{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:08:23Z","timestamp":1740103703103,"version":"3.37.3"},"reference-count":62,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T00:00:00Z","timestamp":1416441600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001849","name":"DRDO","doi-asserted-by":"crossref","award":["20120336"],"award-info":[{"award-number":["20120336"]}],"id":[{"id":"10.13039\/501100001849","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2016,1,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>With extensive usage and dependence on communication networks, \u2018privacy\u2019 issues in enterprise distributed systems have become fundamentally important. Privacy concerns have flooded the market especially in the public domain, and with the changing environment of software usage and involvement of malicious substances associated with any network, it becomes essential to safeguard and ascertain privacy among users and incorporate the same safeguard to protect privacy in software as well. The methodologies and tools architecting distributed enterprise resource planning (ERP) systems are primarily new and are vulnerable to malicious attacks. This paper aims at identifying some of critical privacy issues by collecting data from ERP practitioners. This work models variables associated with ERP with the variables of privacy to establish a robust adoption of ERP practices. Privacy issues concerning ERP are listed. Several variables associated with the development, implementation, and control of ERP are identified in the existing literature. A questionnaire instrument was distributed among a set of ERP practitioners. The response data collected thereby were analyzed statistically. Based upon the statistical analysis, an attempt has been made in the paper to make a ranking of the privacy factors. The observations are discussed in detail, and some specific conclusions have been made. Copyright \u00a9 2014 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.2839","type":"journal-article","created":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T10:19:36Z","timestamp":1416478776000},"page":"378-401","source":"Crossref","is-referenced-by-count":5,"title":["Modeling privacy issues in distributed enterprise resource planning systems"],"prefix":"10.1002","volume":"29","author":[{"given":"Subhas Chandra","family":"Misra","sequence":"first","affiliation":[{"name":"Department of Industrial and Management Engineering Indian Institute of Technology Kanpur  Kanpur 208 016 India"}]},{"given":"Virender","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Industrial and Management Engineering Indian Institute of Technology Kanpur  Kanpur 208 016 India"}]},{"given":"Naveen Kumar","family":"Jha","sequence":"additional","affiliation":[{"name":"Department of Industrial and Management Engineering Indian Institute of Technology Kanpur  Kanpur 208 016 India"}]},{"given":"Sandip","family":"Bisui","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Statistics  IIT Kanpur"}]}],"member":"311","published-online":{"date-parts":[[2014,11,20]]},"reference":[{"key":"e_1_2_12_2_1","unstructured":"DavenportTH.Putting the enterprise into the enterprise system Harvard Business Review Jul\u2010Aug 1998. pp. 121\u2013131."},{"key":"e_1_2_12_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637150410548056"},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2006.11.005"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00010350"},{"issue":"2","key":"e_1_2_12_6_1","first-page":"199","article-title":"Managerial","volume":"4","author":"Kremmergaard P","year":"2002","journal-title":"Competencies for ERP Journeys, Information Systems Frontiers 2002;"},{"key":"e_1_2_12_7_1","doi-asserted-by":"crossref","unstructured":"EstevesJ PastorJA.Organizational and technological critical success factors behavior along ERP implementation phases Enterprise Information Systems VI 2006 pp. 63\u201371.","DOI":"10.1007\/1-4020-3675-2_8"},{"key":"e_1_2_12_8_1","first-page":"569","volume-title":"International Federation for Information Processing, Research and Practical Issues of Enterprise Information Systems","author":"Olson D","year":"2006"},{"key":"e_1_2_12_9_1","first-page":"553","volume-title":"Research and Practical Issues of Enterprise Information Systems","author":"Guang\u2010hui C","year":"2006"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013173028147"},{"key":"e_1_2_12_11_1","unstructured":"SomersTM NelsonK RagowskyA.Enterprise resource planning (ERP) for the next millennium: development of an integrative framework and implications for research. Proceedings of the Americas Conference on Information Systems Long Beach CA 2000; 998\u20131004."