{"id":"https://openalex.org/W2767018182","doi":"https://doi.org/10.18420/muc2017-ws05-0403","title":"Exploring Security Processes in Organizations: the Case of Smartphones","display_name":"Exploring Security Processes in Organizations: the Case of Smartphones","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2767018182","doi":"https://doi.org/10.18420/muc2017-ws05-0403","mag":"2767018182"},"language":"en","primary_location":{"id":"doi:10.18420/muc2017-ws05-0403","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2017-ws05-0403","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/muc2017-ws05-0403","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001899527","display_name":"Lena Reinfelder","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Reinfelder, Lena","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5040519207","display_name":"Zinaida Benenson","orcid":"https://orcid.org/0009-0006-7158-0219"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Benenson, Zinaida","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001899527"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4836,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74987199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5120735764503479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5099972486495972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4024524390697479},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38485798239707947},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.33957093954086304}],"concepts":[{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5120735764503479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5099972486495972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4024524390697479},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38485798239707947},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.33957093954086304}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.18420/muc2017-ws05-0403","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2017-ws05-0403","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"mag:2767018182","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/conf/mc/mc2017w.html#ReinfelderB17","pdf_url":null,"source":{"id":"https://openalex.org/S4306519746","display_name":"Mensch &amp; Computer Workshopband","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Mensch &amp; Computer Workshopband","raw_type":null}],"best_oa_location":{"id":"doi:10.18420/muc2017-ws05-0403","is_oa":true,"landing_page_url":"https://doi.org/10.18420/muc2017-ws05-0403","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2187440149","https://openalex.org/W2784115149","https://openalex.org/W2781026163","https://openalex.org/W320442194","https://openalex.org/W2265208485","https://openalex.org/W2319512977","https://openalex.org/W2808744830","https://openalex.org/W1924169242","https://openalex.org/W2914848344","https://openalex.org/W2913964908","https://openalex.org/W2738702217","https://openalex.org/W3000236333","https://openalex.org/W3047977707","https://openalex.org/W1996648132","https://openalex.org/W1988641801","https://openalex.org/W1995383559","https://openalex.org/W2988478514","https://openalex.org/W2989326324","https://openalex.org/W3205545527","https://openalex.org/W2912799059"],"abstract_inverted_index":{"We":[0,42],"present":[1],"results":[2],"of":[3,8,21,30,39,96,111,121],"two":[4],"exploratory":[5],"qualitative":[6],"studies":[7],"smartphone":[9,31],"security":[10,22,32,50,70,80,91,112,122,138],"in":[11,99,127],"organizations.":[12,100],"The":[13,24],"first":[14],"study":[15,26],"provides":[16],"insights":[17],"into":[18],"the":[19,28,35,83,131,136],"process":[20],"development.":[23],"second":[25],"analyzes":[27],"effects":[29,120],"measures":[33,123],"on":[34,124],"productivity":[36,86],"and":[37,51,59,67,82,117,134],"behavior":[38,133],"end":[40],"users.":[41],"find":[43],"that":[44],"smartphones":[45,74],"create":[46],"specific":[47,115],"conflicts":[48,84],"between":[49],"productivity,":[52],"because":[53],"they":[54],"have":[55],"different":[56,63],"technical":[57],"characteristics":[58],"are":[60],"used":[61],"for":[62,73],"purposes":[64],"than":[65],"laptops":[66],"PCs.":[68],"Nevertheless,":[69],"development":[71],"processes":[72,113],"do":[75],"not":[76],"differ":[77],"from":[78],"other":[79],"processes,":[81],"with":[85,114],"cannot":[87],"be":[88],"observed":[89],"by":[90],"experts":[92],"due":[93],"to":[94,108],"lack":[95],"structured":[97],"feedback":[98],"Structured":[101],"user":[102],"involvement":[103],"has":[104],"a":[105],"great":[106],"potential":[107],"improve":[109],"alignment":[110],"technologies":[116],"decrease":[118],"negative":[119],"productivity.":[125],"This,":[126],"turn,":[128],"can":[129],"increase":[130],"compliance":[132],"consequently":[135],"organizational":[137],"level.":[139]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
