{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:17:53Z","timestamp":1753600673925,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T00:00:00Z","timestamp":1438560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,3]]},"DOI":"10.1145\/2781562.2781599","type":"proceedings-article","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:17:21Z","timestamp":1438348641000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Study on Developing Framework for Information Privacy Protection"],"prefix":"10.1145","author":[{"given":"Jinwoo","family":"Jung","sequence":"first","affiliation":[{"name":"Chung-Ang University, Graduate School, Department of Security Convergence, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-3200-0420"}]},{"given":"Jungduk","family":"Kim","sequence":"additional","affiliation":[{"name":"Chung-Ang University, College of Business and Economics, Department of Industrial Security, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-2006-6380"}]}],"member":"320","published-online":{"date-parts":[[2015,8,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARTI S. 2012. Data Privacy Protection: A Serious Business for Companies. AMERICAN BAR ASSOCIATION 14(4).  ARTI S. 2012. Data Privacy Protection: A Serious Business for Companies. AMERICAN BAR ASSOCIATION 14(4)."},{"volume-title":"Best Practices: Elements of a Federal Privacy Program v1.0","year":"2010","author":"Claire B.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Gartner: 2013. Different Security Governance Management Operation. 2013.  Gartner: 2013. Different Security Governance Management Operation. 2013."},{"key":"e_1_3_2_1_4_1","unstructured":"ISACA\n\n  \n  : 2009. An Introduction to the Business Model for Information Security. 2009.  ISACA: 2009. An Introduction to the Business Model for Information Security. 2009."},{"key":"e_1_3_2_1_5_1","unstructured":"ISO\/IEC 27001:2013. Information technology-Security techniques-Information security management systems - Requirements. 2013.  ISO\/IEC 27001:2013. Information technology-Security techniques-Information security management systems - Requirements. 2013."},{"key":"e_1_3_2_1_6_1","unstructured":"ISO\/IEC 27002:2013. Information technology-Security techniques-Code of practice of information security controls. 2013.  ISO\/IEC 27002:2013. Information technology-Security techniques-Code of practice of information security controls. 2013."},{"key":"e_1_3_2_1_7_1","unstructured":"ISO\/IEC 27014:2013. Information technology-Security techniques-Governance of information security. 2013.  ISO\/IEC 27014:2013. Information technology-Security techniques-Governance of information security. 2013."},{"key":"e_1_3_2_1_8_1","unstructured":"ISO\/IEC 29100:2011. Information technology-Security techniques-Privacy framework. 2011.  ISO\/IEC 29100:2011. Information technology-Security techniques-Privacy framework. 2011."},{"key":"e_1_3_2_1_9_1","unstructured":"ISO\/IEC 29101:2013. Information technology-Security techniques-Privacy architecture framework. 2013.  ISO\/IEC 29101:2013. Information technology-Security techniques-Privacy architecture framework. 2013."},{"key":"e_1_3_2_1_10_1","unstructured":"Ken A. 2015. Reasonable Security Practices: The AICPA\/CICA Privacy Framework. The CPA Journal (March. 2015). DOI= https:\/\/www.questia.com\/magazine\/1P3-878023961\/reasonable-security-practices-the-aicpa-cica-privacy  Ken A. 2015. Reasonable Security Practices: The AICPA\/CICA Privacy Framework. The CPA Journal (March. 2015). DOI= https:\/\/www.questia.com\/magazine\/1P3-878023961\/reasonable-security-practices-the-aicpa-cica-privacy"},{"key":"e_1_3_2_1_11_1","unstructured":"Kim J.D. 2014. A Study on the Measurement of the Information Privacy Program Maturity Model University of Chung-Ang.  Kim J.D. 2014. A Study on the Measurement of the Information Privacy Program Maturity Model University of Chung-Ang."},{"key":"e_1_3_2_1_12_1","unstructured":"Lee R. Janna A. and Jennifer. C. 2014. Cyber Attacks Likely to Increase. Internet project report for 25th anniversary of the World Wide Web. Pew Research Center.  Lee R. Janna A. and Jennifer. C. 2014. Cyber Attacks Likely to Increase. Internet project report for 25th anniversary of the World Wide Web. Pew Research Center."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_1_14_1","unstructured":"Nina R. 2012. User Interface Design for Privacy Enhancing Technology. Norwegian University of Norwegian.  Nina R. 2012. User Interface Design for Privacy Enhancing Technology. Norwegian University of Norwegian."},{"key":"e_1_3_2_1_15_1","unstructured":"NIST SP 800-53:2013. Security and Privacy Controls for Federal Information Systems and Organizations. 2013.  NIST SP 800-53:2013. Security and Privacy Controls for Federal Information Systems and Organizations. 2013."},{"key":"e_1_3_2_1_16_1","unstructured":"PONEMON INSTITUTE: 2011. The Role of Governance Risk Management & Compliance in Organizations. 2011. DOI= http:\/\/www.emc.com\/collateral\/about\/news\/ponemon-report-egrc.pdf  PONEMON INSTITUTE: 2011. The Role of Governance Risk Management & Compliance in Organizations. 2011. DOI= http:\/\/www.emc.com\/collateral\/about\/news\/ponemon-report-egrc.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"PWC\n\n  \n  : 2007. Key considerations in financial services global privacy compliance. 2007. DOI=http:\/\/www.pwc.com\/en_US\/us\/banking-capital-markets\/publications\/assets\/global_privacy_compliance.pdf  PWC: 2007. Key considerations in financial services global privacy compliance. 2007. DOI=http:\/\/www.pwc.com\/en_US\/us\/banking-capital-markets\/publications\/assets\/global_privacy_compliance.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"Rasika D. 2013. Discovering Constructs and Dimensions for Information Privacy Metrics. Doctoral Thesis. University of Stockholm.  Rasika D. 2013. Discovering Constructs and Dimensions for Information Privacy Metrics. Doctoral Thesis. University of Stockholm."},{"key":"e_1_3_2_1_19_1","unstructured":"Stefan B. 2014. Inter-temporal Privacy Metrics. University of Karlstad.  Stefan B. 2014. Inter-temporal Privacy Metrics. University of Karlstad."},{"key":"e_1_3_2_1_20_1","unstructured":"Tadewald J. GRC integration: a conceptual foundation model for success (governance risk and compliance). Management Accounting Quarterly. 15 3 (Spring. 2014) 10.  Tadewald J. GRC integration: a conceptual foundation model for success (governance risk and compliance). Management Accounting Quarterly. 15 3 (Spring. 2014) 10."}],"event":{"name":"ICEC '15: The 17th International Conference on Electronic Commerce 2015","sponsor":["KRF Korea Research Foundation"],"location":"Seoul Republic of Korea","acronym":"ICEC '15"},"container-title":["Proceedings of the 17th International Conference on Electronic Commerce 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2781562.2781599","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2781562.2781599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:16Z","timestamp":1750225696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2781562.2781599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,3]]},"references-count":20,"alternative-id":["10.1145\/2781562.2781599","10.1145\/2781562"],"URL":"https:\/\/doi.org\/10.1145\/2781562.2781599","relation":{},"subject":[],"published":{"date-parts":[[2015,8,3]]},"assertion":[{"value":"2015-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}