{"id":"https://openalex.org/W3021285799","doi":"https://doi.org/10.1108/ics-01-2020-0007","title":"Utilizing a privacy impact assessment method using metrics in the healthcare sector","display_name":"Utilizing a privacy impact assessment method using metrics in the healthcare sector","publication_year":2020,"publication_date":"2020-04-21","ids":{"openalex":"https://openalex.org/W3021285799","doi":"https://doi.org/10.1108/ics-01-2020-0007","mag":"3021285799"},"language":"en","primary_location":{"id":"doi:10.1108/ics-01-2020-0007","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0007","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022352451","display_name":"Eleni-Laskarina Makri","orcid":"https://orcid.org/0009-0008-7931-0453"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Eleni-Laskarina Makri","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Athens, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055407160","display_name":"Zafeiroula Georgiopoulou","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Zafeiroula Georgiopoulou","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Athens, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002642812","display_name":"Costas Lambrinoudakis","orcid":"https://orcid.org/0000-0003-3101-5347"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Costas Lambrinoudakis","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Athens, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022352451"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":null,"apc_paid":null,"fwci":0.6976,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79984209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"28","issue":"4","first_page":"503","last_page":"529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6883698105812073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6015604138374329},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5925323367118835},{"id":"https://openalex.org/keywords/criticality","display_name":"Criticality","score":0.5891250371932983},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5761566162109375},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.5437149405479431},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.47284963726997375},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4523733854293823},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.4371687173843384},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4306790232658386},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4150785207748413},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.41023725271224976},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2630632817745209}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6883698105812073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6015604138374329},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5925323367118835},{"id":"https://openalex.org/C125611927","wikidata":"https://www.wikidata.org/wiki/Q17008131","display_name":"Criticality","level":2,"score":0.5891250371932983},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5761566162109375},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.5437149405479431},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.47284963726997375},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4523733854293823},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.4371687173843384},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4306790232658386},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4150785207748413},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.41023725271224976},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2630632817745209},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-01-2020-0007","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0007","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W90383755","https://openalex.org/W1095797071","https://openalex.org/W1509619677","https://openalex.org/W1793498174","https://openalex.org/W1870146437","https://openalex.org/W2004302909","https://openalex.org/W2024352327","https://openalex.org/W2077266243","https://openalex.org/W2145825627","https://openalex.org/W2159541603","https://openalex.org/W2204377757","https://openalex.org/W2481049604","https://openalex.org/W3007541137","https://openalex.org/W3124709415","https://openalex.org/W6745911008"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2994243660","https://openalex.org/W3091445850","https://openalex.org/W2675231964","https://openalex.org/W2118333568","https://openalex.org/W2747442008","https://openalex.org/W2127814706","https://openalex.org/W315296216","https://openalex.org/W2549995367","https://openalex.org/W1566211333"],"abstract_inverted_index":{"Purpose":[0],"This":[1,91],"study":[2],"aims":[3],"to":[4,7,82,131,135,145,258],"assist":[5,132],"organizations":[6,134],"protect":[8,260],"the":[9,15,18,28,31,35,39,44,47,67,104,110,115,133,137,147,152,155,167,172,184,190,193,199,202,220,227,234,237,246,254,267,281,296,304,307,316,320],"privacy":[10,57,141,176,212,224,250,275],"of":[11,17,30,46,74,109,114,139,154,166,174,192,208,222,230,236,245,266,283,289,295,306,319],"their":[12],"users":[13],"and":[14,23,70,100,106,161,226,249,274,309],"security":[16,149,210,247,273],"data":[19,156,180,218],"that":[20,62,97,157,201,253,270,299,311],"they":[21,158],"store":[22],"process.":[24],"Users":[25],"may":[26,204],"be":[27,50],"customers":[29],"organization":[32,203,255],"(people":[33],"using":[34],"offered":[36],"services)":[37],"or":[38,211],"employees":[40],"(users":[41],"who":[42],"operate":[43],"systems":[45,86],"organization).":[48],"To":[49],"more":[51],"specific,":[52],"this":[53],"paper":[54,92],"proposes":[55],"a":[56,72,94,209,216,242,290],"impact":[58],"assessment":[59],"(PIA)":[60],"method":[61,96,116,170,187,240,268,297],"explicitly":[63],"takes":[64,101,196,313],"into":[65,102,197,314],"account":[66,103,198,315],"organizational":[68],"characteristics":[69,108,229,318],"employs":[71,98],"list":[73],"well-defined":[75],"metrics":[76,99,302],"as":[77,278],"input,":[78],"demonstrating":[79],"its":[80,261],"applicability":[81,113],"two":[83,121],"hospital":[84],"information":[85],"with":[87,125,287],"different":[88,126],"characteristics.":[89,127],"Design/methodology/approach":[90],"presents":[93],"PIA":[95,169,239],"peculiarities":[105],"other":[107],"organization.":[111,185,232,321],"The":[112,128,164,186,264],"has":[117],"been":[118],"demonstrated":[119],"on":[120,215],"Hospital":[122],"Information":[123],"Systems":[124],"aim":[129],"is":[130,269,298],"estimate":[136],"criticality":[138,173,194],"potential":[140],"breaches":[142],"and,":[143],"thus,":[144],"select":[146],"appropriate":[148],"measures":[150,248],"for":[151,178,189,303],"protection":[153],"collect,":[159],"process":[160],"store.":[162],"Findings":[163],"results":[165,235,282],"proposed":[168,238],"highlight":[171],"each":[175,223,231],"principle":[177,225],"every":[179],"set":[181],"maintained":[182],"by":[183],"employed":[188],"calculation":[191],"level,":[195],"consequences":[200],"experience":[205],"in":[206],"case":[207],"violation":[213],"incident":[214],"specific":[217,317],"set,":[219],"weighting":[221],"unique":[228],"So,":[233],"offer":[241],"strong":[243],"indication":[244],"enforcement":[251],"mechanisms":[252],"should":[256],"adopt":[257],"effectively":[259],"data.":[262],"Originality/value":[263],"novelty":[265,294],"it":[271,279,300,312],"handles":[272],"requirements":[276,308],"simultaneously,":[277],"uses":[280],"risk":[284],"analysis":[285],"together":[286],"those":[288],"PIA.":[291],"A":[292],"further":[293],"introduces":[301],"quantification":[305],"also":[310]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
