{"id":"https://openalex.org/W2763197362","doi":"https://doi.org/10.1108/ics-06-2016-0044","title":"Incorporating privacy in the design of cloud-based systems: a conceptual meta-model","display_name":"Incorporating privacy in the design of cloud-based systems: a conceptual meta-model","publication_year":2017,"publication_date":"2017-10-03","ids":{"openalex":"https://openalex.org/W2763197362","doi":"https://doi.org/10.1108/ics-06-2016-0044","mag":"2763197362"},"language":"en","primary_location":{"id":"doi:10.1108/ics-06-2016-0044","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-06-2016-0044","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003619823","display_name":"Christos Kalloniatis","orcid":"https://orcid.org/0000-0002-8844-2596"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Christos Kalloniatis","raw_affiliation_strings":["School of Social Sciences, University of the Aegean, Mytilene, Greece"],"affiliations":[{"raw_affiliation_string":"School of Social Sciences, University of the Aegean, Mytilene, Greece","institution_ids":["https://openalex.org/I98805295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5003619823"],"corresponding_institution_ids":["https://openalex.org/I98805295"],"apc_list":null,"apc_paid":null,"fwci":4.8363,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.9566418,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"25","issue":"5","first_page":"614","last_page":"633"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568143606185913},{"id":"https://openalex.org/keywords/json","display_name":"JSON","score":0.7551407814025879},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6690194606781006},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6379678845405579},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.602379560470581},{"id":"https://openalex.org/keywords/metamodeling","display_name":"Metamodeling","score":0.5112841129302979},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.5069013237953186},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4625619649887085},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4453156292438507},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.44070619344711304},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3392929434776306},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30542272329330444},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.30272072553634644},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2463897168636322},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17453375458717346}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568143606185913},{"id":"https://openalex.org/C2780416260","wikidata":"https://www.wikidata.org/wiki/Q2063","display_name":"JSON","level":2,"score":0.7551407814025879},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6690194606781006},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6379678845405579},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.602379560470581},{"id":"https://openalex.org/C86610423","wikidata":"https://www.wikidata.org/wiki/Q1925081","display_name":"Metamodeling","level":2,"score":0.5112841129302979},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.5069013237953186},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4625619649887085},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4453156292438507},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.44070619344711304},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3392929434776306},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30542272329330444},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.30272072553634644},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2463897168636322},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17453375458717346},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-06-2016-0044","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-06-2016-0044","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W17971971","https://openalex.org/W94784130","https://openalex.org/W100921448","https://openalex.org/W106918705","https://openalex.org/W143674490","https://openalex.org/W169466422","https://openalex.org/W188889155","https://openalex.org/W287184503","https://openalex.org/W1552489700","https://openalex.org/W1558430934","https://openalex.org/W1564566774","https://openalex.org/W1875598785","https://openalex.org/W1898015721