{"id":"https://openalex.org/W3104266844","doi":"https://doi.org/10.3233/faia200733","title":"Construction of Cloud ERP Security Evaluation Index System Based on Text Mining","display_name":"Construction of Cloud ERP Security Evaluation Index System Based on Text Mining","publication_year":2020,"publication_date":"2020-11-09","ids":{"openalex":"https://openalex.org/W3104266844","doi":"https://doi.org/10.3233/faia200733","mag":"3104266844"},"language":"en","primary_location":{"id":"doi:10.3233/faia200733","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200733","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200733","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200733","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016549628","display_name":"Ying Gao","orcid":"https://orcid.org/0000-0001-8024-4627"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Gao","raw_affiliation_strings":["School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","School of Management, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024174938","display_name":"Qin Su","orcid":"https://orcid.org/0000-0001-5003-125X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Su","raw_affiliation_strings":["School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","School of Management, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114514372","display_name":"Yue Fang","orcid":"https://orcid.org/0009-0001-2609-379X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Fang","raw_affiliation_strings":["School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","School of Management, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024157047","display_name":"Pinyan Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pinyan Lai","raw_affiliation_strings":["School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","School of Management, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016549628"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25292424,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.7078999876976013,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.7078999876976013,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7077000141143799,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.6798999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8446516990661621},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7119032740592957},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.626583456993103},{"id":"https://openalex.org/keywords/enterprise-resource-planning","display_name":"Enterprise resource planning","score":0.6141619086265564},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.5625393390655518},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4671209454536438},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44290637969970703},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.4421956241130829},{"id":"https://openalex.org/keywords/objectivity","display_name":"Objectivity (philosophy)","score":0.42126744985580444},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.413439005613327},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3398997187614441},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3342479169368744},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.2542535662651062},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.15916967391967773},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15471702814102173}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8446516990661621},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7119032740592957},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.626583456993103},{"id":"https://openalex.org/C2777960535","wikidata":"https://www.wikidata.org/wiki/Q131508","display_name":"Enterprise resource planning","level":2,"score":0.6141619086265564},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.5625393390655518},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4671209454536438},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44290637969970703},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.4421956241130829},{"id":"https://openalex.org/C2482559","wikidata":"https://www.wikidata.org/wiki/Q206330","display_name":"Objectivity (philosophy)","level":2,"score":0.42126744985580444},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.413439005613327},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3398997187614441},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3342479169368744},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2542535662651062},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.15916967391967773},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15471702814102173},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia200733","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200733","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200733","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia200733","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200733","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200733","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3104266844.pdf","grobid_xml":"https://content.openalex.org/works/W3104266844.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1548999154","https://openalex.org/W2091331354","https://openalex.org/W2113222723","https://openalex.org/W2157040323","https://openalex.org/W2390360719","https://openalex.org/W2546153563","https://openalex.org/W4248841288"],"related_works":["https://openalex.org/W2378767206","https://openalex.org/W1540871478","https://openalex.org/W328308450","https://openalex.org/W282641168","https://openalex.org/W2376963063","https://openalex.org/W2066396794","https://openalex.org/W2366734808","https://openalex.org/W2003100177","https://openalex.org/W2391444248","https://openalex.org/W2390716080"],"abstract_inverted_index":{"The":[0,141],"aim":[1],"of":[2,18,33,92,99,110,126,169,183,212],"this":[3,80],"study":[4],"is":[5,86,144,158],"to":[6,26,73,146,202],"investigate":[7],"and":[8,25,30,57,95,102,108,139,161,163,191,198],"discuss":[9],"the":[10,16,19,44,51,75,83,89,106,150,164,167,210],"potential":[11],"security":[12,34,41,121,138,153,211],"issues":[13,45],"arising":[14],"from":[15],"deployment":[17],"Cloud":[20,39,62,64,66,119,151,184,213],"Enterprise":[21,53],"Resource":[22,54],"Planning":[23,55],"system,":[24,156],"propose":[27],"a":[28,118],"perfect":[29],"standard":[31,77,84],"set":[32],"evaluation":[35,122,129,154,174,204],"index":[36,123,155],"system":[37,124,197,207],"for":[38,149],"ERP":[40,120,152,185,214],"issues.":[42],"Considering":[43],"which":[46,157,176],"may":[47],"be":[48],"inherent":[49],"in":[50,79,187],"conventional":[52],"systems":[56],"new":[58],"ones":[59],"brought":[60],"by":[61,172],"Computing,":[63],"Platform,":[65],"ERP,":[67],"we":[68,116,194],"use":[69],"text":[70],"mining":[71],"technology":[72],"mine":[74],"related":[76],"files":[78],"paper.":[81],"Since":[82],"literature":[85],"based":[87],"on":[88,178],"comprehensive":[90],"results":[91],"technology,":[93],"science":[94],"practice,":[96],"its":[97],"characteristics":[98],"standardization,":[100],"objectivity":[101,170],"validity":[103],"also":[104],"ensure":[105],"effectiveness":[107],"applicability":[109],"indicators.":[111],"By":[112,180],"using":[113],"NLP":[114],"methods,":[115],"construct":[117],"consisting":[125],"five":[127],"parts:":[128],"method":[130,143,165],"security,":[131,134,136],"information":[132],"access":[133],"data":[135],"management":[137],"others.":[140],"entropy":[142],"used":[145],"assign":[147],"weights":[148],"more":[159,215],"scientific":[160],"rational":[162],"moderates":[166],"lack":[168],"caused":[171],"traditional":[173],"methods":[175],"over-relies":[177],"evaluators.":[179],"analyzing":[181],"cases":[182],"collected":[186],"various":[188],"application":[189],"reports":[190],"research":[192],"papers,":[193],"improve":[195],"our":[196,206],"find":[199],"that":[200],"compared":[201],"other":[203],"systems,":[205],"can":[208],"evaluate":[209],"comprehensively.":[216]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
