{"id":"https://openalex.org/W1146953136","doi":"https://doi.org/10.1108/ics-03-2016-0024","title":"State transgression on electronic expression: is it for real?","display_name":"State transgression on electronic expression: is it for real?","publication_year":2017,"publication_date":"2017-08-21","ids":{"openalex":"https://openalex.org/W1146953136","doi":"https://doi.org/10.1108/ics-03-2016-0024","mag":"1146953136"},"language":"en","primary_location":{"id":"doi:10.1108/ics-03-2016-0024","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2016-0024","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113820898","display_name":"Argha Ray","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]},{"id":"https://openalex.org/I110930757","display_name":"Management Development Institute","ror":"https://ror.org/05cstvk27","country_code":"IN","type":"education","lineage":["https://openalex.org/I110930757"]}],"countries":["IN","US"],"is_corresponding":true,"raw_author_name":"Argha Ray","raw_affiliation_strings":["College of Business, Iowa State University, Ames, Iowa, USA","Management Development Institute;"],"affiliations":[{"raw_affiliation_string":"College of Business, Iowa State University, Ames, Iowa, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Management Development Institute;","institution_ids":["https://openalex.org/I110930757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054903536","display_name":"Anjali Kaushik","orcid":"https://orcid.org/0000-0001-6782-5742"},"institutions":[{"id":"https://openalex.org/I110930757","display_name":"Management Development Institute","ror":"https://ror.org/05cstvk27","country_code":"IN","type":"education","lineage":["https://openalex.org/I110930757"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anjali Kaushik","raw_affiliation_strings":["Department of Information Systems, Management Development Institute, Gurgaon, India","Management Development Institute;"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Management Development Institute, Gurgaon, India","institution_ids":["https://openalex.org/I110930757"]},{"raw_affiliation_string":"Management Development Institute;","institution_ids":["https://openalex.org/I110930757"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113820898"],"corresponding_institution_ids":["https://openalex.org/I110930757","https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":3.6398,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.93706889,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"25","issue":"4","first_page":"382","last_page":"401"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6828067302703857},{"id":"https://openalex.org/keywords/human-rights","display_name":"Human rights","score":0.649189293384552},{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.5956460237503052},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.5207642912864685},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.5047012567520142},{"id":"https://openalex.org/keywords/sovereignty","display_name":"Sovereignty","score":0.4965518116950989},{"id":"https://openalex.org/keywords/legislature","display_name":"Legislature","score":0.4900625944137573},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4846694767475128},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.43772491812705994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3706137537956238},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3502633571624756},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.3490467667579651},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3343103229999542},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.19534167647361755}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6828067302703857},{"id":"https://openalex.org/C169437150","wikidata":"https://www.wikidata.org/wiki/Q8458","display_name":"Human rights","level":2,"score":0.649189293384552},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.5956460237503052},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.5207642912864685},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.5047012567520142},{"id":"https://openalex.org/C186229450","wikidata":"https://www.wikidata.org/wiki/Q42008","display_name":"Sovereignty","level":3,"score":0.4965518116950989},{"id":"https://openalex.org/C83009810","wikidata":"https://www.wikidata.org/wiki/Q11204","display_name":"Legislature","level":2,"score":0.4900625944137573},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4846694767475128},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43772491812705994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3706137537956238},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3502633571624756},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.3490467667579651},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3343103229999542},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.19534167647361755},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-03-2016-0024","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2016-0024","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W52203930","https://openalex.org/W82702864","https://openalex.org/W188250078","https://openalex.org/W1567294475","https://openalex.org/W1585702935","https://openalex.org/W1819632993","https://openalex.org/W2016634442","https://openalex.org/W2180743806","https://openalex.org/W2183516263","https://openalex.org/W2279787610","https://openalex.org/W2332086916","https://openalex.org/W2615608220","https://openalex.org/W2798348632"