{"id":"https://openalex.org/W2030792833","doi":"https://doi.org/10.1145/2781562.2781599","title":"A Study on Developing Framework for Information Privacy Protection","display_name":"A Study on Developing Framework for Information Privacy Protection","publication_year":2015,"publication_date":"2015-07-31","ids":{"openalex":"https://openalex.org/W2030792833","doi":"https://doi.org/10.1145/2781562.2781599","mag":"2030792833"},"language":"en","primary_location":{"id":"doi:10.1145/2781562.2781599","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2781562.2781599","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Electronic Commerce 2015","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101827999","display_name":"Jin-Woo Jung","orcid":"https://orcid.org/0000-0003-2658-8888"},"institutions":[{"id":"https://openalex.org/I67900169","display_name":"Chung-Ang University","ror":"https://ror.org/01r024a98","country_code":"KR","type":"education","lineage":["https://openalex.org/I67900169"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jinwoo Jung","raw_affiliation_strings":["Chung-Ang University, Graduate School, Department of Security Convergence, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-3200-0420","Chung-Ang University, Graduate School, Department of Security Convergence, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-3200-0420#TAB#"],"affiliations":[{"raw_affiliation_string":"Chung-Ang University, Graduate School, Department of Security Convergence, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-3200-0420","institution_ids":["https://openalex.org/I67900169"]},{"raw_affiliation_string":"Chung-Ang University, Graduate School, Department of Security Convergence, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-3200-0420#TAB#","institution_ids":["https://openalex.org/I67900169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064175402","display_name":"Jungduk Kim","orcid":"https://orcid.org/0000-0003-0252-3983"},"institutions":[{"id":"https://openalex.org/I67900169","display_name":"Chung-Ang University","ror":"https://ror.org/01r024a98","country_code":"KR","type":"education","lineage":["https://openalex.org/I67900169"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jungduk Kim","raw_affiliation_strings":["Chung-Ang University, College of Business and Economics, Department of Industrial Security, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-2006-6380","Chung-Ang University, College of Business and Economics, Department of Industrial Security, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-2006-6380#TAB#"],"affiliations":[{"raw_affiliation_string":"Chung-Ang University, College of Business and Economics, Department of Industrial Security, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-2006-6380","institution_ids":["https://openalex.org/I67900169"]},{"raw_affiliation_string":"Chung-Ang University, College of Business and Economics, Department of Industrial Security, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-2006-6380#TAB#","institution_ids":["https://openalex.org/I67900169"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101827999"],"corresponding_institution_ids":["https://openalex.org/I67900169"],"apc_list":null,"apc_paid":null,"fwci":1.0246,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84813204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.7027534246444702},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6877436637878418},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.6504507660865784},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.5485422015190125},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5403141975402832},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5369225740432739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5292208790779114},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.5156213641166687},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.492861270904541},{"id":"https://openalex.org/keywords/ftc-fair-information-practice","display_name":"FTC Fair Information Practice","score":0.4297483563423157},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.412420392036438},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4105093479156494},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40676188468933105},{"id":"https://openalex.org/keywords/information-privacy-law","display_name":"Information privacy law","score":0.388568639755249}],"concepts":[{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.7027534246444702},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6877436637878418},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.6504507660865784},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.5485422015190125},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5403141975402832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5369225740432739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5292208790779114},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.5156213641166687},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.492861270904541},{"id":"https://openalex.org/C163981777","wikidata":"https://www.wikidata.org/wiki/Q5427184","display_name":"FTC Fair Information Practice","level":5,"score":0.4297483563423157},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.412420392036438},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4105093479156494},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40676188468933105},{"id":"https://openalex.org/C78524284","wikidata":"https://www.wikidata.org/wiki/Q6031155","display_name":"Information privacy law","level":4,"score":0.388568639755249}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2781562.2781599","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2781562.2781599","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Electronic Commerce 2015","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W68548470","https://openalex.org/W285513809","https://openalex.org/W416981147","https://openalex.org/W590865309","https://openalex.org/W657731981","https://openalex.org/W1605961880","https://openalex.org/W2157989366"],"related_works":["https://openalex.org/W2994243660","https://openalex.org/W576625533","https://openalex.org/W624673057","https://openalex.org/W2118333568","https://openalex.org/W3122237075","https://openalex.org/W2470776051","https://openalex.org/W2798190008","https://openalex.org/W2963335492","https://openalex.org/W2379795947","https://openalex.org/W1986441866"],"abstract_inverted_index":{"Although":[0],"Information":[1],"privacy":[2,12,21,41,65,81,99,118,123,145,152,178,200],"is":[3,67,85,102,155,163],"one":[4],"of":[5,64,79,107,116,129,142,176,188],"the":[6,10,46,60,77,94,114,139,143,160],"biggest":[7],"issues":[8],"in":[9,57,70,186],"enterprises,":[11],"incidents":[13],"are":[14,184],"relatively":[15],"increasing":[16],"because":[17,83],"most":[18],"companies":[19],"concern":[20],"protection":[22,42,66,82,100,153,179],"as":[23,53],"a":[24,54,170],"short":[25],"term":[26],"project":[27],"not":[28],"like":[29],"an":[30,71,121],"essential":[31],"factor":[32],"which":[33,48],"needs":[34],"to":[35,88,104,112,137,158,168],"be":[36,50],"considered":[37],"consistently.":[38],"IP3":[39],"(Information":[40],"program)":[43],"means":[44],"that":[45],"program":[47,56,101,124,154,180],"should":[49],"conducted":[51],"continuously":[52],"background":[55],"enterprises.":[58],"If":[59],"operation":[61],"or":[62],"design":[63],"inappropriately":[68],"implemented":[69],"enterprise,":[72],"they":[73],"must":[74],"pay":[75],"for":[76,150],"failure":[78],"information":[80,98,117,122,144,151,177],"it":[84,162],"closely":[86],"relative":[87],"customer":[89],"and":[90,119,134,173,191],"their":[91,189],"trust":[92],"toward":[93],"enterprise.":[95],"Therefore":[96],"appropriate":[97],"required":[103],"prevent":[105],"loss":[106],"trust.":[108],"This":[109],"study":[110],"intends":[111],"analyze":[113],"topic":[115],"proposes":[120],"framework.":[125,181],"The":[126,147,182],"framework":[127,149],"consists":[128],"4":[130],"domains,":[131],"18":[132],"indicators":[133,167],"59":[135],"metrics":[136],"cover":[138],"necessary":[140],"components":[141],"program.":[146],"proposed":[148,166],"pilot":[156],"tested":[157],"identify":[159],"strength;":[161],"measured":[164],"by":[165,193],"realize":[169],"real":[171],"condition":[172],"feasible":[174],"object":[175],"results":[183],"positive":[185],"terms":[187],"materiality":[190],"feasibility":[192],"conducting":[194],"focus":[195],"group":[196],"interviews":[197],"with":[198],"five":[199],"managers.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
