{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:03:49Z","timestamp":1775873029150,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T00:00:00Z","timestamp":1509580800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13677-017-0093-0","type":"journal-article","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T21:52:42Z","timestamp":1576014762000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Community clouds within M-commerce: a privacy by design perspective"],"prefix":"10.1186","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5641-7268","authenticated-orcid":false,"given":"Farid","family":"Shirazi","sequence":"first","affiliation":[]},{"given":"Amna","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"issue":"4","key":"93_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.2753\/JEC1086-4415160401","volume":"16","author":"EP Kourouthanassis","year":"2012","unstructured":"Kourouthanassis EP, Giaglis MG (2012) Introduction to the special issue on mobile commerce: the past, present, and future of mobile commerce research. Int J Electron Commer 16(4):5\u201317","journal-title":"Int J Electron Commer"},{"key":"93_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando N, Seng L, Rahayu W (2013) Mobile cloud computing: a survey. Futur Gener Comput Syst 29:84\u2013106","journal-title":"Futur Gener Comput Syst"},{"key":"93_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.5815\/ijcnis.2014.03.03","volume":"3","author":"S Goyal","year":"2014","unstructured":"Goyal S (2014) Public vs private vs hybrid vs community- cloud computing: a critical review. I.J Comput Network Inf Security 3:20\u201329","journal-title":"I.J Comput Network Inf Security"},{"key":"93_CR4","unstructured":"McAfee A (2011, November) What every CEO needs to know about the cloud. Harv Bus Rev Retrieved from: \n                    https:\/\/hbr.org\/2011\/11\/what-every-ceo-needs-to-know-about-the-cloud"},{"key":"93_CR5","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud. Computing Retrieved from: \n                    http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-145.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"93_CR6","unstructured":"Gartner (2016). When Private Cloud Infrastructure Isn't Cloud, and Why That's Okay. Retrieved from: \n                    https:\/\/www.gartner.com\/doc\/reprints?id=1-3Y0I7E8&ct=170414&st=sb"},{"key":"93_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.29","volume":"7","author":"J Harauz","year":"2009","unstructured":"Harauz J, Kaufman LM, Potter B (2009) Data security in the world of cloud computing. IEEE Security & Privacy 7:61\u201364","journal-title":"IEEE Security & Privacy"},{"issue":"2","key":"93_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/13600869.2013.801589","volume":"28","author":"B Koops","year":"2014","unstructured":"Koops B, Leenes R (2014) Privacy regulation cannot be hardcoded. A critical comment on the \u2018privacy by design\u2019 provision in data-protection law. Int Rev Law, Comput Technol 28(2):159\u2013171","journal-title":"Int Rev Law, Comput Technol"},{"issue":"3","key":"93_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1108\/IJRDM-06-2013-0119","volume":"43","author":"M Gro\u00df","year":"2015","unstructured":"Gro\u00df M (2015) Mobile shopping: a classification framework and literature review. Int J Retail Distrib Manag 43(3):221\u2013241","journal-title":"Int J Retail Distrib Manag"},{"key":"93_CR10","unstructured":"Holmes A, Byrne A, Rowley J (2012) Mobile shopping behaviour: insights into attitudes, shopping process involvement and location. Int J Retail Distribution Manage 42"},{"issue":"2","key":"93_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.intmar.2010.02.006","volume":"24","author":"V Shankar","year":"2010","unstructured":"Shankar V, Venkatesh A, Hofacker