{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T20:41:39Z","timestamp":1651783299030},"reference-count":25,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"This article describes how Cloud Computing is not just a buzzword but a shift from IT departments to the outsourcing vendors without impacting business efficiency. Some organizations are moving towards cloud computing but many have resistance to adopting cloud computing due to limitations in knowledge and awareness of the classifying elements, which effect decisions on the acceptance of cloud computing. Therefore, this article has focused on accumulating the elements, which can act as enablers, by reviewing existing literature and studies from both professional and academic viewpoints. All the identified enablers have been structurally modeled to develop the relationship matrix and establish the driving power and dependence power of every element. This is done by employing Total Interpretive Structural Modeling (TISM) and Cross Impact Matrix Multiplication Applied to Classification (MICMAC) analysis.<\/jats:p>","DOI":"10.4018\/ijaci.2018070103","type":"journal-article","created":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T14:16:37Z","timestamp":1523542597000},"page":"31-43","source":"Crossref","is-referenced-by-count":0,"title":["Modelling of Cloud Computing Enablers Using MICMAC Analysis and TISM"],"prefix":"10.4018","volume":"9","author":[{"given":"Nitin","family":"Chawla","sequence":"first","affiliation":[{"name":"Amity University, Noida, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4487-7755","authenticated-orcid":true,"given":"Deepak","family":"Kumar","sequence":"additional","affiliation":[{"name":"Amity University, Noida, India"}]}],"member":"2432","reference":[{"key":"IJACI.2018070103-0","doi-asserted-by":"publisher","DOI":"10.4018\/IJNCR.2015070101"},{"issue":"2","key":"IJACI.2018070103-1","first-page":"109","article-title":"An analysis of cloud computing security issues","volume":"2","author":"K.Behl","year":"2012","journal-title":"IEEE Transactions on Information and Communication Technologies"},{"issue":"2","key":"IJACI.2018070103-2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.4018\/IJACI.2017040105","article-title":"How to Manage Persons Taken Malaise at the Steering Wheel Using HAaaS in a Vehicular Cloud Computing Environment.","volume":"8","author":"M.Benadda","year":"2017","journal-title":"International Journal of Ambient Computing and Intelligence"},{"key":"IJACI.2018070103-3","first-page":"45","article-title":"Cloud Computing Efficiency","author":"L.Bowers","year":"2011","journal-title":"Applied Clinical Trials"},{"key":"IJACI.2018070103-4","doi-asserted-by":"crossref","unstructured":"Buyyaa, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Retrieved from www.elsevier.com\/locate\/fgcs","DOI":"10.1016\/j.future.2008.12.001"},{"key":"IJACI.2018070103-5","first-page":"112","article-title":"Journey to Adoption of cloud","author":"N.Chawla","year":"2015","journal-title":"National Conference on Computing, Communication and Information Processing"},{"key":"IJACI.2018070103-6","unstructured":"Dinesh, K.S., Chawla, N., & Kumar, D. (2015). Cloud Computing in Smarter Homes: Enablement of Internet of Things. Review of Business and Technology Research, 12(1), 34-39."},{"key":"IJACI.2018070103-7","year":"2013,"},{"key":"IJACI.2018070103-8","unstructured":"Forrester Research. (2009). Is Cloud Computing Ready for the Enterprise? Retrieved from http:\/\/forrester.com"},{"issue":"2","key":"IJACI.2018070103-9","first-page":"1","article-title":"On the Privacy of Cloud Computing","volume":"14","author":"H.Katzan","year":"2010","journal-title":"International Journal of Management & Information Systems"},{"key":"IJACI.2018070103-10","doi-asserted-by":"publisher","DOI":"10.4018\/ijncr.2014070103"},{"key":"IJACI.2018070103-11","unstructured":"Kushwah, V. S., & Saxena, A. (2013, May). A Security approach for Data Migration in Cloud Computing. International Journal of Scientific and Research Publications, 3(5)."},{"key":"IJACI.2018070103-12","doi-asserted-by":"publisher","DOI":"10.9716\/KITS.2012.11.1.155"},{"key":"IJACI.2018070103-13","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6202020"},{"key":"IJACI.2018070103-14","doi-asserted-by":"publisher","DOI":"10.4018\/IJRSDA.2017070107"},{"key":"IJACI.2018070103-15","unstructured":"McAfee, A. (2011, November). What every CEO needs to know about the Cloud. Harvard Business Review, 89(11), 124-133"},{"key":"IJACI.2018070103-16","unstructured":"Mell, P., & Grance, T. (2009). The NIST Definition of Cloud Computing. NIST. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"IJACI.2018070103-17","unstructured":"Nuseibeh, H. (2011). Adoption of Cloud Computing in Organizations (Paper 372). AMCIS Proceedings."},{"key":"IJACI.2018070103-18","doi-asserted-by":"crossref","unstructured":"Sabahi, F. (May 2011), Virtualization-level security in cloud computing. In Proceedings of the 2011, IEEE 3rd International Conference on Communication Software and Networks (ICCSN), Xi\u2019an, China (pp. 250\u2013254).","DOI":"10.1109\/ICCSN.2011.6014716"},{"key":"IJACI.2018070103-19","author":"A. P.Sage","year":"1977","journal-title":"Interpretive structural modeling: Methodology for large scale systems"},{"key":"IJACI.2018070103-20","doi-asserted-by":"publisher","DOI":"10.4018\/IJACI.2017070101"},{"key":"IJACI.2018070103-21","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.20"},{"key":"IJACI.2018070103-22","doi-asserted-by":"publisher","DOI":"10.4018\/IJRSDA.2016070103"},{"key":"IJACI.2018070103-23","unstructured":"Sriram, I., & Khajeh-Hosseini, A. (2010), Research Agenda in Cloud Technologies. In Proceeding of IEEE CLOUD \u201910, Miami, FL."},{"key":"IJACI.2018070103-24","doi-asserted-by":"publisher","DOI":"10.4018\/IJACI.2017040101"}],"container-title":["International Journal of Ambient Computing and Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=204347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T20:02:30Z","timestamp":1651780950000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJACI.2018070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":25,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijaci.2018070103","relation":{},"ISSN":["1941-6237","1941-6245"],"issn-type":[{"value":"1941-6237","type":"print"},{"value":"1941-6245","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}