{"id":"https://openalex.org/W82146083","doi":"https://doi.org/10.1007/978-3-642-29752-6_24","title":"Evaluating Information Security Effectiveness with Health Professionals","display_name":"Evaluating Information Security Effectiveness with Health Professionals","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W82146083","doi":"https://doi.org/10.1007/978-3-642-29752-6_24","mag":"82146083"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-29752-6_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29752-6_24","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010676615","display_name":"Robin Krens","orcid":null},"institutions":[{"id":"https://openalex.org/I2802164966","display_name":"University Hospital Heidelberg","ror":"https://ror.org/013czdx64","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I2802164966"]},{"id":"https://openalex.org/I3018483916","display_name":"University Medical Center Utrecht","ror":"https://ror.org/0575yy874","country_code":"NL","type":"funder","lineage":["https://openalex.org/I3018483916"]},{"id":"https://openalex.org/I223822909","display_name":"Heidelberg University","ror":"https://ror.org/038t36y30","country_code":"DE","type":"education","lineage":["https://openalex.org/I223822909"]}],"countries":["DE","NL"],"is_corresponding":true,"raw_author_name":"Robin Krens","raw_affiliation_strings":["University Medical Center Utrecht, Heidelberglaan 100, Utrecht, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University Medical Center Utrecht, Heidelberglaan 100, Utrecht, The Netherlands","institution_ids":["https://openalex.org/I3018483916","https://openalex.org/I223822909","https://openalex.org/I2802164966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033880574","display_name":"Marco Spruit","orcid":"https://orcid.org/0000-0002-9237-221X"},"institutions":[{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Marco Spruit","raw_affiliation_strings":["Department of Information and Computing Science, Utrecht University, Padualaan 8, Utrecht, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Information and Computing Science, Utrecht University, Padualaan 8, Utrecht, The Netherlands","institution_ids":["https://openalex.org/I193662353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084863456","display_name":"Nathalie Urbanus","orcid":null},"institutions":[{"id":"https://openalex.org/I2802164966","display_name":"University Hospital Heidelberg","ror":"https://ror.org/013czdx64","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I2802164966"]},{"id":"https://openalex.org/I3018483916","display_name":"University Medical Center Utrecht","ror":"https://ror.org/0575yy874","country_code":"NL","type":"funder","lineage":["https://openalex.org/I3018483916"]},{"id":"https://openalex.org/I223822909","display_name":"Heidelberg University","ror":"https://ror.org/038t36y30","country_code":"DE","type":"education","lineage":["https://openalex.org/I223822909"]}],"countries":["DE","NL"],"is_corresponding":false,"raw_author_name":"Nathalie Urbanus","raw_affiliation_strings":["University Medical Center Utrecht, Heidelberglaan 100, Utrecht, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University Medical Center Utrecht, Heidelberglaan 100, Utrecht, The Netherlands","institution_ids":["https://openalex.org/I3018483916","https://openalex.org/I223822909","https://openalex.org/I2802164966"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010676615"],"corresponding_institution_ids":["https://openalex.org/I223822909","https://openalex.org/I2802164966","https://openalex.org/I3018483916"],"apc_list":null,"apc_paid":null,"fwci":1.1335,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77004219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"324","last_page":"334"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.960099995136261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.652924656867981},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6393225193023682},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.4816916882991791},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4745928943157196},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4509711265563965},{"id":"https://openalex.org/keywords/health-information","display_name":"Health information","score":0.4508027732372284},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.44320595264434814},{"id":"https://openalex.org/keywords/health-professionals","display_name":"Health professionals","score":0.42779541015625},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.41181179881095886},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4063990116119385},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.3524816632270813},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.3216884434223175},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.28525587916374207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23894155025482178},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.23388418555259705},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2094835638999939},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1872863471508026},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.176974356174469},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1508692502975464},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.134405255317688}],"concepts":[{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.652924656867981},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6393225193023682},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.4816916882991791},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4745928943157196},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4509711265563965},{"id":"https://openalex.org/C2982795734","wikidata":"https://www.wikidata.org/wiki/Q870895","display_name":"Health information","level":3,"score":0.4508027732372284},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.44320595264434814},{"id":"https://openalex.org/C3019806175","wikidata":"https://www.wikidata.org/wiki/Q11974939","display_name":"Health professionals","level":3,"score":0.42779541015625},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.41181179881095886},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4063990116119385},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3524816632270813},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.3216884434223175},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.28525587916374207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23894155025482178},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.23388418555259705},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2094835638999939},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1872863471508026},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.176974356174469},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1508692502975464},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.134405255317688},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-29752-6_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29752-6_24","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W137244522","https://openalex.org/W220935706","https://openalex.org/W1592063330","https://openalex.org/W1980898305","https://openalex.org/W1982847337","https://openalex.org/W1997603734","https://openalex.org/W2001231576","https://openalex.org/W2007447113","https://openalex.org/W2037104605","https://openalex.org/W2067978381","https://openalex.org/W2068122451","https://openalex.org/W2088428304","https://openalex.org/W2106693206","https://openalex.org/W2117776331","https://openalex.org/W2136451344","https://openalex.org/W3135559746","https://openalex.org/W3151685851","https://openalex.org/W3200788958","https://openalex.org/W4238720167"],"related_works":["https://openalex.org/W2126017555","https://openalex.org/W40842196","https://openalex.org/W2049188895","https://openalex.org/W2584162156","https://openalex.org/W1567258312","https://openalex.org/W2000891179","https://openalex.org/W3005750480","https://openalex.org/W2188290711","https://openalex.org/W2741061559","https://openalex.org/W2010781006"],"abstract_inverted_index":null,"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