","https://openalex.org/W1918077612","https://openalex.org/W1948417575","https://openalex.org/W2034727308","https://openalex.org/W2070164835","https://openalex.org/W2106326663","https://openalex.org/W2110157102","https://openalex.org/W2110384288","https://openalex.org/W2112967367","https://openalex.org/W2117818414","https://openalex.org/W2125885614","https://openalex.org/W2139061144","https://openalex.org/W2149581025","https://openalex.org/W2153064832","https://openalex.org/W2158572645","https://openalex.org/W2159269282","https://openalex.org/W2163511876","https://openalex.org/W2167806953","https://openalex.org/W2168409789","https://openalex.org/W2296573778","https://openalex.org/W2301605390","https://openalex.org/W2475543732","https://openalex.org/W2492162659","https://openalex.org/W2517638768","https://openalex.org/W2605401897","https://openalex.org/W2978651340","https://openalex.org/W3161918289","https://openalex.org/W4213327113","https://openalex.org/W6726158314"],"related_works":["https://openalex.org/W2564230233","https://openalex.org/W3125264044","https://openalex.org/W1625198037","https://openalex.org/W3095436529","https://openalex.org/W2980180047","https://openalex.org/W2288859949","https://openalex.org/W1526133199","https://openalex.org/W2402899678","https://openalex.org/W2499478834","https://openalex.org/W2650562566"],"abstract_inverted_index":{"Purpose":[0],"The":[1,96,178,215,247,284,299],"purpose":[2],"of":[3,29,48,54,67,93,99,105,172,180,207,243,270,301],"this":[4],"paper":[5,101,285],"is":[6,102,198],"to":[7,33,36,72,156,169,255],"extend":[8],"PriS":[9],"(privacy":[10],"safeguard),":[11],"a":[12,65,106,181,222,287,310],"privacy":[13,21,41,56,76,119,140,294],"requirements":[14,22,141,197,295],"engineering":[15],"method":[16],"for":[17,78,88,136,190,236,291],"eliciting":[18,191],"and":[19,38,64,114,165,192,201,231,257,264,267],"modelling":[20,193],"during":[23,75,161],"system":[24],"design,":[25],"with":[26,143,240],"the":[27,52,90,100,103,127,139,144,149,154,159,162,170,173,194,199,204,208,241,244,261,265,268,271,280,297,302],"addition":[28],"privacy-aware":[30,245],"cloud-based":[31,79,182],"concepts":[32,69,85,146,235,252],"assist":[34],"analysts":[35,113,187,238],"reason":[37],"model":[39,92,110,217,290,304],"about":[40,118,293],"in":[42,116,120,188,202,296],"cloud":[43,55,121],"environments.":[44,122],"Design/methodology/approach":[45],"An":[46],"analysis":[47,77],"previous":[49,59],"findings":[50,160],"on":[51,58,221,229,309],"file":[53],"based":[57],"work":[60,210],"has":[61,133,218,305],"been":[62,82,134,219,307],"conducted":[63],"set":[66],"privacy-related":[68,196],"that":[70,111,184],"need":[71],"be":[73],"considered":[74],"systems":[80],"have":[81],"revealed.":[83],"These":[84],"were":[86,249,253],"used":[87],"extending":[89],"conceptual":[91,109,150,216,289],"PriS.":[94],"Findings":[95],"main":[97],"finding":[98],"design":[104,163,179,242,262],"new,":[107],"novel":[108,288],"assists":[112],"designers":[115],"reasoning":[117,292],"A":[123],"new":[124],"template":[125,273],"using":[126],"JSON":[128,272],"(Javascript":[129],"notation":[130],"object)":[131],"format":[132],"introduced":[135],"better":[137,157,166],"expressing":[138],"along":[142],"related":[145],"presented":[147,211],"through":[148],"model,":[151],"thus":[152],"letting":[153],"developers":[155],"understand":[158],"stage":[164],"guide":[167,186],"them":[168],"implementation":[171],"respective":[174],"solution.":[175],"Research":[176],"limitations/implications":[177],"process":[183],"will":[185],"detail":[189],"identified":[195],"limitation":[200],"parallel":[203],"next":[205],"step":[206],"specific":[209],"here.":[212],"Practical":[213],"implications":[214],"applied":[220],"real":[223,311],"case":[224,312],"scenario":[225],"regarding":[226],"its":[227],"efficiency":[228],"capturing":[230],"mapping":[232],"all":[233,251],"necessary":[234],"assisting":[237],"proceed":[239],"system.":[246],"results":[248],"positive,":[250],"easy":[254],"use":[256,269],"totally":[258],"understandable":[259],"from":[260,279],"team":[263],"stakeholders":[266],"received":[274],"very":[275],"positive":[276],"comments,":[277],"especially":[278],"developer\u2019s":[281],"team.":[282],"Originality/value":[283],"presents":[286],"cloud.":[298],"applicability":[300],"proposed":[303],"also":[306],"tested":[308],"study.":[313]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