C, Naik P (2010, May) Mobile shopper marketing: key issues, current insights, and future research avenues. J Interactive Marketing 24(2):111\u2013120","journal-title":"J Interactive Marketing"},{"key":"93_CR12","doi-asserted-by":"crossref","unstructured":"Maamar Z, Yahyaoui H, Mansoor W, Heuvel W (2001) Software agents and wireless E commerce. ACM SIGecom Exchanges 2(3)","DOI":"10.1145\/844324.844327"},{"key":"93_CR13","first-page":"8602","volume":"13","author":"T Hui","year":"2011","unstructured":"Hui T (2011, December) Research on security framework for mobile commerce. SciVerse Science Direct Energy Procedia 13:8602\u20138608","journal-title":"SciVerse Science Direct Energy Procedia"},{"key":"93_CR14","doi-asserted-by":"crossref","unstructured":"Azfar A, Choo KR, Liu L (2016) Android mobile VoIP apps: a survey and examination of their security and privacy. Electron Commer Res 16(73)","DOI":"10.1007\/s10660-015-9208-1"},{"key":"93_CR15","volume-title":"Android development and mobile E-commerce research. Applied Mechanics and Materials Online","author":"Y Liu","year":"2012","unstructured":"Liu Y, Liu Z (2012) Android development and mobile E-commerce research. Applied Mechanics and Materials Online, vol 155\u2013156. Trans Tech Publications, Switzerland"},{"key":"93_CR16","doi-asserted-by":"publisher","first-page":"4030","DOI":"10.1016\/S1876-6102(14)00453-6","volume":"11","author":"X Chen","year":"2011","unstructured":"Chen X, Zhang J, Shao Q (2011, October) Application research on the mobile agent security. SciVerse ScienceDirect, Energy Procedia 11:4030\u20134033","journal-title":"SciVerse ScienceDirect, Energy Procedia"},{"issue":"3","key":"93_CR17","first-page":"346","volume":"7","author":"F Hao","year":"2014","unstructured":"Hao F, Geyong M, Chen J, Wang F, Lin M, Luo C, Yang L (2014) An optimized computational model for multi-community-cloud social collaboration. IEEE 7(3):346\u2013358","journal-title":"IEEE"},{"key":"93_CR18","volume-title":"Privacy by design: on the conformance between protocols and architectures. INRIA","author":"VT Ta","year":"2015","unstructured":"Ta VT, Antignac T (2015) Privacy by design: on the conformance between protocols and architectures. INRIA. University of Lyon, France"},{"issue":"2","key":"93_CR19","first-page":"1","volume":"42","author":"H Sharma","year":"2010","unstructured":"Sharma H (2010) An evaluation of consumer privacy protection in E-commerce websites: a comparative study of six E-stores: part 1. The EDP Audit, Control, and Security Newsletter 42(2):1\u201319","journal-title":"The EDP Audit, Control, and Security Newsletter"},{"key":"93_CR20","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10660-011-9083-3","volume":"11","author":"A Giannakis","year":"2011","unstructured":"Giannakis A, Batten L (2011, August 31) E-commerce: protecting purchaser privacy to enforce Trust, Springer Science and Business Media. Electron Commer Res 11:421\u2013456","journal-title":"Electron Commer Res"},{"key":"93_CR21","doi-asserted-by":"crossref","unstructured":"Zhang H, Li P, Zhou Z, Wu J, Yu X (2014, May) A privacy-aware virtual machine migration framework on hybrid clouds. Journal of Networks 9(5)","DOI":"10.4304\/jnw.9.5.1086-1095"},{"key":"93_CR22","doi-asserted-by":"crossref","unstructured":"Halaweh, M. (2014). Users\u2019 perception of security for mobile communication technology, American University of the Middle East, Kuwait City,Kuwait. IGI Global","DOI":"10.4018\/IJISP.2014070101"},{"issue":"6","key":"93_CR23","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1108\/14636691111174261","volume":"13","author":"MV Lieshout","year":"2011","unstructured":"Lieshout MV, Kool L, Schoonhoven VB, Jonge DM (2011) Privacy by design: an alternative to existing practice in safeguarding privacy. Info 