{"id":"https://openalex.org/W2043777232","doi":"https://doi.org/10.1145/1029533.1029553","title":"Neglect of information privacy instruction","display_name":"Neglect of information privacy instruction","publication_year":2004,"publication_date":"2004-10-28","ids":{"openalex":"https://openalex.org/W2043777232","doi":"https://doi.org/10.1145/1029533.1029553","mag":"2043777232"},"language":"en","primary_location":{"id":"doi:10.1145/1029533.1029553","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029533.1029553","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th conference on Information technology education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066510391","display_name":"Victoria W. Romney","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Victoria W. Romney","raw_affiliation_strings":["Kunzler and Associates, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Kunzler and Associates, Provo, UT","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016784958","display_name":"Gordon W. Romney","orcid":"https://orcid.org/0009-0005-1361-7725"},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gordon W. Romney","raw_affiliation_strings":["Brigham Young University, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Brigham Young University, Provo, UT","institution_ids":["https://openalex.org/I100005738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5066510391"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.2872,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.93000296,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"82"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/neglect","display_name":"Neglect","score":0.6852649450302124},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6239274740219116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5678268671035767},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.552758514881134},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5294439792633057},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2110905647277832},{"id":"https://openalex.org/keywords/psychiatry","display_name":"Psychiatry","score":0.07182243466377258}],"concepts":[{"id":"https://openalex.org/C2776289891","wikidata":"https://www.wikidata.org/wiki/Q1931511","display_name":"Neglect","level":2,"score":0.6852649450302124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6239274740219116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5678268671035767},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.552758514881134},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5294439792633057},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2110905647277832},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.07182243466377258}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1029533.1029553","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029533.1029553","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th conference on Information technology education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1500890771","https://openalex.org/W1505644042","https://openalex.org/W2136605747","https://openalex.org/W2160936886","https://openalex.org/W2409456346","https://openalex.org/W2412945220","https://openalex.org/W2488098990","https://openalex.org/W2747076629","https://openalex.org/W2751199251","https://openalex.org/W4235993562"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2905822832","https://openalex.org/W2940702331","https://openalex.org/W2240244939"],"abstract_inverted_index":{"Not":[0],"only":[1],"should":[2,14],"InformationTechnology":[3],"(IT)":[4],"Educators":[5],"be":[6,15],"knowledgeable":[7],"regarding":[8],"data":[9,53,93],"privacy":[10,68,94,132],"legislation":[11,82],"but":[12],"they":[13],"teaching":[16],"correct":[17],"system":[18,73],"and":[19,42,64,69,72,75,96,101,121,124],"database":[20,63],"design":[21,32,66],"principles":[22],"to":[23,28,67,129],"IT":[24,46,61],"students":[25],"in":[26,48,90,133],"order":[27],"ensure":[29],"future":[30],"application":[31,65],"compliance":[33],"with":[34],"international":[35],"legislative":[36],"trends.":[37],"Perhaps":[38],"the":[39,49,86,112,117,125],"most":[40],"contentious":[41],"serious":[43],"issue":[44],"facing":[45],"practitioners":[47],"world":[50],"today":[51],"is":[52],"privacy.":[54],"Data":[55],"Privacy":[56],"impacts":[57],"every":[58],"aspect":[59],"of":[60,88],"from":[62],"use":[70],"policies,":[71],"security":[74],"information":[76,131],"assurance.":[77],"The":[78],"European":[79],"Union":[80],"Directive":[81],"has":[83],"aggressively":[84],"set":[85],"pattern":[87],"excellence":[89],"preserving":[91],"individual":[92],"worldwide,":[95],"Canada's":[97],"Personal":[98],"Information":[99],"Protection":[100],"Electronic":[102],"Document":[103],"Act":[104,123,127],"exerts":[105],"an":[106],"influence":[107],"on":[108],"U.S.":[109,113],"commerce":[110],"Within":[111],"laws":[114],"such":[115],"as":[116],"Health":[118],"Insurance":[119],"Portability":[120],"Accountability":[122],"Gramm-Leach-Bliley":[126],"seek":[128],"protect":[130],"specific":[134],"industries.":[135]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
