{"id":"https://openalex.org/W4409643314","doi":"https://doi.org/10.1108/jeim-08-2024-0451","title":"Cloud computing data security management strategy based on incremental update of data value","display_name":"Cloud computing data security management strategy based on incremental update of data value","publication_year":2025,"publication_date":"2025-04-21","ids":{"openalex":"https://openalex.org/W4409643314","doi":"https://doi.org/10.1108/jeim-08-2024-0451"},"language":"en","primary_location":{"id":"doi:10.1108/jeim-08-2024-0451","is_oa":false,"landing_page_url":"https://doi.org/10.1108/jeim-08-2024-0451","pdf_url":null,"source":{"id":"https://openalex.org/S141478581","display_name":"Journal of Enterprise Information Management","issn_l":"1741-0398","issn":["1741-0398","1758-7409"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Enterprise Information Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060956559","display_name":"Zhiying Wang","orcid":"https://orcid.org/0009-0003-0049-8806"},"institutions":[{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiying Wang","raw_affiliation_strings":["Jiangsu University of Science and Technology School of Economics and Management, , ,"],"affiliations":[{"raw_affiliation_string":"Jiangsu University of Science and Technology School of Economics and Management, , ,","institution_ids":["https://openalex.org/I4210096899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074421171","display_name":"Nianxin Wang","orcid":"https://orcid.org/0000-0002-0461-6318"},"institutions":[{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nianxin Wang","raw_affiliation_strings":["Jiangsu University of Science and Technology School of Economics and Management, , ,"],"affiliations":[{"raw_affiliation_string":"Jiangsu University of Science and Technology School of Economics and Management, , ,","institution_ids":["https://openalex.org/I4210096899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073089989","display_name":"Shilun Ge","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shilun Ge","raw_affiliation_strings":["Jiangsu University of Science and Technology School of Economics and Management, , ,"],"affiliations":[{"raw_affiliation_string":"Jiangsu University of Science and Technology School of Economics and Management, , ,","institution_ids":["https://openalex.org/I4210096899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060956559"],"corresponding_institution_ids":["https://openalex.org/I4210096899"],"apc_list":null,"apc_paid":null,"fwci":13.9604,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.98398955,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"38","issue":"5","first_page":"1579","last_page":"1598"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7825982570648193},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6095162034034729},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5314428210258484},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.502577543258667},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4385111629962921},{"id":"https://openalex.org/keywords/data-virtualization","display_name":"Data virtualization","score":0.4272725582122803},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.35832083225250244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3484465479850769},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3271743655204773},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17622631788253784},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14900675415992737},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.1257430613040924}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7825982570648193},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6095162034034729},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5314428210258484},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.502577543258667},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4385111629962921},{"id":"https://openalex.org/C80344994","wikidata":"https://www.wikidata.org/wiki/Q5227369","display_name":"Data virtualization","level":4,"score":0.4272725582122803},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.35832083225250244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3484465479850769},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3271743655204773},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17622631788253784},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14900675415992737},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.1257430613040924},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/jeim-08-2024-0451","is_oa":false,"landing_page_url":"https://doi.org/10.1108/jeim-08-2024-0451","pdf_url":null,"source":{"id":"https://openalex.org/S141478581","display_name":"Journal