{"id":"https://openalex.org/W1851395062","doi":"https://doi.org/10.1007/978-3-642-34010-9_15","title":"Security of the Automatic Information On-Line: A Study of the Controls Forbid","display_name":"Security of the Automatic Information On-Line: A Study of the Controls Forbid","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1851395062","doi":"https://doi.org/10.1007/978-3-642-34010-9_15","mag":"1851395062"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-34010-9_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-34010-9_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070395815","display_name":"Francisco V. Cipolla Ficarra","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Francisco V. Cipolla Ficarra","raw_affiliation_strings":["HCI Lab. \u2013 F&F Multimedia Communic@tions Corp., AINCI: Asociaci\u00f3n Internacional de la Comunicaci\u00f3n Interactiva, via Tabajani, 1 \u2013 S. 15 \u2013 CP 7, 24121, Bergamo, Italy","HCI Lab. \u2013 F&F Multimedia Communic@tions Corp., ALAIPO: Asociaci\u00f3n Latina de Interacci\u00f3n Persona-Ordenador, c/ Angel Baixeras, 5 \u2013 AP 1638, 08080, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"HCI Lab. \u2013 F&F Multimedia Communic@tions Corp., AINCI: Asociaci\u00f3n Internacional de la Comunicaci\u00f3n Interactiva, via Tabajani, 1 \u2013 S. 15 \u2013 CP 7, 24121, Bergamo, Italy","institution_ids":[]},{"raw_affiliation_string":"HCI Lab. \u2013 F&F Multimedia Communic@tions Corp., ALAIPO: Asociaci\u00f3n Latina de Interacci\u00f3n Persona-Ordenador, c/ Angel Baixeras, 5 \u2013 AP 1638, 08080, Barcelona, Spain","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036873273","display_name":"Andreas Kratky","orcid":"https://orcid.org/0000-0002-3331-3447"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andreas Kratky","raw_affiliation_strings":["Interactive Media Division, University of Southern California, USA"],"affiliations":[{"raw_affiliation_string":"Interactive Media Division, University of Southern California, USA","institution_ids":["https://openalex.org/I1174212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070395815"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.8263,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.85103298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"151","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.8249976634979248},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8131833076477051},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6875027418136597},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.553894579410553},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5178720951080322},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49732521176338196},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.48331594467163086},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4254938066005707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41737261414527893},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.411947637796402},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3363940715789795},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.325044184923172},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29712629318237305},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.20154806971549988}],"concepts":[{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.8249976634979248},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8131833076477051},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6875027418136597},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.553894579410553},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5178720951080322},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49732521176338196},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.48331594467163086},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4254938066005707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41737261414527893},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.411947637796402},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3363940715789795},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.325044184923172},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29712629318237305},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.20154806971549988},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-34010-9_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-34010-9_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W91393489","https://openalex.org/W1525850206","https://openalex.org/W1526060834","https://openalex.org/W1606914505","https://openalex.org/W2018134621","https://openalex.org/W2050423462","https://openalex.org/W2061361563","https://openalex.org/W2071042936","https://openalex.org/W2113656477","https://openalex.org/W2134451882","https://openalex.org/W2162698364","https://openalex.org/W2272107715","https://openalex.org/W2883689738","https://openalex.org/W4253420085"],"related_works":["https://openalex.org/W2388687352","https://openalex.org/W2370187191","https://openalex.org/W1990162851","https://openalex.org/W2369854048","https://openalex.org/W2374291020","https://openalex.org/W2355907197","https://openalex.org/W3171042291","https://openalex.org/W2390961115","https://openalex.org/W2388138913","https://openalex.org/W2385288613"],"abstract_inverted_index":null,"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