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2368745349","https://openalex.org/W2131575257","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2806080290","https://openalex.org/W3125784663","https://openalex.org/W3199177968","https://openalex.org/W4381594633","https://openalex.org/W4387668456"],"abstract_inverted_index":{"Purpose":[0],"Cyberspace":[1],"is":[2,48,276,357],"a":[3,33,141,259,343,414,419],"virtual":[4],"environment":[5,38],"where":[6],"instantaneous":[7],"communications":[8,23,188,213],"are":[9,24,137],"initiated":[10],"and":[11,59,93,132,185,209,216,221,231,271,294,299,338,363],"consumed":[12],"using":[13,138,256],"computer":[14],"networks":[15],"without":[16],"any":[17],"natural":[18],"or":[19,79],"artificial":[20],"boundaries.":[21,95],"These":[22],"not":[25],"only":[26],"an":[27,100],"exchange":[28],"of":[29,39,45,56,62,152,156,187,218,234,252,266,326,334,355,365,387,400,435,451,458,463,471],"information":[30],"but":[31,115],"also":[32],"catharsis":[34],"on":[35,102,146,191,201,278,317,422],"the":[36,40,52,60,71,87,112,120,153,157,167,180,223,229,250,264,324,382,385,459,472],"socio-political":[37],"real":[41,113],"world.":[42],"This":[43,96,123,309,427],"explosion":[44],"electronic":[46,147,406],"expression":[47,407],"often":[49,107,320],"detrimental":[50],"to":[51,66,68,82,99,126,144,204,212,227,248,268,313,323,369,375,390,417],"traditional":[53],"secretive":[54],"maneuvers":[55],"nation":[57,74,135,253],"states":[58,75,136,163,254],"exercise":[61],"its":[63,84],"power.":[64],"Unable":[65],"come":[67],"terms":[69,333],"with":[70,281,352],"new":[72],"reality":[73],"through":[76],"legislative":[77],"action":[78,316],"otherwise":[80],"attempt":[81],"assert":[83],"sovereignty":[85],"in":[86,111,119,130,255,302,332,408],"space":[88,377],"that":[89,106,183,331],"has":[90,305,311,413],"no":[91],"political":[92],"societal":[94],"may":[97,116,189],"lead":[98],"encroachment":[101],"basic":[103],"human":[104,192,239],"rights":[105,240],"have":[108,190,296,398,403,468],"constitutional":[109],"guarantees":[110],"world":[114],"be":[117,370,391],"violated":[118],"online":[121],"milieu.":[122],"paper":[124,246,275,310,428,453],"aims":[125],"investigate":[127],"this":[128,243,245,423,452,479],"issue":[129],"detail":[131],"evaluate":[133],"whether":[134],"cyber-security":[139],"as":[140,258,350,374],"propaganda":[142,260,383],"tool":[143,261],"transgress":[145],"expression.":[148],"Design/methodology/approach":[149],"The":[150,274,449,466],"Website":[151],"UN":[154,412],"Office":[155],"High":[158],"Commissioner":[159],"for":[160,225,378,461,475],"Human":[161],"Rights":[162],"\u201cIn":[164],"December":[165],"2013,":[166],"United":[168],"Nations":[169],"General":[170,198],"Assembly":[171,199],"adopted":[172],"resolution":[173],"68/167,":[174],"which":[175,319],"expresses":[176],"deep":[177],"concern":[178],"at":[179,431,439,478],"negative":[181],"impact":[182],"surveillance":[184],"interception":[186,215],"rights\u201d.":[193],"It":[194,329],"further":[195],"says":[196],"\u201cThe":[197],"called":[200],"all":[202],"States":[203,226],"review":[205,455],"their":[206,235],"procedures,":[207],"practices":[208],"legislation":[210],"related":[211],"surveillance,":[214],"collection":[217],"personal":[219],"data":[220,282,300],"emphasized":[222],"need":[224,368],"ensure":[228],"full":[230],"effective":[232],"implementation":[233],"obligations":[236],"under":[237],"international":[238],"law\u201d.":[241],"With":[242],"development,":[244],"seeks":[247],"unravel":[249,314],"role":[251],"cybersecurity":[257],"by":[262,456],"raising":[263],"specter":[265],"threat":[267,346],"national":[269,336],"security":[270,337],"economic":[272,339],"wellbeing.":[273],"based":[277],"exploratory":[279],"research":[280,291],"compilation":[283],"from":[284],"secondary":[285],"sources.":[286],"To":[287],"collect":[288],"data,":[289],"various":[290],"papers,":[292],"books":[293],"journals":[295],"been":[297,306],"referenced":[298],"available":[301],"public":[303],"domain":[304],"accumulated.":[307],"Findings":[308],"tried":[312],"state":[315],"cyberspace":[318],"runs":[321],"counter":[322],"concept":[325],"civil":[327,379],"liberties.":[328,380],"indicates":[330],"both":[335],"impact,":[340],"cybercrime":[341,349,388],"represent":[342],"very":[344],"nominal":[345],"vector.":[347],"Also,":[348],"compared":[351],"other":[353],"forms":[354],"crime":[356],"again":[358],"nominal.":[359],"Finally,":[360],"cyber":[361,409],"laws":[362],"policies":[364],"different":[366],"countries":[367,401],"more":[371,392],"nuanced":[372],"such":[373],"allow":[376],"Overall,":[381],"surrounding":[384],"malaise":[386],"seems":[389],"hype":[393],"than":[394],"real.":[395],"We":[396],"already":[397],"examples":[399],"who":[402],"transgressed":[404],"into":[405],"space.":[410],"Therefore,":[411],"valid":[415],"reason":[416],"raise":[418],"red":[420],"flag":[421],"unfolding":[424],"issue.":[425],"Originality/value":[426],"was":[429],"published":[430,477],"21st":[432],"Americas":[433],"Conference":[434],"Information":[436],"Systems":[437],"held":[438],"Puerto":[440],"Rico,":[441],"USA,":[442],"between":[443],"August":[444],"13-15,":[445],"2015":[446],"(AMCIS,":[447],"2015).":[448],"authors":[450,467],"seek":[454],"Editors":[457],"Journal":[460],"Republication":[462],"original":[464],"work.":[465],"taken":[469],"cognizance":[470],"Originality":[473],"Guidelines":[474],"Emerald":[476],"URL":[480],"www.emeraldgrouppublishing.com/authors/writing/originality.htm":[481]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
