{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:18Z","timestamp":1750221198940,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,21]]},"DOI":"10.1145\/3230467.3230479","type":"proceedings-article","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T12:38:13Z","timestamp":1536064693000},"page":"55-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessing Security of Cloud Services in Malaysian Universities A review"],"prefix":"10.1145","author":[{"given":"Fatma Susilawati","family":"Mohamad","sequence":"first","affiliation":[{"name":"Universiti Sultan Zainal Abidin, Terengganu, Malaysia"}]},{"given":"Hajer Ahmed","family":"Albahaloul","sequence":"additional","affiliation":[{"name":"Universiti Sultan Zainal Abidin, Terengganu, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1201\/b11149","volume-title":"Cloud computing: methodology, systems, and applications","author":"Wang L.","year":"2017","unstructured":"Wang , L. , Ranjan , R. , Chen , J. , & Benatallah , B. (Eds.). ( 2017 ). Cloud computing: methodology, systems, and applications . CRC Press . Wang, L., Ranjan, R., Chen, J., & Benatallah, B. (Eds.). (2017). Cloud computing: methodology, systems, and applications. CRC Press."},{"key":"e_1_3_2_1_2_1","volume-title":"Cloud computing: theory and practice. Morgan Kaufmann","author":"Marinescu D. C.","year":"2017","unstructured":"Marinescu , D. C. ( 2017 ). Cloud computing: theory and practice. Morgan Kaufmann . Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.is.2014.07.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ICCAC.2015.8"},{"key":"e_1_3_2_1_5_1","volume-title":"An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107","author":"Almorsy M.","year":"2016","unstructured":"Almorsy , M. , Grundy , J. , & M\u00fcller , I. ( 2016 ). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 . Almorsy, M., Grundy, J., & M\u00fcller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107."},{"volume-title":"Emerging Trends and Technologies in Libraries and Information Services (ETTLIS), 2015 4th International Symposium on 2015, IEEE Conference Publications.","author":"Srivastava J.P.","unstructured":"Srivastava , J.P. ; Verma , V.K. (2015). Cloud computing in libraries: Its needs, applications, issues and best practices . Emerging Trends and Technologies in Libraries and Information Services (ETTLIS), 2015 4th International Symposium on 2015, IEEE Conference Publications. Srivastava, J.P.; Verma, V.K.(2015).Cloud computing in libraries: Its needs, applications, issues and best practices. Emerging Trends and Technologies in Libraries and Information Services (ETTLIS), 2015 4th International Symposium on 2015, IEEE Conference Publications.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1504\/IJCC.2013.050953"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/AINA.2014.105"},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Engineering Science, 6375.","author":"Bulla C.","year":"2016","unstructured":"Bulla , C. , Hunshal , B. , & Mehta , S. ( 2016 ). Adoption of Cloud Computing in Education System: A Survey . International Journal of Engineering Science, 6375. Bulla, C., Hunshal, B., & Mehta, S. (2016). Adoption of Cloud Computing in Education System: A Survey. International Journal of Engineering Science, 6375."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.protcy.2013.12.328"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.im.2014.03.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/CISIS.2014.21"},{"unstructured":"Kurelovi\u0107 E. K. Rako S. & Tomljanovi\u0107 J. (2013 May). Cloud computing in education and student's needs. In Information & Communication Technology Electronics & Microelectronics.  Kurelovi\u0107 E. K. Rako S. & Tomljanovi\u0107 J. (2013 May). Cloud computing in education and student's needs. In Information & Communication Technology Electronics & Microelectronics.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1198-1200)","author":"Kaur R.","year":"2015","unstructured":"Kaur , R. , & Kaur , J. ( 2015 , March). Cloud computing security issues and its solution: A review . In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1198-1200) . IEEE. Kaur, R., & Kaur, J. (2015, March). Cloud computing security issues and its solution: A review. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1198-1200). IEEE."},{"key":"e_1_3_2_1_15_1","volume-title":"Understanding the benefits of IT shared services: Insights from the Higher Education sector","author":"Miskon S.","year":"2017","unstructured":"Miskon , S. , Bandara , W. , & Fielt , E. ( 2017 ). Understanding the benefits of IT shared services: Insights from the Higher Education sector . Miskon, S., Bandara, W., & Fielt, E. (2017). Understanding the benefits of IT shared services: Insights from the Higher Education sector."