{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:14:26Z","timestamp":1729631666039,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973516","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T15:28:35Z","timestamp":1500996515000},"page":"717-722","source":"Crossref","is-referenced-by-count":4,"title":["Perceived security and privacy of cloud computing applications used in educational ecosystem"],"prefix":"10.23919","author":[{"given":"Tihomir","family":"Orehovacki","sequence":"first","affiliation":[]},{"given":"Darko","family":"Etinger","sequence":"additional","affiliation":[]},{"given":"Snjezana","family":"Babic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.procs.2015.04.171","article-title":"Data Security Challenges and Its Solutions in Cloud Computing","volume":"48","author":"rao","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2014.10.071"},{"key":"ref12","article-title":"Multilevel classification of security concerns in cloud computing","author":"hussain","year":"2016","journal-title":"Appl Comput Informatics"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/41409971","article-title":"Privacy in the digital age: a review of information privacy research in information systems","volume":"35","author":"b\u00e9langer","year":"2011","journal-title":"MIS Q"},{"key":"ref14","first-page":"56","article-title":"Consumer adoption and use of mobile applications: Do privacy and security concerns matter?","volume":"17","author":"garrison","year":"2016","journal-title":"Issues in Inform Syst"},{"key":"ref15","first-page":"798","article-title":"Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances","volume":"12","author":"xu","year":"2011","journal-title":"J Assoc Inf Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2001070103"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/02635570610666403"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/09564230210447913"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-6989(02)00004-8"},{"key":"ref4","first-page":"58","article-title":"E-Learning on the Cloud","volume":"1","author":"al-zoube","year":"2009","journal-title":"Int Arab J"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","article-title":"A survey on cloud computing security: Issues, threats, and solutions","volume":"75","author":"singh","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.050"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"5115","DOI":"10.1016\/j.sbspro.2014.01.1083","article-title":"Effects of Training on Cloud Computing Services on M-learning Perceptions and Adequacies","volume":"116","author":"bicen","year":"2014","journal-title":"Procedia-Soc Behav Sci"},{"key":"ref8","first-page":"9","article-title":"E-Learning using Cloud Computing","volume":"1","author":"bora","year":"2013","journal-title":"ABI Int J Modern Sci Eng"},{"key":"ref7","first-page":"3","article-title":"Cloud Computing, Regulatory Compliance, and Student Privacy: A Guide For School Administrators and Legal Counsel","volume":"30","author":"mutkoski","year":"2014","journal-title":"John Marshall J Inf Technol Priv Law"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"J Netw Comput Appl"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.156"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00112-4"},{"journal-title":"Multivariate Data Analysis","year":"2009","author":"hair","key":"ref22"},{"key":"ref21","first-page":"380","volume":"13","author":"straub","year":"2004","journal-title":"Validation Guidelines for IS Positivist Research Communications of the Association for Information Systems"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija, Croatia","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973516.pdf?arnumber=7973516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T11:50:52Z","timestamp":1569930652000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973516","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}