , R. , Konwinski , A. , Lee , G. , Patterson , D. , Rabkin , R. , Stoica , I. , and Zaharia , M . 2009 . A Berkeley view of cloud computing. Tech. Rep. UCB\/EECS-2009-28, EECS Department, U. C. Berkeley . Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, R., Stoica, I., and Zaharia, M. 2009. A Berkeley view of cloud computing. Tech. Rep. UCB\/EECS-2009-28, EECS Department, U. C. Berkeley."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.59"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mell P. and Grance T. 2011. The NIST Definition of Cloud Computing. National Institute of Standards and Technology.  Mell P. and Grance T. 2011. The NIST Definition of Cloud Computing. National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_12_1","volume-title":"Cloud Computing: Web-Based Dynamic IT Services","author":"Baun C.","year":"2011","unstructured":"Baun , C. , Kunze , M. , Nimin , J. , and Tai , S . 2011 . Cloud Computing: Web-Based Dynamic IT Services . Springer . Baun, C., Kunze, M., Nimin, J., and Tai, S. 2011. Cloud Computing: Web-Based Dynamic IT Services. Springer."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.20"},{"volume-title":"The 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 358--362","author":"Bao D.","key":"e_1_3_2_1_14_1","unstructured":"Bao , D. , Xiao , Z. , Sun , Y. , and Zhao , J . 2010. A method and framework for quality of cloud services measurement . The 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 358--362 . Bao, D., Xiao, Z., Sun, Y., and Zhao, J. 2010. A method and framework for quality of cloud services measurement. The 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 358--362."},{"volume-title":"The 4th International Conference on Application of Information and Communication Technologies, 1--6.","author":"Savola R.","key":"e_1_3_2_1_15_1","unstructured":"Savola , R. , Juhola , A. , and Uusitalo , I . 2010. Towards wider cloud service applicability by security, privacy and trust measurements . The 4th International Conference on Application of Information and Communication Technologies, 1--6. Savola, R., Juhola, A., and Uusitalo, I. 2010. Towards wider cloud service applicability by security, privacy and trust measurements. The 4th International Conference on Application of Information and Communication Technologies, 1--6."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.33"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.57"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2009.43"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.16"},{"key":"e_1_3_2_1_20_1","volume-title":"Content Analysis in Communication Research","author":"Berelson B.","year":"1971","unstructured":"Berelson , B. 1952. Content Analysis in Communication Research , Glencoe, Ill : Free Press 1971 ( first edition from 1952). Berelson, B. 1952. Content Analysis in Communication Research, Glencoe, Ill: Free Press 1971 (first edition from 1952)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Esquivel A. Meric-Bernstam F. and Bernstam E. V. 2006. Accuracy and self correction of information received from an internet breast cancer list: content analysis. BMJ (Clinical research ed.) 939--942.  Esquivel A. Meric-Bernstam F. and Bernstam E. V. 2006. Accuracy and self correction of information received from an internet breast cancer list: content analysis. BMJ (Clinical research ed.) 939--942.","DOI":"10.1136\/bmj.38753.524201.7C"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7.1.e10"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Pearson M. 1996. Look who's talking: A pilot study of the use of discussion lists by journalism educators and students. Paper presented at the Annual Meeting of the Association of Education in Journalism and Mass Communication Anaheim CA.  Pearson M. 1996. Look who's talking: A pilot study of the use of discussion lists by journalism educators and students. Paper presented at the Annual Meeting of the Association of Education in Journalism and Mass Communication Anaheim CA.","DOI":"10.1177\/1329878X9708400116"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.35"},{"key":"e_1_3_2_1_25_1","unstructured":"Cooper D. R. and Schindler P. 2003. Business Research Methods McGraw Hill.  Cooper D. R. and Schindler P. 2003. Business Research Methods McGraw Hill."},{"volume-title":"4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), 606--610","author":"Alhamad M.","key":"e_1_3_2_1_26_1","unstructured":"Alhamad , M. , Dillon , T. , and Chang , E . 2010. Conceptual SLA framework for cloud computing . 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), 606--610 . Alhamad, M., Dillon, T., and Chang, E. 2010. Conceptual SLA framework for cloud computing. 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), 606--610."},{"key":"e_1_3_2_1_27_1","unstructured":"Cloud Security Alliance. 2011. Security guidance for critical areas of focus in cloud computing v3.0  Cloud Security Alliance. 2011. Security guidance for critical areas of focus in cloud computing v3.0"}],"event":{"name":"WICSA\/ECSA '12: WICSA\/ECSA 2012 Proceedings Companion Volume","acronym":"WICSA\/ECSA '12","location":"Helsinki Finland"},"container-title":["Proceedings of the WICSA\/ECSA 2012 Companion Volume"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2361999.2362007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2361999.2362007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:16Z","timestamp":1750277656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2361999.2362007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,20]]},"references-count":27,"alternative-id":["10.1145\/2361999.2362007","10.1145\/2361999"],"URL":"https:\/\/doi.org\/10.1145\/2361999.2362007","relation":{},"subject":[],"published":{"date-parts":[[2012,8,20]]},"assertion":[{"value":"2012-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}