},{"key":"e_1_2_12_12_1","unstructured":"HollandCP LightB GibsonN.A critical success factors model for enterprise resource planning implementation. Proceedings of the 7th European Conference on Information Systems 1999a 1 273\u2013297."},{"key":"e_1_2_12_13_1","unstructured":"HollandP LightB GibsonN.A critical success factors model for enterprise resource planning implementation. Proceedings of the 7th European Conference on Information Systems Vol 1 pp. 273\u2013279 1999b."},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/43197.16.3.19990601\/31310.2"},{"key":"e_1_2_12_15_1","unstructured":"RosarioJG.On the leading edge: critical success factors in ERP implementation projects. Business World Philippines 27 2000."},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1601_2"},{"key":"e_1_2_12_17_1","doi-asserted-by":"crossref","unstructured":"SumnerM.Critical success factors in enterprise wide information management systems projects. Proceedings of the Americas Conference on Information Systems Milwaukee WI 1999 232\u2013234.","DOI":"10.1145\/299513.299722"},{"key":"e_1_2_12_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-5273(01)00183-9"},{"key":"e_1_2_12_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0951-5240(92)90016-6"},{"key":"e_1_2_12_20_1","doi-asserted-by":"crossref","unstructured":"BuckhoutS FreyE NemeeJJr.Making ERP succeed: turning fear into promise. IEEE Engineering Management Review 1999 116\u2013123.","DOI":"10.1007\/978-3-662-09100-5_18"},{"key":"e_1_2_12_21_1","unstructured":"FalkowskiG PedigoP SmithB SwansonD.A recipe for ERP success. Beyond Computing 1998; 44\u201345."},{"key":"e_1_2_12_22_1","unstructured":"WeeS.Juggling toward ERP success: keep key success factors high. ERP News 2000.http:\/\/www.erpnews.com\/erpnews\/erp904\/02get.html"},{"key":"e_1_2_12_23_1","unstructured":"MurrayM CoffinG.A case study analysis of factors for success in ERP system implementations. Proceedings of the Seventh Americas Conference on Information Systems Boston 2001 1012\u20131018."},{"volume-title":"Resolving the ERP Security Headache: The Survival Guide","year":"2011","author":"Mahbouli H","key":"e_1_2_12_24_1"},{"volume-title":"Integrated Auditing of ERP Systems","year":"2002","author":"Mausaji YF","key":"e_1_2_12_25_1"},{"key":"e_1_2_12_26_1","first-page":"19","article-title":"Auditing governance in ERP projects","volume":"2","author":"Sayana SA","year":"2004","journal-title":"Information Systems Control Journal"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701401959"},{"key":"e_1_2_12_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2650"},{"key":"e_1_2_12_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1222"},{"key":"e_1_2_12_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2412"},{"key":"e_1_2_12_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2431"},{"key":"e_1_2_12_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2566"},{"issue":"1","key":"e_1_2_12_33_1","first-page":"28","article-title":"Critical success factors for ERP projects","volume":"24","author":"Wong B","year":"2004","journal-title":"Journal of the Australian Institute of Project Management"},{"volume-title":"Agile Software Development","year":"2001","author":"Cockburn A","key":"e_1_2_12_34_1"},{"key":"e_1_2_12_35_1","unstructured":"SomersTM NelsonK.The impact of critical success factors across the stages of enterprise resource planning implementations 34th Annual Hawaii International Conference on System Sciences (HICSS\u201034) Vol. 33. Issue 11 2001a pp 805\u2013812."},{"key":"e_1_2_12_36_1","unstructured":"SomersTM NelsonK.The impact of critical success factors across the stages of enterprise resource planning implementations 34th Annual Hawaii International Conference on System Sciences (HICSS\u201034) 2001b Vol. 33. Issue 11 pp 805\u2013812."},{"volume-title":"Reengineering the Corporation: A Manifesto for Business Revolution","year":"2001","author":"Hammer M","key":"e_1_2_12_37_1"},{"key":"e_1_2_12_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00023-5"},{"key":"e_1_2_12_39_1","doi-asserted-by":"crossref","unstructured":"HollandCR LightB.A critical success factor model for ERP implementation. IEEE Software 1999a.","DOI":"10.1109\/52.765784"},{"key":"e_1_2_12_40_1","doi-asserted-by":"crossref","unstructured":"HollandCR LightB.A critical success factor model for ERP implementation. IEEE Software 1999b.","DOI":"10.1109\/52.765784"},{"key":"e_1_2_12_41_1","unstructured":"GhoshS.Challenges on a global implementation of ERP software IEMC\u20102002 2001."