{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:05:05Z","timestamp":1730318705125,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018973","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-11","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Risk tolerance and trust issues in cloud-based E-learning"],"prefix":"10.1145","author":[{"given":"Siti Salmah Md","family":"Kassim","sequence":"first","affiliation":[{"name":"Universiti Teknologi Malaysia, Skudai, Malaysia"}]},{"given":"Mazleena","family":"Salleh","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Malaysia, Skudai, Malaysia"}]},{"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Malaysia, Skudai, Malaysia"}]},{"given":"Ab. Razak Che","family":"Husin","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Malaysia, Skudai, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"volume-title":"The nist definition of cloud computing","year":"2011","author":"Mell Peter","key":"e_1_3_2_1_1_1","unstructured":"Peter Mell and Tim Grance . The nist definition of cloud computing . 2011 . Peter Mell and Tim Grance. The nist definition of cloud computing. 2011."},{"volume-title":"Cloud computing: Benefits and challenges transform customers","year":"2014","author":"Kundra Vivek","key":"e_1_3_2_1_2_1","unstructured":"Vivek Kundra . Cloud computing: Benefits and challenges transform customers , 2014 . Vivek Kundra. Cloud computing: Benefits and challenges transform customers, 2014."},{"volume-title":"A history of e-learning: Echoes of the pioneers. Computers and education: E-learning, from theory to practice","year":"2007","author":"Nicholoson P","key":"e_1_3_2_1_3_1","unstructured":"P Nicholoson . A history of e-learning: Echoes of the pioneers. Computers and education: E-learning, from theory to practice . Dordrecht, The Netherlands : Springer , 2007 . P Nicholoson. A history of e-learning: Echoes of the pioneers. Computers and education: E-learning, from theory to practice. Dordrecht, The Netherlands: Springer, 2007."},{"volume-title":"A framework for open, flexible and distributed learning","year":"2000","author":"Khan Badrul H","key":"e_1_3_2_1_4_1","unstructured":"Badrul H Khan . A framework for open, flexible and distributed learning . 2000 . Badrul H Khan. A framework for open, flexible and distributed learning. 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2012.6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Risk management in e-learning projects","author":"Wo\u017aniakowski Tomasz","year":"2012","unstructured":"Tomasz Wo\u017aniakowski and Piotr Ja\u0142owiecki . Risk management in e-learning projects . Information Systems in Management , 1 , 2012 . Tomasz Wo\u017aniakowski and Piotr Ja\u0142owiecki. Risk management in e-learning projects. Information Systems in Management, 1, 2012.","journal-title":"Information Systems in Management"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2014.07.008"},{"volume-title":"World Congress on Information and Communocation Technologies, http:\/ \/www.mirlabs.org\/wict14\/proceedings\/html\/toc-springer.html","year":"2014","author":"Siti Salmah Md Kassim","key":"e_1_3_2_1_9_1","unstructured":"Md Kassim Siti Salmah , Salleh Mazleena , and Zainal Anazida . Cloud computing adoption and security concern in malaysian polytechnic . In World Congress on Information and Communocation Technologies, http:\/ \/www.mirlabs.org\/wict14\/proceedings\/html\/toc-springer.html , 2014 . Md Kassim Siti Salmah, Salleh Mazleena, and Zainal Anazida. Cloud computing adoption and security concern in malaysian polytechnic. In World Congress on Information and Communocation Technologies, http:\/ \/www.mirlabs.org\/wict14\/proceedings\/html\/toc-springer.html, 2014."},{"volume-title":"Risks and remedies in e-learning system. arXiv preprint arXiv:1205.2711","year":"2012","author":"Barik Nikhilesh","key":"e_1_3_2_1_10_1","unstructured":"Nikhilesh Barik and Sunil Karforma . Risks and remedies in e-learning system. arXiv preprint arXiv:1205.2711 , 2012 . Nikhilesh Barik and Sunil Karforma. Risks and remedies in e-learning system. arXiv preprint arXiv:1205.2711, 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Trust mechanisms for cloud computing. Journal of Cloud Computing: Advances","volume":"2","author":"Huang Jingwei","year":"2013","unstructured":"Jingwei Huang and David M Nicol . Trust mechanisms for cloud computing. Journal of Cloud Computing: Advances , Systems and Applications , 2 ( 1 ): 1 , 2013 . Jingwei Huang and David M Nicol. Trust mechanisms for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 2(1):1, 2013.","journal-title":"Systems and Applications"},{"volume-title":"Best practices to develop SLAs for cloud computing Develop a standard way to create service level agreements that multiple partners can use","year":"2013","author":"Myerson Judith M","key":"e_1_3_2_1_13_1","unstructured":"Judith M Myerson . Best practices to develop SLAs for cloud computing Develop a standard way to create service level agreements that multiple partners can use , 2013 . Judith M Myerson. Best practices to develop SLAs for cloud computing Develop a standard way to create service level agreements that multiple partners can use, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345474"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.03.018"},{"volume-title":"Defining Risk Management - Part 5: Risk Tolerance","year":"2009","key":"e_1_3_2_1_16_1","unstructured":"Unknown. Defining Risk Management - Part 5: Risk Tolerance , 2009 . Unknown. Defining Risk Management - Part 5: Risk Tolerance, 2009."