{"id":"https://openalex.org/W4405182032","doi":"https://doi.org/10.1145/3658644.3690353","title":"Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices","display_name":"Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182032","doi":"https://doi.org/10.1145/3658644.3690353"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690353","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690353","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690353","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690353","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098749007","display_name":"Easton Kelso","orcid":null},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Easton Kelso","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089789807","display_name":"Ananta Soneji","orcid":"https://orcid.org/0000-0002-3045-5183"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ananta Soneji","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028738303","display_name":"Sazzadur Rahaman","orcid":"https://orcid.org/0000-0002-1258-6470"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sazzadur Rahaman","raw_affiliation_strings":["University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026842092","display_name":"Yan Shoshitaishvili","orcid":"https://orcid.org/0000-0001-8832-1789"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Shoshitaishvili","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081469015","display_name":"Rakibul Hasan","orcid":"https://orcid.org/0000-0001-8374-7596"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rakibul Hasan","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5098749007"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":5.3069,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.95959627,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1656","last_page":"1670"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.8709468841552734},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6237753033638},{"id":"https://openalex.org/keywords/higher-education","display_name":"Higher education","score":0.6056819558143616},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.49828290939331055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4783072769641876},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.454471230506897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.425631582736969},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.38701748847961426},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.1642007827758789},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.13809576630592346}],"concepts":[{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.8709468841552734},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6237753033638},{"id":"https://openalex.org/C120912362","wikidata":"https://www.wikidata.org/wiki/Q136822","display_name":"Higher education","level":2,"score":0.6056819558143616},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.49828290939331055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4783072769641876},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.454471230506897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.425631582736969},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.38701748847961426},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.1642007827758789},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.13809576630592346},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690353","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690353","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690353","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690353","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690353","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690353","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Quality Education","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182032.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1780778418","https://openalex.org/W2122381799","https://openalex.org/W2407300725","https://openalex.org/W2554919826","https://openalex.org/W2744999500","https://openalex.org/W2947930236","https://openalex.org/W2955803145","https://openalex.org/W2972977894","https://openalex.org/W2990679802","https://openalex.org/W3017863658","https://openalex.org/W3023054078","https://openalex.org/W3036044567","https://openalex.org/W3043638540","https://openalex.org/W3093468567","https://openalex.org/W3121999688","https://openalex.org/W3202150862","https://openalex.org/W4221052436","https://openalex.org/W4240996659","https://openalex.org/W4313417760","https://openalex.org/W4366550037","https://openalex.org/W4385522513"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2240244939"],"abstract_inverted_index":{"The":[0],"education":[1,10],"technology":[2],"(EdTech)":[3],"landscape":[4],"is":[5,26,68],"expanding":[6],"rapidly":[7],"in":[8],"higher":[9],"institutes":[11],"(HEIs).":[12],"This":[13,56],"growth":[14],"brings":[15],"enormous":[16],"complexity.":[17],"Protecting":[18],"the":[19,43],"extensive":[20],"data":[21,31,44],"collected":[22],"by":[23],"these":[24,54],"tools":[25],"crucial":[27],"for":[28,42],"HEIs":[29],"as":[30],"breaches":[32],"and":[33,39,63],"misuses":[34],"can":[35],"have":[36],"dire":[37],"security":[38],"privacy":[40],"consequences":[41],"subjects,":[45],"particularly":[46],"students,":[47],"who":[48],"are":[49],"often":[50],"compelled":[51],"to":[52],"use":[53],"tools.":[55],"urges":[57],"an":[58],"in-depth":[59],"understanding":[60],"of":[61],"HEI":[62],"EdTech":[64],"vendor":[65],"dynamics,":[66],"which":[67],"largely":[69],"understudied.":[70]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
