{"id":"https://openalex.org/W2806598941","doi":"https://doi.org/10.1145/3197026.3203897","title":"Challenges to Deploying Library Services in the Cloud","display_name":"Challenges to Deploying Library Services in the Cloud","publication_year":2018,"publication_date":"2018-05-23","ids":{"openalex":"https://openalex.org/W2806598941","doi":"https://doi.org/10.1145/3197026.3203897","mag":"2806598941"},"language":"en","primary_location":{"id":"doi:10.1145/3197026.3203897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3197026.3203897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054127337","display_name":"Devendra Potnis","orcid":"https://orcid.org/0000-0003-2507-8157"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Devendra Potnis","raw_affiliation_strings":["University of Tennessee at Knoxville, Knoxville, TN, USA"],"affiliations":[{"raw_affiliation_string":"University of Tennessee at Knoxville, Knoxville, TN, USA","institution_ids":["https://openalex.org/I75027704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027031493","display_name":"Reynard Regenstreif-Harms","orcid":null},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reynard Regenstreif-Harms","raw_affiliation_strings":["University of Tennessee at Chattanooga, Chattanooga, TN, USA"],"affiliations":[{"raw_affiliation_string":"University of Tennessee at Chattanooga, Chattanooga, TN, USA","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079888879","display_name":"Dwight Hunter","orcid":null},"institutions":[{"id":"https://openalex.org/I2800838016","display_name":"Chattanooga State Community College","ror":"https://ror.org/01a697543","country_code":"US","type":"education","lineage":["https://openalex.org/I2800838016"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dwight Hunter","raw_affiliation_strings":["Chattanooga State Community College, Chattanooga, TN, USA"],"affiliations":[{"raw_affiliation_string":"Chattanooga State Community College, Chattanooga, TN, USA","institution_ids":["https://openalex.org/I2800838016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054127337"],"corresponding_institution_ids":["https://openalex.org/I75027704"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06188669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"35","issue":null,"first_page":"375","last_page":"376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7363435626029968},{"id":"https://openalex.org/keywords/software-as-a-service","display_name":"Software as a service","score":0.7189735770225525},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5760312676429749},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.560642421245575},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4873383939266205},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4660680592060089},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4469899535179138},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4240038990974426},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.41952812671661377},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3681667447090149},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3177071809768677},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30633026361465454},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.1375686526298523},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.11767348647117615},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.09382206201553345}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7363435626029968},{"id":"https://openalex.org/C175133352","wikidata":"https://www.wikidata.org/wiki/Q1254596","display_name":"Software as a service","level":4,"score":0.7189735770225525},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5760312676429749},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.560642421245575},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4873383939266205},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4660680592060089},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4469899535179138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4240038990974426},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.41952812671661377},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3681667447090149},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3177071809768677},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30633026361465454},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.1375686526298523},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.11767348647117615},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.09382206201553345},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3197026.3203897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3197026.3203897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1962395520","https://openalex.org/W1986054019","https://openalex.org/W2002507436","https://openalex.org/W2043404905","https://openalex.org/W2046235404","https://openalex.org/W2092872567","https://openalex.org/W2337969425","https://openalex.org/W2477215190","https://openalex.org/W2529605678"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W1864280877"],"abstract_inverted_index":{"This":[0],"poster":[1],"analyzes":[2],"challenges":[3,63],"to":[4,22,64,78,143],"planning,":[5,43],"deploying,":[6,44],"and":[7,38,45,93,99,104,116,122,124,127,140],"maintaining":[8,46],"different":[9],"types":[10],"of":[11,58,82,95,101,112],"library":[12,28,47,102],"services":[13,48],"in":[14,42,49,71,84,151],"the":[15,50,59,79,145],"cloud.":[16,51],"We":[17],"apply":[18],"grounded":[19],"theory":[20],"principles":[21],"analyze":[23],"75":[24],"articles":[25],"authored":[26],"by":[27],"administrators,":[29],"librarians":[30],"with":[31,120],"IT":[32,34,108],"expertise,":[33],"professionals,":[35],"cybersecurity":[36],"experts,":[37],"business":[39],"consultants":[40],"engaged":[41],"Data":[52,129],"analysis":[53],"reveals":[54],"that":[55],"a":[56,68],"majority":[57],"past":[60],"literature":[61],"reports":[62],"implementing":[65],"Software":[66],"as":[67],"Service":[69],"(SaaS)":[70],"libraries.":[72,152],"The":[73],"seven":[74],"key":[75],"areas":[76],"critical":[77],"successful":[80],"implementation":[81],"SaaS":[83,149],"libraries":[85],"are":[86],"related":[87],"to:":[88],"(1)":[89],"data,":[90],"(2)":[91],"authentication":[92],"privacy":[94],"patrons,":[96],"(3)":[97],"skills":[98],"knowledge":[100],"staff":[103],"organizational":[105],"culture,":[106],"(4)":[107],"infrastructure,":[109],"(5)":[110],"features":[111],"services,":[113],"(6)":[114],"fixed":[115],"operational":[117],"costs":[118],"associated":[119],"data":[121],"technology,":[123],"(7)":[125],"policies":[126],"contracts.":[128],"issues":[130],"like":[131],"access,":[132],"storage,":[133],"ownership,":[134],"curation,":[135],"security,":[136],"confidentiality,":[137],"loss,":[138],"migration,":[139],"redundancy":[141],"seem":[142],"have":[144],"most":[146],"influence":[147],"on":[148],"deployment":[150]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
