{"id":"https://openalex.org/W2613221630","doi":"https://doi.org/10.1108/ics-02-2017-0004","title":"On data leakage from non-production systems","display_name":"On data leakage from non-production systems","publication_year":2017,"publication_date":"2017-08-21","ids":{"openalex":"https://openalex.org/W2613221630","doi":"https://doi.org/10.1108/ics-02-2017-0004","mag":"2613221630"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2017-0004","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/2086/13921","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024462500","display_name":"Jacqueline Cope","orcid":null},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jacqueline Cope","raw_affiliation_strings":["School of Computer Science and Informatics, De Montfort University, Leicester, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, De Montfort University, Leicester, UK","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034309664","display_name":"Fran\u00e7ois Siewe","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Francois Siewe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352729","display_name":"Feng Chen","orcid":"https://orcid.org/0000-0002-9493-4976"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029043022","display_name":"\u039b\u03ad\u03b1\u03bd\u03b4\u03c1\u03bf\u03c2 \u039c\u03b1\u03b3\u03bb\u03b1\u03c1\u03ac\u03c2","orcid":"https://orcid.org/0000-0001-5360-9782"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Leandros Maglaras","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5035745103","display_name":"Helge Janicke","orcid":"https://orcid.org/0000-0002-1345-2829"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Helge Janicke","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.834365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":77},"biblio":{"volume":"25","issue":"4","first_page":"454","last_page":"474"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9961,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.4477581}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.56249994},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.5616835},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5072631},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4477581},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.43979552},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4383163},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3468312},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.33446503},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3300335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3247026},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3140335},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23832333},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.18354273},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2017-0004","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://hdl.handle.net/2086/13921","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":["De Montfort University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://hdl.handle.net/2086/13921","pdf_url":null,"source":{"id":"https://openalex.org/S4306400394","display_name":"DMU Open Research Archive (De Montfort University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I66943878","host_organization_name":"De Montfort University","host_organization_lineage":["https://openalex.org/I66943878"],"host_organization_lineage_names":["De Montfort University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.42}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W132347231","https://openalex.org/W1605584743","https://openalex.org/W1673464365","https://openalex.org/W1967471568","https://openalex.org/W2057637324","https://openalex.org/W2064387580","https://openalex.org/W2084050953","https://openalex.org/W2100237997","https://openalex.org/W2131814102","https://openalex.org/W2159024459","https://openalex.org/W2170217457","https://openalex.org/W2171080494","https://openalex.org/W2182687482","https://openalex.org/W2259721653","https://openalex.org/W2296016106","https://openalex.org/W2340753036","https://openalex.org/W2345838529","https://openalex.org/W2477988884","https://openalex.org/W2785729136","https://openalex.org/W3142034477","https://openalex.org/W4245215512","https://openalex.org/W4245780134"],"related_works":["https://openalex.org/W4367048510","https://openalex.org/W4248817909","https://openalex.org/W3123240078","https://openalex.org/W2899374547","https://openalex.org/W2899084033","https://openalex.org/W2786275068","https://openalex.org/W2764151937","https://openalex.org/W2363804782","https://openalex.org/W2201225611","https://openalex.org/W2021682807"],"abstract_inverted_index":{"Purpose":[0],"This":[1,62,82,192,214,311],"study":[2],"is":[3,259,304,444],"an":[4,135,204],"exploration":[5],"of":[6,12,56,137,156,166,188,250,275,290,297,327,365,377,415,438,455],"areas":[7,125,168],"pertaining":[8],"to":[9,28,32,53,65,85,127,162,170,206,231,299,354,421,447,452],"the":[10,19,159,164,196,226,239,242,245,248,251,273,279,287,291,300,307,325,330,343,348,355,363,375,382,388,398,413,416,422,430,442,453],"use":[11,54],"production":[13,57,243],"data":[14,58,69,92,113,128,172,209,232,308,443],"in":[15,59,108,114,210,396,419],"non-production":[16,24,60,95,115,131,212,252,335,417,456],"environments.":[17,61,96,116,213,457],"During":[18],"software":[20],"development":[21],"life":[22],"cycle,":[23],"environments":[25,283,336],"are":[26,51,79,351],"used":[27],"serve":[29],"various":[30],"purposes":[31],"include":[33],"unit,":[34],"component,":[35],"integration,":[36],"system,":[37,244],"user":[38],"acceptance,":[39],"performance":[40],"and":[41,45,50,67,75,104,140,151,199,228,234,247,264,318,359,370,373,391,401,407,424,433],"configuration":[42],"testing.":[43],"Organisations":[44],"third":[46],"parties":[47],"have":[48],"been":[49],"continuing":[52],"copies":[55],"can":[63],"lead":[64],"personal":[66],"sensitive":[68,112,157,171,208],"being":[70],"accidentally":[71],"leaked":[72],"if":[73],"appropriate":[74],"rigorous":[76],"security":[77,263],"guidelines":[78,139],"not":[80,285],"implemented.":[81],"paper":[83,193,215,255,312],"aims":[84,143],"propose":[86],"a":[87,120,146,153,178,201,217,222,314,393,449],"comprehensive":[88],"framework":[89,98,179,202,219,386],"for":[90,149,203,306,405],"minimising":[91],"leakage":[93,129],"from":[94,130,225,342],"The":[97,254,320,384,436],"was":[99,105,180,183],"evaluated":[100,184],"using":[101],"guided":[102,189],"interviews":[103],"proven":[106],"effective":[107],"helping":[109],"organisation":[110,205],"manage":[111,207],"Design/methodology/approach":[117],"Authors":[118],"conducted":[119],"thorough":[121],"literature":[122],"review":[123],"on":[124,175,441],"related":[126,169],"systems.":[132,435],"By":[133],"doing":[134],"analysis":[136],"advice,":[138],"frameworks":[141],"that":[142,220,257,303],"at":[144,412],"finding":[145],"practical":[147,394],"solution":[148,155,395],"selecting":[150],"implementing":[152],"de-identification":[154],"data,":[158,366],"authors":[160],"managed":[161],"highlight":[163],"importance":[165],"all":[167],"protection.":[173],"Based":[174],"these":[176,350],"areas,":[177],"proposed":[181,218,321,385],"which":[182,267],"by":[185,271],"conducting":[186],"set":[187],"interviews.":[190],"Findings":[191],"has":[194],"researched":[195],"background":[197],"information":[198],"produced":[200],"its":[211],"presents":[216],"describes":[221,324,387],"process":[223,389,400],"flow":[224,390],"legal":[227,357,423],"regulatory":[229,425],"requirements":[230,249,358,414,432],"treatment":[233],"protection,":[235],"gained":[236],"through":[237],"understanding":[238],"organisation\u2019s":[240],"business,":[241],"purpose":[246],"environment.":[253],"shows":[256,362],"there":[258],"some":[260],"conflict":[261],"between":[262],"perceived":[265,339],"usability,":[266],"may":[268,337,380],"be":[269,286,296,338],"addressed":[270],"challenging":[272],"perceptions":[274],"usability":[276],"or":[277],"identifying":[278],"compromise":[280],"required.":[281],"Non-production":[282],"need":[284],"sole":[288],"responsibility":[289],"IT":[292],"section,":[293],"they":[294],"should":[295],"interest":[298],"business":[301,316,344,434],"area":[302],"responsible":[305],"held.":[309],"Originality/value":[310],"proposes":[313],"simplified":[315],"model":[317,322],"framework.":[319],"diagrammatically":[323],"interactions":[326],"elements":[328],"affecting":[329],"organisation.":[331],"It":[332,361,410],"highlights":[333],"how":[334,374],"as":[340,427,429],"separate":[341],"systems,":[345],"but":[346],"despite":[347],"perceptions,":[349],"still":[352],"subject":[353],"same":[356],"constraints.":[360],"interdependency":[364],"software,":[367],"technical":[368],"infrastructure":[369],"human":[371,439],"interaction":[372],"change":[376],"one":[378],"element":[379],"affect":[381],"others.":[383],"forms":[392],"assisting":[397],"decision-making":[399],"providing":[402],"documentary":[403],"evidence":[404],"assurance":[406],"audit":[408],"purposes.":[409],"looks":[411],"system":[418],"relation":[420],"constraints,":[426],"well":[428],"organisational":[431],"impact":[437],"factors":[440],"also":[445],"considered":[446],"bring":[448],"holistic":[450],"approach":[451],"protection":[454]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2613221630","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-01-19T15:47:08.821576","created_date":"2017-05-19"}