},{"key":"e_1_2_12_42_1","unstructured":"KanaracusC.The 10 biggest ERP software failures of 2011.IDG news service 2011."},{"key":"e_1_2_12_43_1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1080\/08874417.2006.11645928","article-title":"Critical success factors for enterprise resource planning implementation and upgrade","volume":"47","author":"Nah F","year":"2006","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_2_12_44_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637150710752272"},{"key":"e_1_2_12_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/1097198X.2003.10856342"},{"volume-title":"Systems Analysis and Design Methods","year":"1998","author":"Whitten JL","key":"e_1_2_12_46_1"},{"key":"e_1_2_12_47_1","unstructured":"GloverSM et al.Implementing ERP Internal Auditor 1999 40\u201347."},{"key":"e_1_2_12_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570910991283"},{"key":"e_1_2_12_49_1","doi-asserted-by":"crossref","unstructured":"ReimersK.International examples of large\u2010scale systems\u2014theory and practice I: implementing ERP systems in China. Communications of the Association for Information Systems: Vol. 11 Article 20 2003.","DOI":"10.17705\/1CAIS.01120"},{"key":"e_1_2_12_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(02)00554-4"},{"key":"e_1_2_12_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/074391569101000111"},{"key":"e_1_2_12_52_1","doi-asserted-by":"crossref","unstructured":"SmithHJ MilbergSJ BurkeSJ.Information privacy: measuring individuals concerns about organizational practices. MIS Quarterly 1996 167\u2013196.","DOI":"10.2307\/249477"},{"volume-title":"Legislating Privacy: Technology, Social Values and Public Policy","year":"1995","author":"Regan PM","key":"e_1_2_12_53_1"},{"key":"e_1_2_12_54_1","doi-asserted-by":"crossref","unstructured":"KatsikasSK LopezJ PernulG.Privacy Privacy and Security in E\u2010Business: Requirements and Solutions. Lecture Notes in Computer Science 2005 548\u2013558.","DOI":"10.1007\/11573036_52"},{"key":"e_1_2_12_55_1","first-page":"349","article-title":"Privacy in organization: theoretical issues, research findings and protection mechanisms","volume":"8","author":"Stone EF","year":"1990","journal-title":"Research in Personal and Human Resource Management"},{"volume-title":"Privacy in America: Is your Private Life in Public Eye?","year":"1989","author":"Linowes David F","key":"e_1_2_12_56_1"},{"volume-title":"Dossier Society: Value Choices in the Design of National Information Systems","year":"1986","author":"Lauden KC","key":"e_1_2_12_57_1"},{"volume-title":"Computers and Privacy","year":"1982","author":"Miller A","key":"e_1_2_12_58_1"},{"volume-title":"An Introduction to Database Systems","year":"1986","author":"Date CJ","key":"e_1_2_12_59_1"},{"key":"e_1_2_12_60_1","doi-asserted-by":"crossref","unstructured":"MulazzaniF RussoB SucciG.ERP systems development: enhancing organization's strategic control through monitoring agents Computer and Information Science 2009b. ICIS 2009. Eighth IEEE\/ACIS International Conference on 1\u20103 June 2009","DOI":"10.1109\/ICIS.2009.143"},{"key":"e_1_2_12_61_1","doi-asserted-by":"crossref","unstructured":"GhoshS.IEEE Columbia MD USA Global implementation of ERP software\u2014critical success factors on upgrading technical infrastructure 2003.","DOI":"10.1109\/IEMC.2003.1252285"},{"key":"e_1_2_12_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2395"},{"volume-title":"Mission Critical: Realizing The Promise Of Enterprise Systems","year":"2000","author":"Davenport TH","key":"e_1_2_12_63_1"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.2839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.2839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T05:06:03Z","timestamp":1696568763000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.2839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,20]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,1,25]]}},"alternative-id":["10.1002\/dac.2839"],"URL":"https:\/\/doi.org\/10.1002\/dac.2839","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"type":"print","value":"1074-5351"},{"type":"electronic","value":"1099-1131"}],"subject":[],"published":{"date-parts":[[2014,11,20]]}}}