{"id":"https://openalex.org/W2006072271","doi":"https://doi.org/10.1145/2445196.2445445","title":"Introducing privacy in a data mining course (abstract only)","display_name":"Introducing privacy in a data mining course (abstract only)","publication_year":2013,"publication_date":"2013-03-06","ids":{"openalex":"https://openalex.org/W2006072271","doi":"https://doi.org/10.1145/2445196.2445445","mag":"2006072271"},"language":"en","primary_location":{"id":"doi:10.1145/2445196.2445445","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2445196.2445445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceeding of the 44th ACM technical symposium on Computer science education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078626167","display_name":"Lila Ghemri","orcid":"https://orcid.org/0000-0002-7471-1214"},"institutions":[{"id":"https://openalex.org/I48205209","display_name":"Texas Southern University","ror":"https://ror.org/05ch0aw77","country_code":"US","type":"education","lineage":["https://openalex.org/I48205209"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lila Ghemri","raw_affiliation_strings":["Texas Southern University, Houston, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas Southern University, Houston, TX, USA","institution_ids":["https://openalex.org/I48205209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100400329","display_name":"Ping Chen","orcid":"https://orcid.org/0000-0003-3789-7686"},"institutions":[{"id":"https://openalex.org/I16277215","display_name":"University of Houston - Downtown","ror":"https://ror.org/05mj6fy81","country_code":"US","type":"education","lineage":["https://openalex.org/I16277215"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ping Chen","raw_affiliation_strings":["University of Houston-Downtown, Houston, TX, USA","University of Houston-Downtown, Houston, TX, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Houston-Downtown, Houston, TX, USA","institution_ids":["https://openalex.org/I16277215"]},{"raw_affiliation_string":"University of Houston-Downtown, Houston, TX, USA#TAB#","institution_ids":["https://openalex.org/I16277215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078626167"],"corresponding_institution_ids":["https://openalex.org/I48205209"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17995694,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"740","last_page":"740"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9251999855041504,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9251999855041504,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6973277926445007},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.5853495597839355},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5851282477378845},{"id":"https://openalex.org/keywords/legislature","display_name":"Legislature","score":0.528267502784729},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.5147193074226379},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5115119218826294},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5039820075035095},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49387818574905396},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4924996793270111},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4748028814792633},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43809229135513306},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4258320927619934},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26360809803009033},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.0782586932182312}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6973277926445007},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.5853495597839355},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5851282477378845},{"id":"https://openalex.org/C83009810","wikidata":"https://www.wikidata.org/wiki/Q11204","display_name":"Legislature","level":2,"score":0.528267502784729},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.5147193074226379},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5115119218826294},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5039820075035095},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49387818574905396},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4924996793270111},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4748028814792633},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43809229135513306},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4258320927619934},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26360809803009033},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0782586932182312},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2445196.2445445","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2445196.2445445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceeding of the 44th ACM technical symposium on Computer science education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2476957992","https://openalex.org/W3042284153","https://openalex.org/W2132024542","https://openalex.org/W2006891491","https://openalex.org/W2116878667","https://openalex.org/W4241527182","https://openalex.org/W576625533","https://openalex.org/W2111170006","https://openalex.org/W2994243660","https://openalex.org/W4250923762"],"abstract_inverted_index":{"There":[0],"has":[1],"been":[2],"a":[3],"staggering":[4],"increase":[5],"in":[6],"the":[7,13,16,29,65,79,110],"volume":[8],"of":[9,18,32,55,58,81],"information":[10,21,73],"exchanged":[11],"over":[12],"Internet":[14],"and":[15,39,41,96,109],"amount":[17],"personally":[19],"identifiable":[20],"present":[22],"online.":[23],"Additionally,":[24],"legislative":[25],"mandates,":[26],"such":[27],"as":[28],"Sarbanes-Oxley":[30],"Act":[31],"2002,":[33],"aim":[34],"at":[35],"monitoring":[36,87],"organizational":[37],"behavior":[38],"communication,":[40,50],"require":[42],"organizations":[43],"to":[44,88,103,106,112],"safe":[45],"keep":[46],"all":[47],"written":[48],"corporate":[49],"thus":[51],"creating":[52],"huge":[53],"repositories":[54],"information,":[56],"most":[57],"which":[59],"must":[60],"be":[61],"access-restricted.":[62],"IT":[63],"carries":[64],"primary":[66],"responsibility":[67],"for":[68],"ensuring":[69],"that":[70,90],"private":[71],"digital":[72],"does":[74],"not":[75],"become":[76],"public,":[77],"through":[78],"implementation":[80],"access-security":[82],"measures,":[83],"together":[84],"with":[85],"constant":[86],"ensure":[89],"even":[91],"authorized":[92],"users":[93],"behave":[94],"responsibly":[95],"ethically.":[97],"This":[98],"situation":[99],"requires":[100],"CS":[101],"educators":[102],"introduce":[104],"students":[105],"data":[107],"privacy":[108],"ways":[111],"protect":[113],"users'":[114],"privacy.":[115]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
