{"id":"https://openalex.org/W3033579806","doi":"https://doi.org/10.1145/3385209.3385210","title":"The Emerging AI Policy for e-commerce Industry","display_name":"The Emerging AI Policy for e-commerce Industry","publication_year":2020,"publication_date":"2020-02-19","ids":{"openalex":"https://openalex.org/W3033579806","doi":"https://doi.org/10.1145/3385209.3385210","mag":"3033579806"},"language":"en","primary_location":{"id":"doi:10.1145/3385209.3385210","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3385209.3385210","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 5th International Conference on Intelligent Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://sro.sussex.ac.uk/id/eprint/99991/1/Yilidiz_Beloff_preprint.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007797760","display_name":"Zehra Ozge Yildiz","orcid":null},"institutions":[{"id":"https://openalex.org/I162608824","display_name":"University of Sussex","ror":"https://ror.org/00ayhx656","country_code":"GB","type":"education","lineage":["https://openalex.org/I162608824"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Zehra Ozge Yildiz","raw_affiliation_strings":["Department of Informatics University of Sussex, Brighton, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Informatics University of Sussex, Brighton, United Kingdom","institution_ids":["https://openalex.org/I162608824"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028279177","display_name":"Natalia Beloff","orcid":"https://orcid.org/0000-0002-8872-7786"},"institutions":[{"id":"https://openalex.org/I162608824","display_name":"University of Sussex","ror":"https://ror.org/00ayhx656","country_code":"GB","type":"education","lineage":["https://openalex.org/I162608824"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Natalia Beloff","raw_affiliation_strings":["Department of Informatics University of Sussex, Brighton, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Informatics University of Sussex, Brighton, United Kingdom","institution_ids":["https://openalex.org/I162608824"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5007797760"],"corresponding_institution_ids":["https://openalex.org/I162608824"],"apc_list":null,"apc_paid":null,"fwci":0.2782,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.64104265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"66","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.7485073804855347},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.725834846496582},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.7090797424316406},{"id":"https://openalex.org/keywords/emerging-technologies","display_name":"Emerging technologies","score":0.6740486025810242},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5867961645126343},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.5657505393028259},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5121669769287109},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3533781170845032},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3279740810394287},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30479127168655396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2804131507873535},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2535396218299866},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.15148678421974182},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10490432381629944}],"concepts":[{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.7485073804855347},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.725834846496582},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.7090797424316406},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.6740486025810242},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5867961645126343},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.5657505393028259},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5121669769287109},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3533781170845032},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3279740810394287},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30479127168655396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2804131507873535},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2535396218299866},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15148678421974182},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10490432381629944},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3385209.3385210","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3385209.3385210","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 5th International Conference on Intelligent Information Technology","raw_type":"proceedings-article"},{"id":"pmh:oai:sro.sussex.ac.uk:99991","is_oa":true,"landing_page_url":null,"pdf_url":"http://sro.sussex.ac.uk/id/eprint/99991/1/Yilidiz_Beloff_preprint.pdf","source":{"id":"https://openalex.org/S4306400129","display_name":"Sussex Research Online (University of Sussex)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I162608824","host_organization_name":"University of Sussex","host_organization_lineage":["https://openalex.org/I162608824"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceedings"},{"id":"pmh:oai:figshare.com:article/23482484","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/The_emerging_AI_policy_for_e-commerce_industry/23482484","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:sro.sussex.ac.uk:99991","is_oa":true,"landing_page_url":null,"pdf_url":"http://sro.sussex.ac.uk/id/eprint/99991/1/Yilidiz_Beloff_preprint.pdf","source":{"id":"https://openalex.org/S4306400129","display_name":"Sussex Research Online (University of Sussex)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I162608824","host_organization_name":"University of Sussex","host_organization_lineage":["https://openalex.org/I162608824"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceedings"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3033579806.pdf","grobid_xml":"https://content.openalex.org/works/W3033579806.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W202799293","https://openalex.org/W1965626835","https://openalex.org/W2025544150","https://openalex.org/W2083605389","https://openalex.org/W2189632871","https://openalex.org/W2300086073","https://openalex.org/W2493343568","https://openalex.org/W2793000014","https://openalex.org/W3157172840","https://openalex.org/W4243342770","https://openalex.org/W7025431121"],"related_works":["https://openalex.org/W2494121465","https://openalex.org/W4377233172","https://openalex.org/W1854749775","https://openalex.org/W4312971597","https://openalex.org/W2129556718","https://openalex.org/W1970818898","https://openalex.org/W2350665531","https://openalex.org/W2906160980","https://openalex.org/W2154949144","https://openalex.org/W3199802296"],"abstract_inverted_index":{"For":[0,164],"the":[1,5,8,51,58,62,73,76,84,91,120,125,131,144,148,171,183,186,207],"fast-growing":[2],"e-Commerce":[3,115,200],"industry,":[4],"AI":[6,34,66,88,94,112,172,188,196],"is":[7,11,21,80,117],"game-changer":[9],"but":[10],"it":[12,22,29],"really":[13],"utilised":[14],"in":[15,54],"a":[16,24,38,47,168,203],"most":[17,126],"effective":[18],"way":[19],"or":[20],"just":[23],"risky":[25],"'artificial":[26],"balloon'?":[27],"Is":[28],"gambling":[30],"to":[31,61,82,87,122,181,193],"rely":[32],"on":[33],"technologies":[35,67,95,128],"without":[36,129],"forming":[37],"dedicated":[39],"policy?":[40],"To":[41],"answer":[42],"these":[43],"questions":[44],"and":[45,104,151,155,160,176,212],"propose":[46],"cautious":[48],"approach":[49],"towards":[50],"emerging":[52,157],"technologies,":[53,145],"this":[55],"explanatory":[56],"research,":[57,77],"risks":[59],"related":[60,86,162],"fast":[63],"adaptation":[64],"of":[65,75,93,143,153,170,206],"addressed":[68],"with":[69,202],"recommended":[70],"actions.":[71],"Within":[72],"scope":[74],"eCommerce":[78],"industry":[79,116,201],"analysed":[81],"reveal":[83],"issues":[85],"implementations.":[89],"Accordingly,":[90,110],"challenges":[92],"have":[96,138],"been":[97,139],"questioned":[98],"so":[99],"that":[100],"necessary":[101],"precaution,":[102],"preparation,":[103],"considerations":[105],"can":[106],"be":[107],"pointed":[108],"out.":[109],"an":[111,195],"policy":[113,136,166,197],"for":[114,119,147,185,199],"formed":[118],"businesses":[121],"benefit":[123],"from":[124,214],"recent":[127,174],"risking":[130],"possible":[132],"issues.":[133,163],"Three":[134],"main":[135],"subjects":[137],"determined":[140],"as":[141],"transparency":[142],"accountability":[146],"purpose,":[149],"process":[150],"performance":[152],"them,":[154],"lastly,":[156],"user":[158],"privacy":[159],"security":[161],"each":[165],"subject,":[167],"review":[169],"implementations,":[173],"critics":[175],"forecasted":[177],"expectations":[178],"are":[179],"investigated":[180],"list":[182],"recommendations":[184,213],"candidate":[187],"implementer.":[189],"The":[190],"research":[191],"aims":[192],"provide":[194],"guideline":[198],"detailed":[204],"overview":[205],"outstanding":[208],"issues,":[209],"best":[210],"practices":[211],"scholars.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
