{"id":"https://openalex.org/W2668185779","doi":"https://doi.org/10.1080/17517570802372468","title":"Building a privacy-preserving benchmarking enterprise system","display_name":"Building a privacy-preserving benchmarking enterprise system","publication_year":2008,"publication_date":"2008-10-24","ids":{"openalex":"https://openalex.org/W2668185779","doi":"https://doi.org/10.1080/17517570802372468","mag":"2668185779"},"language":"en","primary_location":{"id":"doi:10.1080/17517570802372468","is_oa":false,"landing_page_url":"https://doi.org/10.1080/17517570802372468","pdf_url":null,"source":{"id":"https://openalex.org/S24861202","display_name":"Enterprise Information Systems","issn_l":"1751-7575","issn":["1751-7575","1751-7583"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Enterprise Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["SAP Research , Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research , Karlsruhe, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102985450"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.6661,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.93831216,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"2","issue":"4","first_page":"421","last_page":"441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.9603503942489624},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7234678268432617},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.6737159490585327},{"id":"https://openalex.org/keywords/performance-indicator","display_name":"Performance indicator","score":0.6215238571166992},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5880879163742065},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44637641310691833},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44476449489593506},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3919917643070221},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3508174419403076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3288133144378662},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.25762641429901123},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13328096270561218},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.1259041428565979}],"concepts":[{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.9603503942489624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7234678268432617},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.6737159490585327},{"id":"https://openalex.org/C135510737","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Performance indicator","level":2,"score":0.6215238571166992},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5880879163742065},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44637641310691833},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44476449489593506},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3919917643070221},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3508174419403076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3288133144378662},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.25762641429901123},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13328096270561218},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.1259041428565979},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/17517570802372468","is_oa":false,"landing_page_url":"https://doi.org/10.1080/17517570802372468","pdf_url":null,"source":{"id":"https://openalex.org/S24861202","display_name":"Enterprise Information Systems","issn_l":"1751-7575","issn":["1751-7575","1751-7583"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Enterprise Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2283060","https://openalex.org/W215103978","https://openalex.org/W1557302011","https://openalex.org/W1583837637","https://openalex.org/W1827368922","https://openalex.org/W1992419399","https://openalex.org/W1992544712","https://openalex.org/W2011961190","https://openalex.org/W2048239613","https://openalex.org/W2054882090","https://openalex.org/W2083021308","https://openalex.org/W2127218421","https://openalex.org/W2134089414","https://openalex.org/W2135297873","https://openalex.org/W2137843911","https://openalex.org/W2165558283","https://openalex.org/W2526529994"],"related_works":["https://openalex.org/W4238897586","https://openalex.org/W435179959","https://openalex.org/W2619091065","https://openalex.org/W2059640416","https://openalex.org/W1490753184","https://openalex.org/W2284465472","https://openalex.org/W2291782699","https://openalex.org/W1993948687","https://openalex.org/W2011676020","https://openalex.org/W2000169967"],"abstract_inverted_index":{"Benchmarking":[0],"is":[1,21,42,124,187],"the":[2,10,28,44,51,67,78,125,134,150,170,188],"process":[3,26,126],"of":[4,12,15,43,53,69,127,133,136,144,165,181],"comparing":[5],"one's":[6],"own":[7],"performance":[8,38],"to":[9,90,100,106],"statistics":[11,68],"a":[13,22,83,97,142,156,162],"group":[14,114,122,153,192],"competitors,":[16],"named":[17],"peer":[18,113,130,152,191],"group.":[19],"It":[20],"common":[23],"and":[24,64,118,147],"important":[25,33],"in":[27,88],"business":[29,34],"world":[30],"for":[31,62,82,195],"many":[32],"metrics,":[35],"called":[36],"key":[37],"indicators":[39],"(KPI).":[40],"Privacy":[41],"utmost":[45],"importance,":[46],"since":[47],"these":[48],"KPIs":[49,70],"allow":[50],"inference":[52],"sensitive":[54],"information.":[55],"Therefore":[56],"several":[57],"secure":[58],"multi-party":[59],"computation":[60],"protocols":[61,76],"securely":[63],"privately":[65],"computing":[66],"have":[71],"recently":[72],"been":[73],"developed.":[74],"These":[75],"are":[77],"basic":[79],"building":[80],"blocks":[81],"privacy-preserving":[84],"benchmarking":[85,98,198],"system,":[86],"but":[87],"order":[89],"complete":[91],"an":[92,175,196],"enterprise":[93,197],"system":[94],"that":[95,168],"offers":[96],"service":[99],"its":[101],"customers":[102],"more":[103],"problems":[104],"need":[105],"be":[107,180],"solved.":[108],"We":[109,138,160],"first":[110,189],"analyse":[111],"how":[112],"participation":[115],"impacts":[116],"privacy":[117],"vice":[119],"versa.":[120],"Peer":[121],"formation":[123,154,193],"forming":[128],"sensible":[129],"groups":[131],"out":[132],"set":[135,143],"subscribers.":[137],"characterise":[139],"subscribers":[140],"by":[141],"discrete":[145],"criteria":[146],"therefore":[148],"view":[149],"automatic":[151,190],"as":[155,174],"data":[157],"clustering":[158,167],"problem.":[159],"present":[161],"high-performance":[163],"modification":[164],"k-means":[166],"takes":[169],"minimum":[171],"cluster":[172],"size":[173],"additional":[176],"parameter":[177],"which":[178],"might":[179],"independent":[182],"interest.":[183],"Our":[184],"final":[185],"approach":[186],"algorithm":[194],"system.":[199]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