13(6):55\u201368","journal-title":"Info"},{"issue":"1","key":"93_CR24","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.dss.2011.12.001","volume":"53","author":"AYL Chong","year":"2012","unstructured":"Chong AYL, Chan FTS, Ooi KB (2012) Predicting consumer decisions to adopt mobile commerce: cross country empirical examination between China and Malaysia. Decis Support Syst 53(1):34\u201343","journal-title":"Decis Support Syst"},{"key":"93_CR25","doi-asserted-by":"crossref","unstructured":"Hong-yun X Research and Design of WAP-based Mobile E-Commerce System. Key Engineering Materials Volumes:474\u2013476 (403\u2013407)","DOI":"10.4028\/www.scientific.net\/KEM.474-476.403"},{"key":"93_CR26","volume-title":"Special issue on cloud, wireless and e-commerce security","author":"F Leu","year":"2011","unstructured":"Leu F, Lin C, Castiglione A (2011) Special issue on cloud, wireless and e-commerce security. Online Springer, Verlag"},{"key":"93_CR27","volume-title":"Mobile e-commerce personalized information recommendation model, Applied Mechanics and Materials","author":"Y Wang","year":"2014","unstructured":"Wang Y, Wang R, Dexun X (2014) Mobile e-commerce personalized information recommendation model, Applied Mechanics and Materials. Trans Tech Publications, Switzerland"},{"key":"93_CR28","unstructured":"Kushwaha, S., Kumar, S., & Gupta, N. (September 2011). An object oriented record management system (OORMS) for M-commerce system based on J2ME wireless tool kit, Int J Adv Comput Res, 1(1), 2277\u20137970"},{"key":"93_CR29","doi-asserted-by":"publisher","unstructured":"Razaque R, Rizvi S (2017) Privacy preserving model: a new scheme for auditing cloud stakeholders. J Cloud Comput: Advances, Syst Appl. DOI:\n                    10.1186\/s13677-017-0076-1","DOI":"10.1186\/s13677-017-0076-1"},{"key":"93_CR30","first-page":"1409","volume-title":"Regulating privacy by design","author":"I Rubinstein","year":"2011","unstructured":"Rubinstein, I. (2011). Regulating privacy by design, Berkeley Technology Law Journal, 26 (3), 1409\u20131456"},{"key":"93_CR31","volume-title":"Privacy-by-design rules in face recognition system","author":"J Pedraza","year":"2012","unstructured":"Pedraza, J., Patricio, A. M., Deasi, A., & Molina, J.M. (2012). Privacy-by-design rules in face recognition system. Neurocomputing"},{"key":"93_CR32","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1080\/01972243.2014.944730","volume":"30","author":"I Kroener","year":"2014","unstructured":"Kroener I, Wright D (2014) A strategy for operationalizing privacy by design. Inf Soc 30:355\u2013365","journal-title":"Inf Soc"},{"key":"93_CR33","unstructured":"D'Acquisto DG, Ferrer DJ, Kikiras P, Torra V, Montjoye Y-A, Bourka A (2015) Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics. ENISA"},{"key":"93_CR34","volume-title":"Privacy by design: the 7 foundational principles. Implementation and Mapping of Fair Information Practices","author":"A Cavoukian","year":"2009","unstructured":"Cavoukian A (2009) Privacy by design: the 7 foundational principles. Implementation and Mapping of Fair Information Practices. Information and Privacy Commissioner Ontario, Canada"},{"key":"93_CR35","unstructured":"Charith P, McCormick C, Bandara KA, Price AB, Nuseibeh B (2016, November) Privacy-by-design framework for assessing internet of things applications and platforms. The 6th International Conference on the Internet of Things (IoT 2016)"},{"key":"93_CR36","doi-asserted-by":"crossref","unstructured":"Jain, A.K & Shanbhag, D. (2012, October). Addressing security and privacy risks in mobile applications. IT Pro, IEEE Computer Society","DOI":"10.1109\/MITP.2012.72"},{"key":"93_CR37","unstructured":"Davies, N., & Langheinrich, M. (2013). Privacy by design. Pervasive computing IEEE CS\n                           , 