{"id":"https://openalex.org/W2080518162","doi":"https://doi.org/10.4018/jisp.2012040101","title":"Safety Measures for Social Computing in Wiki Learning Environment","display_name":"Safety Measures for Social Computing in Wiki Learning Environment","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https://openalex.org/W2080518162","doi":"https://doi.org/10.4018/jisp.2012040101","mag":"2080518162"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2012040101","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113723340","display_name":"Ahmed Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]},{"id":"https://openalex.org/I205051169","display_name":"Kingston University","ror":"https://ror.org/05bbqza97","country_code":"GB","type":"education","lineage":["https://openalex.org/I205051169"]}],"countries":["GB","MY"],"is_corresponding":false,"raw_author_name":"Ahmed Patel","raw_affiliation_strings":["Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK","institution_ids":["https://openalex.org/I885383172","https://openalex.org/I205051169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040865093","display_name":"Mona Taghavi","orcid":"https://orcid.org/0000-0001-6204-4744"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mona Taghavi","raw_affiliation_strings":["(Universiti Kebangsaan Malaysia, Malaysia)"],"affiliations":[{"raw_affiliation_string":"(Universiti Kebangsaan Malaysia, Malaysia)","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102729532","display_name":"Joaquim Celestino J\u00fanior","orcid":"https://orcid.org/0009-0007-8727-3114"},"institutions":[{"id":"https://openalex.org/I102939073","display_name":"Universidade Estadual do Cear\u00e1","ror":"https://ror.org/00sec1m50","country_code":"BR","type":"education","lineage":["https://openalex.org/I102939073"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Joaquim Celestino J\u00fanior","raw_affiliation_strings":["State University of Ceara, Brazil#TAB#"],"affiliations":[{"raw_affiliation_string":"State University of Ceara, Brazil#TAB#","institution_ids":["https://openalex.org/I102939073"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038155565","display_name":"Rodziah Latih","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rodziah Latih","raw_affiliation_strings":["(Universiti Kebangsaan Malaysia, Malaysia)"],"affiliations":[{"raw_affiliation_string":"(Universiti Kebangsaan Malaysia, Malaysia)","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110449894","display_name":"Abdullah Mohd Zin","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdullah Mohd Zin","raw_affiliation_strings":["(Universiti Kebangsaan Malaysia, Malaysia)"],"affiliations":[{"raw_affiliation_string":"(Universiti Kebangsaan Malaysia, Malaysia)","institution_ids":["https://openalex.org/I885383172"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.083,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81018,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":"6","issue":"2","first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9896,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9896,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12478","display_name":"Wikis in Education and Collaboration","score":0.9879,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9857,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7692882},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.69195974}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83584267},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7692882},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.69195974},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.55124277},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5494317},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.53177315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48767602},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.48487577},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28240487},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/jisp.2012040101","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.65}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W10242621","https://openalex.org/W1586963916","https://openalex.org/W1605637291","https://openalex.org/W1739118874","https://openalex.org/W1774887057","https://openalex.org/W1863517429","https://openalex.org/W1964009902","https://openalex.org/W1994473607","https://openalex.org/W2045049260","https://openalex.org/W2105535951","https://openalex.org/W2118998229","https://openalex.org/W2146657358","https://openalex.org/W2152722588","https://openalex.org/W2166130341","https://openalex.org/W2248436619","https://openalex.org/W2257569754","https://openalex.org/W2336481781","https://openalex.org/W2338378872","https://openalex.org/W256572687","https://openalex.org/W3122724846"],"related_works":["https://openalex.org/W4362572734","https://openalex.org/W4252285266","https://openalex.org/W2997836625","https://openalex.org/W2921504876","https://openalex.org/W2505685969","https://openalex.org/W2476504758","https://openalex.org/W2465481547","https://openalex.org/W2338899373","https://openalex.org/W199254545","https://openalex.org/W197818113"],"abstract_inverted_index":{"Wikis":[0,67],"are":[1,68],"social":[2,72,125,183],"networking":[3],"systems":[4,130],"that":[5],"allow":[6],"users":[7,112,195],"to":[8,34,110,189,194],"freely":[9],"intermingle":[10],"at":[11],"different":[12],"levels":[13],"of":[14,37,42,45,58,71,74,123],"communication":[15],"such":[16],"as":[17,131],"collaborative":[18,75],"learning,":[19,76],"chatting,":[20],"and":[21,28,40,81,93,107,113,119,127,137,148,160,167,180,192,200],"group":[22],"communications.":[23],"Although":[24],"a":[25,86,153,158],"great":[26],"idea":[27],"goal,":[29],"it\u2019s":[30],"particularly":[31],"vulnerable":[32],"due":[33],"its":[35],"features":[36],"open":[38],"medium":[39,162],"lack":[41],"clear":[43],"plan":[44],"defense.":[46],"Personal":[47],"data":[48,135],"can":[49,177],"be":[50],"misused":[51],"for":[52,61,89,133,139,157],"virtual":[53,82],"insulting,":[54],"resulting":[55],"in":[56,151,172,182],"misuse":[57],"personal":[59],"information":[60,129],"financial":[62],"gains":[63],"or":[64],"creating":[65],"misuses.":[66],"an":[69],"example":[70],"computing":[73,126,184],"joint":[77],"editing,":[78],"brain":[79],"storming,":[80],"socializing,":[83],"which":[84,101],"is":[85],"ripe":[87],"environment":[88],"hacking,":[90],"deception,":[91],"abuse,":[92],"misuse.":[94],"Thus,":[95],"wiki":[96,173],"needs":[97,122],"comprehensive":[98],"security":[99],"measures":[100],"include":[102],"privacy,":[103,165],"trust,":[104],"security,":[105],"audit,":[106,166],"digital":[108,168],"forensics":[109],"protect":[111],"system":[114],"resources.":[115],"This":[116],"paper":[117],"identifies":[118],"explores":[120],"the":[121,146,187],"secure":[124,159],"supporting":[128],"places":[132],"interaction,":[134],"collection,":[136],"manipulation":[138],"wikis.":[140],"It":[141],"does":[142],"this":[143],"by":[144],"reviewing":[145],"literature":[147],"related":[149],"works":[150],"proposing":[152],"safety":[154],"measure":[155],"framework":[156],"trustworthy":[161],"together":[163],"with":[164,186],"forensic":[169],"investigative":[170],"functions":[171],"environments.":[174],"These":[175],"then":[176],"aid":[178],"design":[179],"usage":[181],"environments":[185],"proviso":[188],"give":[190],"comfort":[191],"confidence":[193],"without":[196],"worrying":[197],"about":[198],"abuse":[199],"cybercrime":[201],"perpetrated":[202],"activities.":[203]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2080518162","counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2024-12-11T01:37:37.505953","created_date":"2016-06-24"}