{"id":"https://openalex.org/W2999242913","doi":"https://doi.org/10.1108/imds-03-2019-0131","title":"Social-media-based risk communication for data co-security on the cloud","display_name":"Social-media-based risk communication for data co-security on the cloud","publication_year":2019,"publication_date":"2019-12-11","ids":{"openalex":"https://openalex.org/W2999242913","doi":"https://doi.org/10.1108/imds-03-2019-0131","mag":"2999242913"},"language":"en","primary_location":{"id":"doi:10.1108/imds-03-2019-0131","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imds-03-2019-0131","pdf_url":null,"source":{"id":"https://openalex.org/S37320504","display_name":"Industrial Management & Data Systems","issn_l":"0263-5577","issn":["0263-5577","1758-5783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Industrial Management &amp; Data Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058985886","display_name":"Jean Pierre Guy Gashami","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jean Pierre Guy Gashami","raw_affiliation_strings":["Global ICT Division, KINY & Partners, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Global ICT Division, KINY & Partners, Seoul, Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020782549","display_name":"Christian Fernando Libaque-S\u00e1enz","orcid":"https://orcid.org/0000-0002-1257-9596"},"institutions":[{"id":"https://openalex.org/I919628346","display_name":"University of the Pacific","ror":"https://ror.org/05mmg7t28","country_code":"PE","type":"education","lineage":["https://openalex.org/I919628346"]}],"countries":["PE"],"is_corresponding":false,"raw_author_name":"Christian Fernando Libaque-Saenz","raw_affiliation_strings":["Department of Engineering, Universidad del Pacifico, Lima, Peru"],"affiliations":[{"raw_affiliation_string":"Department of Engineering, Universidad del Pacifico, Lima, Peru","institution_ids":["https://openalex.org/I919628346"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013954140","display_name":"Younghoon Chang","orcid":"https://orcid.org/0000-0003-1421-5777"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Younghoon Chang","raw_affiliation_strings":["School of Management and Economics, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Management and Economics, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058985886"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8094,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.92629863,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"120","issue":"3","first_page":"442","last_page":"463"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7319175601005554},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6036990880966187},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.5454947352409363},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5385532975196838},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5219292640686035},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5202013850212097},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4945313632488251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4328051507472992},{"id":"https://openalex.org/keywords/intermediary","display_name":"Intermediary","score":0.42873668670654297},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4209984540939331},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.42042043805122375},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39085179567337036},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20381271839141846},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.17070311307907104}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7319175601005554},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6036990880966187},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.5454947352409363},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5385532975196838},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5219292640686035},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5202013850212097},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4945313632488251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4328051507472992},{"id":"https://openalex.org/C139569457","wikidata":"https://www.wikidata.org/wiki/Q1666223","display_name":"Intermediary","level":2,"score":0.42873668670654297},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4209984540939331},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.42042043805122375},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39085179567337036},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20381271839141846},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.17070311307907104},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/imds-03-2019-0131","is_oa":false,"landing_page_url":"https://doi.org/10.1108/imds-03-2019-0131","pdf_url":null,"source":{"id":"https://openalex.org/S37320504","display_name":"Industrial Management & Data Systems","issn_l":"0263-5577","issn":["0263-5577","1758-5783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Industrial Management &amp; Data Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":79,"referenced_works":["https://openalex.org/W132767962","https://openalex.org/W641072430","https://openalex.org/W1521358472","https://openalex.org/W1552322825","https://openalex.org/W1638501542","https://openalex.org/W1777035297","https://openalex.org/W1847647515","https://openalex.org/W1966047108","https://openalex.org/W1967236252","https://openalex.org/W1976930478","https://openalex.org/W1977367431","https://openalex.org/W1977781738","https://openalex.org/W1981048805","https://openalex.org/W1986552378","https://openalex.org/W1992298357","https://openalex.org/W1993739003","https://openalex.org/W1995730752","https://openalex.org/W1998012720","https://openalex.org/W2011605557","https://openalex.org/W2012753837","https://openalex.org/W2015717769","https://openalex.org/W2027039112","https://openalex.org/W2029938741","https://openalex.org/W2030565040","https://openalex.org/W2032112941","https://openalex.org/W2032741002","https://openalex.org/W2036492207","https://openalex.org/W2038443585","https://openalex.org/W2047940964","https://openalex.org/W2049831271","https://openalex.org/W2066430799","https://openalex.org/W2089773578","https://openalex.org/W2100577171","https://openalex.org/W2101196063","https://openalex.org/W2107710541","https://openalex.org/W2110633181","https://openalex.org/W2111860473","https://openalex.org/W2114296561","https://openalex.org/W2115464044","https://openalex.org/W2116619054","https://openalex.org/W2116808920","https://openalex.org/W2120471972","https://openalex.org/W2121001699","https://openalex.org/W2124564431","https://openalex.org/W2125858711","https://openalex.org/W2127507220","https://openalex.org/W2134894205","https://openalex.org/W2135844668","https://openalex.org/W2146591355","https://openalex.org/W2147294097","https://openalex.org/W2148174543","https://openalex.org/W2148259798","https://openalex.org/W2151187076","https://openalex.org/W2154107289","https://openalex.org/W2154158105","https://openalex.org/W2154797012","https://openalex.org/W2154816087","https://openalex.org/W2168426216","https://openalex.org/W2171732394","https://openalex.org/W2221846484","https://openalex.org/W2231594135","https://openalex.org/W2275530856","https://openalex.org/W2322673779","https://openalex.org/W2472998822","https://openalex.org/W2494208074","https://openalex.org/W2563907037","https://openalex.org/W2569378140","https://openalex.org/W2592516822","https://openalex.org/W2725128789","https://openalex.org/W2734694531","https://openalex.org/W2800413569","https://openalex.org/W2900642020","https://openalex.org/W2901631431","https://openalex.org/W2925515791","https://openalex.org/W3037008515","https://openalex.org/W3102746519","https://openalex.org/W3121942828","https://openalex.org/W4212985399","https://openalex.org/W6630280123"],"related_works":["https://openalex.org/W4385451301","https://openalex.org/W2523967339","https://openalex.org/W2125615450","https://openalex.org/W4230987454","https://openalex.org/W2915516796","https://openalex.org/W2614778841","https://openalex.org/W2992381278","https://openalex.org/W4385451241","https://openalex.org/W2064185916","https://openalex.org/W3005536857"],"abstract_inverted_index":{"Purpose":[0],"Cloud":[1],"computing":[2,57],"has":[3,66,222],"disrupted":[4],"the":[5,21,31,52,64,68,123,130,149,152,158,172],"information":[6,176,216],"technology":[7],"(IT)":[8],"industry.":[9],"Associated":[10],"benefits":[11,42],"such":[12,79,183],"as":[13,171,184,194],"flexibility,":[14],"payment":[15],"on":[16,63,113,122],"an":[17],"on-demand":[18],"basis":[19],"and":[20,83,109,128,189,202,239],"lack":[22],"of":[23,70,101,126,175,217],"no":[24,220],"need":[25],"for":[26,33,177,214],"IT":[27,185],"staff":[28],"are":[29,205],"among":[30],"reasons":[32],"its":[34,224],"adoption.":[35],"However,":[36],"these":[37,72,97],"services":[38],"represent":[39],"not":[40],"only":[41],"to":[43,55,75,86,89,105,116,136,235,243],"users":[44,84,110,246],"but":[45],"also":[46,206],"threats,":[47],"with":[48,252],"cybersecurity":[49],"issues":[50],"being":[51],"biggest":[53],"roadblock":[54],"cloud":[56,65,245,253],"success.":[58],"Although":[59],"ensuring":[60],"data":[61,153,250],"security":[62,143,154,186,229],"been":[67],"responsibility":[69],"providers,":[71],"threats":[73],"seem":[74],"be":[76,212],"unavoidable.":[77],"In":[78],"circumstances,":[80],"both":[81],"providers":[82,108,254],"have":[85],"coordinate":[87],"efforts":[88],"minimize":[90],"negative":[91],"consequences":[92],"that":[93,168],"might":[94],"occur":[95],"from":[96],"events.":[98,119],"The":[99,165,232],"purpose":[100],"this":[102,237],"paper":[103],"is":[104],"assess":[106],"how":[107],"can":[111],"rely":[112],"social":[114],"media":[115,192,210],"communicate":[117],"risky":[118],"Design/methodology/approach":[120],"Based":[121],"Situational":[124],"Theory":[125],"Publics":[127],"trust,":[129],"authors":[131,150],"developed":[132],"three":[133],"research":[134,221],"questions":[135],"analyze":[137],"stakeholders\u2019":[138],"communication":[139],"patterns":[140],"after":[141],"a":[142,227,241],"breach.":[144],"By":[145],"gathering":[146],"Twitter":[147,178],"data,":[148],"analyzed":[151],"breach":[155,230],"faced":[156],"by":[157],"Premera":[159,169],"Blue":[160],"Cross\u2019":[161],"Web":[162],"application.":[163],"Findings":[164],"results":[166],"indicate":[167],"acted":[170,193],"main":[173],"source":[174],"users,":[179],"while":[180],"trustworthy":[181],"actors":[182],"firms,":[187],"specialists":[188],"local":[190],"news":[191],"intermediaries,":[195],"creating":[196],"small":[197],"communities":[198],"around":[199],"them.":[200],"Theoretical":[201],"practical":[203],"implications":[204],"discussed.":[207],"Originality/value":[208],"Social":[209],"could":[211],"used":[213],"diffusing":[215],"potential":[218],"threats;":[219],"assessed":[223],"usage":[225],"in":[226,247],"cloud-based":[228],"context.":[231],"study":[233],"aims":[234],"fill":[236],"gap":[238],"propose":[240],"framework":[242],"engage":[244],"co-securing":[248],"their":[249],"along":[251],"when":[255],"they":[256],"face":[257],"similar":[258],"situations.":[259]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