1536\u20131268"},{"issue":"4","key":"93_CR38","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.clsr.2013.05.005","volume":"29","author":"P Balboni","year":"2013","unstructured":"Balboni P, Macenaite M (2013) Privacy by design and anonymisation techniques in action: case study of Ma3tch technology. Computer law & security review 29(4):330\u2013340","journal-title":"Computer law & security review"},{"key":"93_CR39","doi-asserted-by":"crossref","unstructured":"Koops, J.B., & Hoepman, H.J., & Leenes, R. (2013). Open-source intelligence and privacy by design, Computer Law & Security Review: The International Journal of Technology Law and Practice, 29(6), 676\u2013688","DOI":"10.1016\/j.clsr.2013.09.005"},{"key":"93_CR40","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li J, Liu Z, Chen X, Xhafia F, Tan X, Wong SD (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Elsevier Knowl-Based Syst 79:18\u201326","journal-title":"Elsevier Knowl-Based Syst"},{"key":"93_CR41","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.jretconser.2012.06.003","volume":"19","author":"K Yang","year":"2012","unstructured":"Yang K (2012) Consumer technology traits in determining mobile shopping adoption: an application of the extended theory of planned behavior. J Retail Consum Serv 19:484\u2013491","journal-title":"J Retail Consum Serv"},{"issue":"4","key":"93_CR42","first-page":"31","volume":"53","author":"R Zhang","year":"2013","unstructured":"Zhang R, Chen QJ, Lee C (2013) Mobile commerce and consumer privacy concerns. J Comput Inf Syst 53(4):31\u201338","journal-title":"J Comput Inf Syst"},{"issue":"3","key":"93_CR43","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1007\/s11277-014-1649-7","volume":"75","author":"Y Wu","year":"2014","unstructured":"Wu Y, Ko R, Al-Dubai A (2014) Special issue on advances in trust, security and privacy for wireless and mobile networks. Wirel Pers Commun 75(3):1587\u20131589","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"93_CR44","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1108\/JEIM-07-2013-0039","volume":"26","author":"MI Alharbi","year":"2013","unstructured":"Alharbi MI, Zyngier S, Hodkinson C (2013) Privacy by design and customers\u2019 perceived privacy and security concerns in the success of e-commerce. J Enterp Inf Manag 26(6):702\u2013718","journal-title":"J Enterp Inf Manag"},{"key":"93_CR45","doi-asserted-by":"crossref","unstructured":"Yang, K., Zhang K., Ren, J & Shen, X. (2015, August). Security and privacy in mobile crowdsourcing networks: challenges and opportunities. Security and Privacy in Emerging Networks. IEEE Communications Magazine","DOI":"10.1109\/MCOM.2015.7180511"},{"key":"93_CR46","doi-asserted-by":"crossref","unstructured":"Nguessan D, Martini JSC (2015, August) Framework for security and privacy Management for Mobile Middleware Based on tuple. IEEE Lat Am Trans 13(8)","DOI":"10.1109\/TLA.2015.7332159"},{"key":"93_CR47","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.4028\/www.scientific.net\/AMR.403-408.1332","volume":"403-408","author":"J Zhao","year":"2012","unstructured":"Zhao J, Zhang W, Yuan C (2012) Research on mobile agent security of application software in open platform. Adv Mater Res 403-408:1332\u20131336","journal-title":"Adv Mater Res"},{"issue":"5842","key":"93_CR48","first-page":"1178","volume":"31","author":"G Duncan","year":"2007","unstructured":"Duncan G (2007, August 31) Privacy by design. Science New Series 31(5842):1178\u20131179","journal-title":"Science New Series"},{"key":"93_CR49","volume-title":"Special issue on advances in security and privacy for future mobile communications","author":"G Kambourakis","year":"2015","unstructured":"Kambourakis G, Mart\u0131inez G, Marmol GF (2015) Special issue on advances in security and privacy for future mobile communications. Springer Science and Business Media, USA: New