},{"volume-title":"Cloud computing security: A systematic literature review","year":"2015","author":"Anton Backe","key":"e_1_3_2_1_17_1","unstructured":"Backe Anton and Lind\u00c3l'n Hugo . Cloud computing security: A systematic literature review , 2015 . Backe Anton and Lind\u00c3l'n Hugo. Cloud computing security: A systematic literature review, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/978-3-319-17398-6_12","volume-title":"Pattern Analysis, Intelligent Security and the Internet of Things","author":"Md Kassim Siti Salmah","year":"2015","unstructured":"Siti Salmah Md Kassim , Mazleena Salleh , and Anazida Zainal . Cloud computing: A general users perception and security awareness in malaysian polytechnic . In Pattern Analysis, Intelligent Security and the Internet of Things , pages 131 -- 140 . Springer , 2015 . Siti Salmah Md Kassim, Mazleena Salleh, and Anazida Zainal. Cloud computing: A general users perception and security awareness in malaysian polytechnic. In Pattern Analysis, Intelligent Security and the Internet of Things, pages 131--140. Springer, 2015."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(14)00224-X"},{"volume-title":"Formalising trust as a computational concept","year":"1994","author":"Marsh Stephen Paul","key":"e_1_3_2_1_20_1","unstructured":"Stephen Paul Marsh . Formalising trust as a computational concept , 1994 . Stephen Paul Marsh. Formalising trust as a computational concept, 1994."},{"volume-title":"Cloud computing issues and benefits modern education. Global Journal of Computer Science and Technology, 12(10-B)","year":"2012","author":"Viswanath Mr D","key":"e_1_3_2_1_21_1","unstructured":"Mr D kasi Viswanath , S Kusuma , and Saroj Kumar Gupta . Cloud computing issues and benefits modern education. Global Journal of Computer Science and Technology, 12(10-B) , 2012 . Mr D kasi Viswanath, S Kusuma, and Saroj Kumar Gupta. Cloud computing issues and benefits modern education. Global Journal of Computer Science and Technology, 12(10-B), 2012."},{"issue":"2","key":"e_1_3_2_1_22_1","first-page":"9","article-title":"E-learning using cloud computing","volume":"1","author":"Bora Utpal Jyoti","year":"2013","unstructured":"Utpal Jyoti Bora and Majidul Ahmed . E-learning using cloud computing . International Journal of Science and Modern Engineering , 1 ( 2 ): 9 -- 12 , 2013 . Utpal Jyoti Bora and Majidul Ahmed. E-learning using cloud computing. International Journal of Science and Modern Engineering, 1(2):9--12, 2013.","journal-title":"International Journal of Science and Modern Engineering"},{"issue":"3","key":"e_1_3_2_1_23_1","first-page":"653","article-title":"Designing issues for e-learning modules in cloud platform","volume":"2","author":"Bansal Preeti","year":"2015","unstructured":"Preeti Bansal and Dr MK Sharma . Designing issues for e-learning modules in cloud platform . International Journal of Information Technology & Computer Sciences Perspectives , 2 ( 3 ): 653 -- 656 , 2015 . Preeti Bansal and Dr MK Sharma. Designing issues for e-learning modules in cloud platform. International Journal of Information Technology & Computer Sciences Perspectives, 2(3):653--656, 2015.","journal-title":"International Journal of Information Technology & Computer Sciences Perspectives"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TALE.2012.6360325"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30859-8_4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2011.577399"},{"volume-title":"E-learning based on cloud computing. Cloud Computing . . . , 3(11):793--802","year":"2014","author":"Shahriar Mohammadi","key":"e_1_3_2_1_27_1","unstructured":"Mohammadi Shahriar and Emdadi Yousef . E-learning based on cloud computing. Cloud Computing . . . , 3(11):793--802 , 2014 . Mohammadi Shahriar and Emdadi Yousef. E-learning based on cloud computing. Cloud Computing . . . , 3(11):793--802, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.006"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.11.014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24747-0_11"},{"volume-title":"An e-learning system architecture based on cloud computing. system, 10(11)","year":"2012","author":"Hossain Masud Md Anwar","key":"e_1_3_2_1_31_1","unstructured":"Md Anwar Hossain Masud and Xiaodi Huang . An e-learning system architecture based on cloud computing. system, 10(11) , 2012 . Md Anwar Hossain Masud and Xiaodi Huang. An e-learning system architecture based on cloud computing. system, 10(11), 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBEG.2011.5881690"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2011.V1.62"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2011.23"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/sres.2283"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1488-7"},{"volume-title":"Fatos Xhafa, and Josep Prieto Bl\u00e1zquez. Security in online web learning assessment. providing an effective trustworthiness approach to support e-learning teams.","year":"2015","author":"Moneo Jorge Miguel","key":"e_1_3_2_1_37_1","unstructured":"Jorge Miguel Moneo , Santi Caball\u00e9 Llobet , Fatos Xhafa, and Josep Prieto Bl\u00e1zquez. Security in online web learning assessment. providing an effective trustworthiness approach to support e-learning teams. 2015 . Jorge Miguel Moneo, Santi Caball\u00e9 Llobet, Fatos Xhafa, and Josep Prieto Bl\u00e1zquez. Security in online web learning assessment. providing an effective trustworthiness approach to support e-learning teams. 2015."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSCAR.2014.6916772"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638404.2638504"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-83555-1_5","volume-title":"What is the analytic hierarchy process? In Mathematical models for decision support","author":"Saaty Thomas L","year":"1988","unstructured":"Thomas L Saaty . What is the analytic hierarchy process? In Mathematical models for decision support , pages 109 -- 121 . Springer , 1988 . Thomas L Saaty. What is the analytic hierarchy process? In Mathematical models for decision support, pages 109--121. Springer, 1988."}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T00:50:54Z","timestamp":1673657454000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":40,"alternative-id":["10.1145\/3018896.3018973","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018973","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}