{"id":"https://openalex.org/W4205191556","doi":"https://doi.org/10.1109/acit53391.2021.9677223","title":"Towards the design of pre questionnaires to promote information privacy protection awareness","display_name":"Towards the design of pre questionnaires to promote information privacy protection awareness","publication_year":2021,"publication_date":"2021-12-21","ids":{"openalex":"https://openalex.org/W4205191556","doi":"https://doi.org/10.1109/acit53391.2021.9677223"},"language":"en","primary_location":{"id":"doi:10.1109/acit53391.2021.9677223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677223","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019141547","display_name":"Hanifa Abdullah","orcid":"https://orcid.org/0000-0002-0240-3327"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Hanifa Abdullah","raw_affiliation_strings":["School of Computing, College of Science, Engineering and Technology (CSET), University of South Africa (UNISA) Florida, Roodepoort, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"School of Computing, College of Science, Engineering and Technology (CSET), University of South Africa (UNISA) Florida, Roodepoort, Johannesburg, South Africa","institution_ids":["https://openalex.org/I165390105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5019141547"],"corresponding_institution_ids":["https://openalex.org/I165390105"],"apc_list":null,"apc_paid":null,"fwci":0.5017,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65732333,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.6360943913459778},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6028972864151001},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5750126838684082},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5451894402503967},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5373631119728088},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.48693549633026123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4710794985294342},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.45340484380722046},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.44575735926628113},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41224268078804016},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4115152359008789},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.395563006401062}],"concepts":[{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.6360943913459778},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6028972864151001},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5750126838684082},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5451894402503967},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5373631119728088},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.48693549633026123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4710794985294342},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.45340484380722046},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.44575735926628113},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41224268078804016},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4115152359008789},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.395563006401062},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit53391.2021.9677223","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677223","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1979561802","https://openalex.org/W2033494546","https://openalex.org/W2766804000","https://openalex.org/W2892154522","https://openalex.org/W3082668303"],"related_works":["https://openalex.org/W4225340788","https://openalex.org/W433857138","https://openalex.org/W2293730332","https://openalex.org/W2127837371","https://openalex.org/W292489274","https://openalex.org/W3113673986","https://openalex.org/W2036646121","https://openalex.org/W3125695168","https://openalex.org/W2239313809","https://openalex.org/W4323969326"],"abstract_inverted_index":{"The":[0,51,192],"number":[1],"of":[2,4,43,89,104,117,122,136,153,170,183,188,194],"victims":[3,73],"cyber-attacks":[5],"escalates":[6],"daily":[7],"as":[8,163,200],"cyber":[9],"criminals":[10],"become":[11],"more":[12],"sophisticated":[13],"in":[14,27,41,87,207],"their":[15,64,150,208,217],"attack":[16],"methods.":[17],"Many":[18],"organizations":[19,34,145],"have":[20],"well":[21],"developed":[22],"information":[23,47,66,128,156,175],"privacy":[24,48,129,157,176],"protection":[25,49,130,158,177],"mechanisms":[26],"place":[28],"but":[29],"there":[30],"are":[31],"still":[32],"many":[33],"that":[35],"fail":[36],"to":[37,61,74,101,108,126,148,173,202],"proactively":[38,62],"prepare":[39],"themselves":[40],"terms":[42,88],"a":[44,79,138,164,189,213],"rigid":[45],"organizational":[46],"program.":[50],"same":[52],"applies":[53],"for":[54,141,144,167,216],"individuals":[55,147],"who":[56,204],"lack":[57],"the":[58,84,115,120,168,180,184],"required":[59],"knowledge":[60],"protect":[63],"personal":[65],"from":[67],"being":[68],"compromised":[69],"and":[70,92,95,146,179,211],"therefore":[71],"fall":[72],"data":[75,80],"breaches.":[76],"For":[77],"organizations,":[78],"breach":[81],"can":[82,96],"cost":[83],"organization":[85],"millions":[86],"recovery":[90],"expenses":[91],"operational":[93],"interruptions":[94],"cause":[97],"serious":[98],"reputational":[99],"damage":[100],"individuals.The":[102],"objective":[103],"this":[105],"study":[106],"is":[107,133],"use":[109],"an":[110,171],"honors":[111],"project":[112],"presented":[113],"by":[114,134,186],"School":[116],"Computing":[118],"at":[119],"University":[121],"South":[123],"Africa":[124],"(UNISA)":[125],"promote":[127,174],"awareness.":[131,159],"This":[132,160],"means":[135,187],"creating":[137],"pre":[139,195],"questionnaire":[140],"different":[142],"contexts":[143],"elicit":[149],"current":[151],"level":[152],"understanding":[154],"regarding":[155],"will":[161,197],"serve":[162,199],"preliminary":[165],"step":[166],"development":[169],"artefact":[172,185],"awareness":[178],"subsequent":[181],"evaluation":[182],"post":[190],"questionnaire.":[191],"creation":[193],"questionnaires":[196],"also":[198],"guidance":[201],"students":[203],"experience":[205],"difficulties":[206],"literature":[209],"review":[210],"identifying":[212],"suitable":[214],"context":[215],"study.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