of Enterprise Information Management","issn_l":"1741-0398","issn":["1741-0398","1758-7409"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Enterprise Information Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W27524139","https://openalex.org/W1513178946","https://openalex.org/W1570573463","https://openalex.org/W1934530020","https://openalex.org/W1972622736","https://openalex.org/W2005759443","https://openalex.org/W2008810867","https://openalex.org/W2015218975","https://openalex.org/W2029262636","https://openalex.org/W2083156647","https://openalex.org/W2085666545","https://openalex.org/W2119939946","https://openalex.org/W2123069643","https://openalex.org/W2131997083","https://openalex.org/W2159128662","https://openalex.org/W2169710852","https://openalex.org/W2169757402","https://openalex.org/W2192495285","https://openalex.org/W2345068994","https://openalex.org/W2431181726","https://openalex.org/W2523752815","https://openalex.org/W2561030189","https://openalex.org/W2606779297","https://openalex.org/W2623778430","https://openalex.org/W2737889100","https://openalex.org/W2771368821","https://openalex.org/W2793880899","https://openalex.org/W2794031572","https://openalex.org/W2805754514","https://openalex.org/W2809398553","https://openalex.org/W2886130626","https://openalex.org/W2888043190","https://openalex.org/W2890595448","https://openalex.org/W2896053982","https://openalex.org/W2911592604","https://openalex.org/W2914856323","https://openalex.org/W2955639361","https://openalex.org/W2969360171","https://openalex.org/W2973556997","https://openalex.org/W2989775024","https://openalex.org/W3008691500","https://openalex.org/W3016609937","https://openalex.org/W3021375169","https://openalex.org/W3021913185","https://openalex.org/W3023709346","https://openalex.org/W3047335002","https://openalex.org/W3081167590","https://openalex.org/W3119569744","https://openalex.org/W3136818033","https://openalex.org/W3212223742","https://openalex.org/W4221020382","https://openalex.org/W4313891078","https://openalex.org/W4366990968","https://openalex.org/W4383815615","https://openalex.org/W4390659386"],"related_works":["https://openalex.org/W3198250195","https://openalex.org/W2993667162","https://openalex.org/W2185946950","https://openalex.org/W4313855404","https://openalex.org/W2766886300","https://openalex.org/W2735209534","https://openalex.org/W3155741067","https://openalex.org/W4367303911","https://openalex.org/W2392387560","https://openalex.org/W4315641392"],"abstract_inverted_index":{"Purpose":[0],"As":[1],"cloud":[2,22,33,41,57,80,143,171,195],"computing":[3,23,34,42,58,81,144,172,196],"enterprise":[4,35,43,168],"users":[5],"migrate":[6],"their":[7,17],"business":[8],"data":[9,24,48,52,71,82,105,137,145,173,182,197],"to":[10,20,169,178,188],"the":[11,38,45,76,90,98,102,104,115,130,139,151,154,162,167,179,186,190],"cloud,":[12],"they":[13],"relinquish":[14],"control":[15],"over":[16],"data.":[18],"How":[19],"update":[21,69,135,170],"security":[25,53,83,146,174],"management":[26,54,84,123,140,175],"strategy":[27,55,85,141,152,176],"is":[28,73,86,112,147],"a":[29],"serious":[30],"challenge":[31],"for":[32,114,166],"users.":[36],"From":[37],"perspective":[39],"of":[40,47,70,92,101,136,153,181],"users,":[44],"influence":[46],"value":[49,72,183],"fluctuation":[50],"on":[51,129],"in":[56],"environments":[59],"necessitates":[60],"further":[61],"exploration.":[62],"Design/methodology/approach":[63],"The":[64,158],"detection":[65,131],"model":[66,78,163],"about":[67,79,133,142,194],"incremental":[68,134],"built":[74,88],"and":[75,164,184],"updating":[77],"also":[87],"by":[89],"idea":[91],"K-nearest":[93],"neighbors":[94],"(KNN).":[95],"To":[96],"verify":[97],"application":[99,116],"effectiveness":[100],"model,":[103],"sets":[106],"containing":[107],"two-year":[108],"operating":[109],"login":[110],"logs":[111],"used":[113],"analysis,":[117],"which":[118],"come":[119],"from":[120],"an":[121],"enterprise\u2019s":[122],"information":[124],"system":[125],"(MIS).":[126],"Findings":[127],"Based":[128],"results":[132,160],"value,":[138],"correspondingly":[148],"updated":[149],"according":[150,177],"nearest":[155],"neighbors.":[156],"Originality/value":[157],"research":[159],"provide":[161],"method":[165],"change":[180],"help":[185],"enterprises":[187],"improve":[189],"active":[191],"defense":[192],"capability":[193],"security.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":4}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