York"},{"issue":"3","key":"93_CR50","first-page":"61","volume":"16","author":"S Earley","year":"2014","unstructured":"Earley S (2014) Mobile commerce: a broader perspective. IEEE 16(3):61\u201365","journal-title":"IEEE"},{"key":"93_CR51","doi-asserted-by":"crossref","unstructured":"Leavitt, N. (2010, December). Payment Applications Make E-Commerce Mobile. IEEE Computer Society","DOI":"10.1109\/MC.2010.357"},{"key":"93_CR52","doi-asserted-by":"crossref","unstructured":"Mohbey K, Thakur GS (2015) Interesting user behaviour prediction in mobile ecommerce environment using constraints. IETE Tech Rev 32(1)","DOI":"10.1080\/02564602.2014.968224"},{"key":"93_CR53","unstructured":"eMarketer. (2016, May 4). Mcommerce\u2019s Rapid Growth is Primarily Coming from smartphones. Retrieved from: \n                    http:\/\/www.emarketer.com\/Article\/Mcommerces-Rapid-Growth-Primarily-Coming-Smartphones\/1013909\n                    \n                  ."},{"issue":"3","key":"93_CR54","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F Davis","year":"1989","unstructured":"Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013339","journal-title":"MIS Q"},{"issue":"8","key":"93_CR55","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"F Davis","year":"1989","unstructured":"Davis F, Bagozzi R, Warshaw P (1989) User acceptance of computer technology: a comparison of two theoretical models. Manag Sci 35(8):982\u20131002","journal-title":"Manag Sci"},{"issue":"2","key":"93_CR56","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag Sci 46(2):186\u2013204","journal-title":"Manag Sci"},{"key":"93_CR57","unstructured":"Bhatti T (2007) Exploring factors influencing the adoption of mobile commerce. J Internet Banking and Commerce 12(3) Retrieved from: \n                    http:\/\/www.icommercecentral.com\/open-access\/exploring-factors-influencing-the-adoption-of-mobile-commerce.php?aid=38513"},{"issue":"2","key":"93_CR58","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen I (1991) The theory of planned behaviour. Organizational Behav and Human Decision Process 50(2):179\u2013211","journal-title":"Organizational Behav and Human Decision Process"},{"issue":"1","key":"93_CR59","first-page":"96","volume":"8","author":"C Li","year":"2013","unstructured":"Li C (2013) The revised technology acceptance model and the impact of individual differences in assessing internet banking use in Taiwan. Int J Bus and Inf 8(1):96\u2013119","journal-title":"Int J Bus and Inf"},{"key":"93_CR60","unstructured":"Techopedia. Community Clouds. Retrieved from: \n                    https:\/\/www.techopedia.com\/definition\/26559\/community-cloud"},{"key":"93_CR61","doi-asserted-by":"crossref","unstructured":"Modi, K. & Jadeja, Y. (2012). Cloud Computing -Concepts, Architecture and Challenges, proceedings in 2012 international conference on computing, electronics and electrical technologies [ICCEET, 2012], 877\u2013880","DOI":"10.1109\/ICCEET.2012.6203873"},{"key":"93_CR62","doi-asserted-by":"publisher","unstructured":"Rodrigues M, Gon\u00e7alves EG, Kelner J, Sadok HD, Curescu C (2016) High availability in clouds: systematic review and research challenges. Journal of Cloud Computing Advances, Systems and Applications 5(16). DOI:\n                    10.1186\/s13677-016-0066-8","DOI":"10.1186\/s13677-016-0066-8"},{"issue":"5","key":"93_CR63","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MSP.2004.71","volume":"2","author":"D Balfanz","year":"2004","unstructured":"Balfanz D, Durfee G, Smetters DK, Grinter RE (2004) In search of usable security: five lessons from the field. IEEE Security & Privacy 2(5):19\u201324 See also: \n                    http:\/\/www.parc.com\/work\/competencies.html","journal-title":"IEEE Security & Privacy"},{"issue":"5","key":"93_CR64","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1108\/14684520710832315","volume":"31","author":"VL