{"id":"https://openalex.org/W2801613411","doi":"https://doi.org/10.1108/jices-12-2017-0073","title":"Data retention: an assessment of a proposed national scheme","display_name":"Data retention: an assessment of a proposed national scheme","publication_year":2018,"publication_date":"2018-05-03","ids":{"openalex":"https://openalex.org/W2801613411","doi":"https://doi.org/10.1108/jices-12-2017-0073","mag":"2801613411"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/jices-12-2017-0073","pdf_url":null,"source":{"id":"https://openalex.org/S102320310","display_name":"Journal of Information Communication and Ethics in Society","issn_l":"1477-996X","issn":["1477-996X","1758-8871"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084370797","display_name":"Matthew Warren","orcid":"https://orcid.org/0000-0002-7529-431X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Matthew Warren","raw_affiliation_strings":["Centre for Cyber Security Research and Innovation, School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Security Research and Innovation, School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077633756","display_name":"Shona Leitch","orcid":null},"institutions":[],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shona Leitch","raw_affiliation_strings":["College of Business, Royal Melbourne Institute of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"College of Business, Royal Melbourne Institute of Technology, Melbourne, Australia","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":62},"biblio":{"volume":"17","issue":"1","first_page":"98","last_page":"112"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9899,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-retention","display_name":"Data retention","score":0.6605154},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4717905}],"concepts":[{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.67729354},{"id":"https://openalex.org/C2780866740","wikidata":"https://www.wikidata.org/wiki/Q5227345","display_name":"Data retention","level":2,"score":0.6605154},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.64589155},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.6144272},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.5536971},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5327482},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.50558925},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47463214},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4717905},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.44652936},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.439293},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.41176814},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34313944},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.27328262},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.27013507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19708094},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.17545557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.14629674},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.1092563},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0835104},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/jices-12-2017-0073","pdf_url":null,"source":{"id":"https://openalex.org/S102320310","display_name":"Journal of Information Communication and Ethics in Society","issn_l":"1477-996X","issn":["1477-996X","1758-8871"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.81}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":3,"referenced_works":["https://openalex.org/W1552218062","https://openalex.org/W2071355447","https://openalex.org/W2333975304"],"related_works":["https://openalex.org/W642569106","https://openalex.org/W4234724867","https://openalex.org/W3124591957","https://openalex.org/W3123092375","https://openalex.org/W2754896151","https://openalex.org/W2369013390","https://openalex.org/W2360188235","https://openalex.org/W2036107203","https://openalex.org/W2017388581","https://openalex.org/W1632536903"],"abstract_inverted_index":{"Purpose":[0],"The":[1,40,68,109,120],"information":[2],"society":[3,56],"has":[4],"developed":[5],"rapidly":[6],"since":[7],"the":[8,11,28,34,38,76,87,92,98,123,155],"end":[9],"of":[10,30,37,53,70,78,145,154],"twentieth":[12],"century.":[13],"Many":[14],"countries":[15],"(including":[16],"Australia)":[17],"have":[18,131],"been":[19],"looking":[20],"at":[21,148],"ways":[22],"to":[23,62,74,115],"protect":[24],"their":[25],"citizens":[26],"against":[27],"variety":[29],"risks":[31],"associated":[32],"with":[33],"continued":[35],"evolution":[36],"internet.":[39],"Australian":[41,55,93],"Federal":[42,94],"Government":[43,95],"in":[44,152],"2013":[45],"proposed":[46],"data":[47,79,133,146],"retention":[48,80,134,147],"as":[49],"one":[50],"possible":[51],"method":[52],"protecting":[54],"and":[57,64,96,101,125],"aiding":[58],"law":[59],"enforcement":[60],"agencies":[61],"investigate":[63],"prosecute":[65],"cyber-crime.":[66],"Design/methodology/approach":[67],"aim":[69],"this":[71],"paper":[72,110,121,156],"is":[73,139],"consider":[75],"issue":[77],"from":[81],"a":[82,112,140,149],"stakeholder\u2019s":[83],"perspective":[84],"by":[85,91,106],"analysing":[86],"public":[88],"submissions":[89],"garnered":[90],"identify":[97],"key":[99],"issues":[100],"concerns":[102,124],"that":[103,127],"were":[104],"raised":[105],"these":[107],"stakeholders.":[108],"used":[111],"qualitative":[113],"approach":[114],"undertake":[116],"theme":[117],"analysis.":[118],"Findings":[119],"shows":[122],"wishes":[126],"different":[128],"stakes":[129],"holders":[130],"regarding":[132],"within":[135],"Australia.":[136,159],"Originality/value":[137],"This":[138],"unique":[141],"study":[142],"into":[143],"implementation":[144],"national":[150],"level,":[151],"terms":[153],"focussing":[157],"on":[158]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2801613411","counts_by_year":[],"updated_date":"2025-01-18T09:59:52.262783","created_date":"2018-05-17"}