{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:16Z","timestamp":1750308436677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372997","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["CRUSCom model"],"prefix":"10.1145","author":[{"given":"Mustapha","family":"El Hamzaoui","sequence":"first","affiliation":[{"name":"ISTEM Laboratory, Doukkali University, EL Jadida Morocco"}]},{"given":"Bensalah","family":"Faycal","sequence":"additional","affiliation":[{"name":"STIC Laboratory, Doukkali University, EL Jadida Morocco"}]},{"given":"Bahnasse","family":"Ayoub","sequence":"additional","affiliation":[{"name":"LTI Laboratory, M'Sik\/Hassan II University, Casablanca Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Network","volume":"2","author":"Klerer S.","year":"1988","unstructured":"S. Klerer . \" The OSI Management Architecture : an Overview \", IEEE Network , Vol. 2 N.2, Mars 1988 . S. Klerer. \"The OSI Management Architecture: an Overview\", IEEE Network, Vol. 2 N.2, Mars 1988."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/www.omg.org\/spec\/UML\/2.0\/  https:\/\/www.omg.org\/spec\/UML\/2.0\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Editions ENI","author":"Baptiste J-L","year":"2012","unstructured":"J-L Baptiste ,\" Merise - Guide pratique : mod\u00e9lisation des donn\u00e9es et des traitements, manipulations avec le langage SQL\", 2\u00e8me \u00e9dition , Editions ENI , 2012 . J-L Baptiste,\"Merise - Guide pratique: mod\u00e9lisation des donn\u00e9es et des traitements, manipulations avec le langage SQL\", 2\u00e8me \u00e9dition, Editions ENI, 2012."},{"issue":"4","key":"e_1_3_2_1_4_1","first-page":"10","article-title":"Scalable SQL and NoSQL data stores","volume":"39","author":"Cattell Rick","year":"2010","unstructured":"Rick Cattell , \" Scalable SQL and NoSQL data stores \", ACM SIGMOD Record , v. 39 n. 4 , December 2010 [doi&gt; 10 .1145\/1978915.1978919] Rick Cattell, \"Scalable SQL and NoSQL data stores\", ACM SIGMOD Record, v.39 n.4, December 2010 [doi&gt;10.1145\/1978915.1978919]","journal-title":"ACM SIGMOD Record"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3535-8_27"},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/www.omg.org  https:\/\/www.omg.org"},{"key":"e_1_3_2_1_7_1","volume-title":"NISS19 Proceedings of the 2nd International Conference on Networking, Information Systems & Security, Article No. 30","author":"M.","year":"2019","unstructured":"M. EL Hamzaoui and B. Bensalah. \"A theoretical model to illustrate the possible relations link the IS and the ICT to the organization digital information\/Data \", NISS19 Proceedings of the 2nd International Conference on Networking, Information Systems & Security, Article No. 30 , Rabat, Morocco --- March 27 - 29 , 2019 available at https:\/\/dl.acm.org\/citation.cfm?doid=3320326.3320362 M.EL Hamzaoui and B. Bensalah. \"A theoretical model to illustrate the possible relations link the IS and the ICT to the organization digital information\/Data\", NISS19 Proceedings of the 2nd International Conference on Networking, Information Systems & Security, Article No. 30, Rabat, Morocco --- March 27 - 29, 2019 available at https:\/\/dl.acm.org\/citation.cfm?doid=3320326.3320362"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1999.tb00355.x"},{"key":"e_1_3_2_1_9_1","volume-title":"Barriers, And Improving Effectiveness\", Schooling","author":"Lunenburg Fred C.","year":"2010","unstructured":"Fred C. Lunenburg .\"Communication : The Process , Barriers, And Improving Effectiveness\", Schooling , Vol. 1 , N. 1, 2010 Fred C. Lunenburg.\"Communication: The Process, Barriers, And Improving Effectiveness\", Schooling, Vol.1, N.1, 2010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/00242539710178452"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/13614568.2016.1179796"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1471"},{"key":"e_1_3_2_1_13_1","article-title":"Fuller, \"Understanding the information needs of public health practitioners: A literature review to inform design of an interactive digital knowledge management system","author":"Revere Debra","unstructured":"Debra Revere , Anne M. Turner , Ann Madhavan , Neil Rambo , Paul F. Bugni , Ann Marie Kimball and Sherrilynne S . Fuller, \"Understanding the information needs of public health practitioners: A literature review to inform design of an interactive digital knowledge management system \", Journal of Biomedical Informatics Debra Revere, Anne M.Turner, Ann Madhavan, Neil Rambo, Paul F.Bugni, Ann Marie Kimball and Sherrilynne S.Fuller, \"Understanding the information needs of public health practitioners: A literature review to inform design of an interactive digital knowledge management system\", Journal of Biomedical Informatics","journal-title":"Journal of Biomedical Informatics"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372997"}},"subtitle":["A new theoretical model to trace the evolution line of information within the enterprise environment"],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":13,"alternative-id":["10.1145\/3372938.3372997","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372997","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}