Casalo","year":"2007","unstructured":"Casalo VL, Flavian C, Miguel Guinaliu M (2007) The role of security, privacy, usability and reputation in the development of online banking. Online Inf Rev 31(5):583\u2013603","journal-title":"Online Inf Rev"},{"key":"93_CR65","doi-asserted-by":"publisher","unstructured":"Ouedraogo M, Mignon S, Cholez H, Furnell S, Dubois E (2015) Security transparency: the next frontier for security research in the cloud. J Cloud Comput Adv, Syst and Appl 4(12). DOI:\n                    10.1186\/s13677-015-0037-5","DOI":"10.1186\/s13677-015-0037-5"},{"issue":"8","key":"93_CR66","first-page":"18","volume":"8","author":"R Vanderhoof","year":"2003","unstructured":"Vanderhoof R (2003) Privacy by design. Card Technology 8(8):18\u201320","journal-title":"Card Technology"},{"key":"93_CR67","doi-asserted-by":"crossref","unstructured":"Moorman, C., Zaltman, G., & Deshpande, R. (1992). Relationships between providers and users of marketing research: the dynamics of trust within and between organizations, J Mark Res, 29 (August), 314\u2013329","DOI":"10.2307\/3172742"},{"issue":"4","key":"93_CR68","doi-asserted-by":"publisher","first-page":"77","DOI":"10.2307\/1251958","volume":"55","author":"R Achrol","year":"1991","unstructured":"Achrol R (1991) Evolution of marketing organization: new forms of turbulent environments. J Mark 55(4):77\u201393","journal-title":"J Mark"},{"issue":"April","key":"93_CR69","doi-asserted-by":"publisher","first-page":"11","DOI":"10.2307\/1251126","volume":"51","author":"FR Dwyer","year":"1987","unstructured":"Dwyer FR, Schurr HP, Oh S (1987) Developing buyer-seller relationships. J Mark 51(April):11\u201327","journal-title":"J Mark"},{"issue":"3","key":"93_CR70","doi-asserted-by":"publisher","first-page":"20","DOI":"10.2307\/1252308","volume":"58","author":"MR Morgan","year":"1994","unstructured":"Morgan MR, Hunt DS (1994) The commitment-trust theory of relationship marketing. J Mark 58(3):20\u201338","journal-title":"J Mark"},{"issue":"3","key":"93_CR71","first-page":"39","volume":"32","author":"A Parasuraman","year":"1991","unstructured":"Parasuraman A, Berry LL, Zeithaml AV (1991) Understanding customer expectations of service. Sloan Manag Rev 32(3):39\u201348","journal-title":"Sloan Manag Rev"},{"key":"93_CR72","unstructured":"Milnes, H. (2016, January 5). Where mobile commerce is going in 2016. Digiday. Retrieved from: \n                    http:\/\/digiday.com\/brands\/mobile-commerce-going-2016\/"},{"key":"93_CR73","doi-asserted-by":"crossref","unstructured":"Hoel T, Chen W (2016) Privacy-driven design of learning analytics applications exploring the design space of solutions for data sharing and interoperability. J Learning Analytics 3(1)","DOI":"10.18608\/jla.2016.31.9"},{"issue":"1","key":"93_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds\/s13688-014-0010-4","volume":"3","author":"A Monreale","year":"2014","unstructured":"Monreale A, Rinzivillo S, Pratesi F, Giannotti F, Pedreschi D (2014) Privacy-by-design in big data analytics and social mining. EPJ Data Science 3(1):1\u201326","journal-title":"EPJ Data Science"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-017-0093-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-017-0093-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-017-0093-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T21:53:06Z","timestamp":1576014786000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-017-0093-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,2]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["93"],"URL":"https:\/\/doi.org\/10.1186\/s13677-017-0093-0","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,2]]},"assertion":[{"value":"28 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"22"}}