},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Opportunity and Challenges Using the Cloud Computing In The Case Of Malaysian Higher Education Institutions","volume":"20","author":"Shahzad A.","year":"2016","unstructured":"Shahzad , A. , Golamdin , A. G. , & Ismail , N. A. ( 2016 ). Opportunity and Challenges Using the Cloud Computing In The Case Of Malaysian Higher Education Institutions . International Journal of Management Science and Technology Information , 20 , 1 - 18 . Shahzad, A., Golamdin, A. G., & Ismail, N. A. (2016). Opportunity and Challenges Using the Cloud Computing In The Case Of Malaysian Higher Education Institutions. International Journal of Management Science and Technology Information, 20, 1-18.","journal-title":"International Journal of Management Science and Technology Information"},{"key":"e_1_3_2_1_17_1","volume-title":"Use Cloud Computing in the Fields of Higher Education","author":"Dwivedi S. K.","year":"2016","unstructured":"Dwivedi , S. K. , & Singh , B. ( 2016 ). Use Cloud Computing in the Fields of Higher Education . Dwivedi, S. K., & Singh, B. (2016). Use Cloud Computing in the Fields of Higher Education."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.chb.2017.01.024"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/j.giq.2012.06.012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1016\/j.compeleceng.2012.04.015"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.ijinfomgt.2013.07.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/MCC.2015.1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/s10586-015-0490-4"},{"key":"e_1_3_2_1_24_1","volume-title":"STUDENTS'PERCEPTIONS OF CLOUD COMPUTING. Issues in Information Systems, 15(1)","author":"Changchit C.","year":"2014","unstructured":"Changchit , C. ( 2014 ). STUDENTS'PERCEPTIONS OF CLOUD COMPUTING. Issues in Information Systems, 15(1) . Changchit, C. (2014). STUDENTS'PERCEPTIONS OF CLOUD COMPUTING. Issues in Information Systems, 15(1)."},{"key":"e_1_3_2_1_25_1","volume-title":"A Study on User Adoption of Cloud Storage Service in China: A Revised Unified theory of Acceptance and Use of Technology Model. Paper presented at","author":"Cao Y.","year":"2013","unstructured":"Cao , Y. , Bi , X. , & Wang , L. ( 2013 ). A Study on User Adoption of Cloud Storage Service in China: A Revised Unified theory of Acceptance and Use of Technology Model. Paper presented at Cao, Y., Bi, X., & Wang, L. (2013). A Study on User Adoption of Cloud Storage Service in China: A Revised Unified theory of Acceptance and Use of Technology Model. Paper presented at"},{"volume-title":"2013 International Conference","author":"Information Science","unstructured":"Information Science and Cloud Computing Companion (ISCCC) , 2013 International Conference , Guangzhou, China , 7-8 December. Information Science and Cloud Computing Companion (ISCCC), 2013 International Conference, Guangzhou, China, 7-8 December.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","first-page":"155","article-title":"Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review","volume":"2017","author":"Pattakou A.","year":"2017","unstructured":"Pattakou , A. , Kalloniatis , C. , & Gritzalis , S. ( 2017 ). Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review . CLOUD COMPUTING 2017 , 155 . Pattakou, A., Kalloniatis, C., & Gritzalis, S. (2017). Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review. CLOUD COMPUTING 2017, 155.","journal-title":"CLOUD COMPUTING"},{"issue":"3","key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"125","DOI":"10.54648\/BULA2017019","article-title":"Storms Ahead for Cloud Service Providers","volume":"38","author":"Flint D.","year":"2017","unstructured":"Flint , D. ( 2017 ). Storms Ahead for Cloud Service Providers . Business Law Review , 38 ( 3 ), 125 - 126 . Flint, D. (2017). Storms Ahead for Cloud Service Providers. Business Law Review, 38(3), 125-126.","journal-title":"Business Law Review"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1016\/j.sbspro.2014.04.074"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5539\/cis.v10n2p87"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1016\/j.future.2015.03.013"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1177\/2158244014546461"},{"issue":"1","key":"e_1_3_2_1_33_1","first-page":"40","article-title":"Higher education cloud computing in South Africa: towards understanding trust and adoption issues","volume":"55","author":"Van Der Schyff K.","year":"2014","unstructured":"Van Der Schyff , K. , & Krauss , K. E. ( 2014 ). Higher education cloud computing in South Africa: towards understanding trust and adoption issues . South African Computer Journal , 55 ( 1 ), 40 - 55 . Van Der Schyff, K., & Krauss, K. E. (2014). Higher education cloud computing in South Africa: towards understanding trust and adoption issues. South African Computer Journal, 55(1), 40-55.","journal-title":"South African Computer Journal"}],"event":{"acronym":"ICEMC '18","name":"ICEMC '18: 2018 International Conference on E-business and Mobile Commerce","location":"Chengdu China"},"container-title":["Proceedings of the 2018 International Conference on E-business and Mobile Commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230467.3230479","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230467.3230479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:23Z","timestamp":1750210763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230467.3230479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":33,"alternative-id":["10.1145\/3230467.3230479","10.1145\/3230467"],"URL":"https:\/\/doi.org\/10.1145\/3230467.3230479","relation":{},"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"2018-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}