{"id":"https://openalex.org/W2033862904","doi":"https://doi.org/10.1108/09685220010321335","title":"Managing legal liability of the Net: a ten step guide for IT managers","display_name":"Managing legal liability of the Net: a ten step guide for IT managers","publication_year":2000,"publication_date":"2000-05-01","ids":{"openalex":"https://openalex.org/W2033862904","doi":"https://doi.org/10.1108/09685220010321335","mag":"2033862904"},"language":"en","primary_location":{"id":"doi:10.1108/09685220010321335","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220010321335","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085147293","display_name":"Mohsen Attaran","orcid":"https://orcid.org/0000-0002-0358-4107"},"institutions":[{"id":"https://openalex.org/I118839592","display_name":"California State University, Bakersfield","ror":"https://ror.org/019ts0j55","country_code":"US","type":"education","lineage":["https://openalex.org/I118839592"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohsen Attaran","raw_affiliation_strings":["School of Business and Public Administration, California State University, Bakersfield, CA","(School of Business and Public Administration, California State University, Bakersfield, CA)"],"affiliations":[{"raw_affiliation_string":"School of Business and Public Administration, California State University, Bakersfield, CA","institution_ids":["https://openalex.org/I118839592"]},{"raw_affiliation_string":"(School of Business and Public Administration, California State University, Bakersfield, CA)","institution_ids":["https://openalex.org/I118839592"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5085147293"],"corresponding_institution_ids":["https://openalex.org/I118839592"],"apc_list":null,"apc_paid":null,"fwci":2.1676,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91396214,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"8","issue":"2","first_page":"98","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13972","display_name":"Business Law and Ethics","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13972","display_name":"Business Law and Ethics","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9435999989509583,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revelation","display_name":"Revelation","score":0.6922146081924438},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6575931906700134},{"id":"https://openalex.org/keywords/liability","display_name":"Liability","score":0.6345236301422119},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6241787672042847},{"id":"https://openalex.org/keywords/harassment","display_name":"Harassment","score":0.621874213218689},{"id":"https://openalex.org/keywords/criminal-liability","display_name":"Criminal liability","score":0.5352206230163574},{"id":"https://openalex.org/keywords/vicarious-liability","display_name":"Vicarious liability","score":0.506084144115448},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3777206540107727},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.33907878398895264},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.2765243351459503},{"id":"https://openalex.org/keywords/criminal-law","display_name":"Criminal law","score":0.2554410696029663},{"id":"https://openalex.org/keywords/tort","display_name":"Tort","score":0.17454764246940613},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.16302546858787537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.09676417708396912},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08063408732414246}],"concepts":[{"id":"https://openalex.org/C2776405206","wikidata":"https://www.wikidata.org/wiki/Q192906","display_name":"Revelation","level":2,"score":0.6922146081924438},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6575931906700134},{"id":"https://openalex.org/C2777834853","wikidata":"https://www.wikidata.org/wiki/Q96776939","display_name":"Liability","level":2,"score":0.6345236301422119},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6241787672042847},{"id":"https://openalex.org/C2778976716","wikidata":"https://www.wikidata.org/wiki/Q3240539","display_name":"Harassment","level":2,"score":0.621874213218689},{"id":"https://openalex.org/C2992398822","wikidata":"https://www.wikidata.org/wiki/Q1404417","display_name":"Criminal liability","level":3,"score":0.5352206230163574},{"id":"https://openalex.org/C2775914699","wikidata":"https://www.wikidata.org/wiki/Q326779","display_name":"Vicarious liability","level":4,"score":0.506084144115448},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3777206540107727},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.33907878398895264},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.2765243351459503},{"id":"https://openalex.org/C202565627","wikidata":"https://www.wikidata.org/wiki/Q146491","display_name":"Criminal law","level":2,"score":0.2554410696029663},{"id":"https://openalex.org/C200635333","wikidata":"https://www.wikidata.org/wiki/Q158970","display_name":"Tort","level":3,"score":0.17454764246940613},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.16302546858787537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.09676417708396912},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08063408732414246},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685220010321335","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220010321335","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4230079643","https://openalex.org/W1890452862","https://openalex.org/W2804174145","https://openalex.org/W158647180","https://openalex.org/W2967861784","https://openalex.org/W4207056979","https://openalex.org/W2419139019","https://openalex.org/W2166964800","https://openalex.org/W333872810","https://openalex.org/W4254083822"],"abstract_inverted_index":{"The":[0,29],"exploding":[1],"use":[2],"of":[3,17,54],"the":[4,56,61,68],"Internet":[5],"for":[6],"everyday":[7],"communication":[8],"is":[9,33],"bringing":[10],"new":[11],"threats":[12],"to":[13,31,66],"companies":[14,32],"\u2013":[15],"revelation":[16],"trade":[18],"secrets,":[19],"discrimination,":[20],"harassment,":[21],"copyright":[22],"infringement,":[23],"negligence,":[24],"libel,":[25],"and":[26,59],"slander,":[27],"etc.":[28],"threat":[30],"real.":[34],"Lawyers":[35],"can":[36],"seek":[37],"information":[38],"in":[39],"electronic":[40],"records,":[41],"including":[42],"e\u2010mail,":[43],"on":[44],"litigation":[45],"or":[46],"criminal":[47],"cases.":[48],"This":[49],"paper":[50],"gives":[51],"an":[52],"overview":[53],"where":[55],"risks":[57],"lie,":[58],"what":[60],"IT":[62],"managers":[63],"should":[64],"do":[65],"minimize":[67],"risk.":[69]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
