{"id":"https://openalex.org/W1538387577","doi":"https://doi.org/10.1007/978-3-8348-9283-6_33","title":"The need for the Protection of Critical National Infrastructures","display_name":"The need for the Protection of Critical National Infrastructures","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1538387577","doi":"https://doi.org/10.1007/978-3-8348-9283-6_33","mag":"1538387577"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_33","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_33","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057777295","display_name":"Fernando J. G\u00f3mez","orcid":"https://orcid.org/0000-0003-3037-9894"},"institutions":[{"id":"https://openalex.org/I2809107791","display_name":"Spanish National Centre for Cardiovascular Research","ror":"https://ror.org/02qs1a797","country_code":"ES","type":"facility","lineage":["https://openalex.org/I2809107791","https://openalex.org/I4210098440"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Fernando J. S\u00e1nchez G\u00f3mez","raw_affiliation_strings":["Spanish National Centre for the Protection of Critical Infrastructures (CNPIC), Spain","Spanish National Centre for the Protection of Critical Infrastructures (CNPIC)"],"affiliations":[{"raw_affiliation_string":"Spanish National Centre for the Protection of Critical Infrastructures (CNPIC), Spain","institution_ids":["https://openalex.org/I2809107791"]},{"raw_affiliation_string":"Spanish National Centre for the Protection of Critical Infrastructures (CNPIC)","institution_ids":["https://openalex.org/I2809107791"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029745992","display_name":"Miguel \u00c1ngel Abad Arranz","orcid":null},"institutions":[{"id":"https://openalex.org/I2809107791","display_name":"Spanish National Centre for Cardiovascular Research","ror":"https://ror.org/02qs1a797","country_code":"ES","type":"facility","lineage":["https://openalex.org/I2809107791","https://openalex.org/I4210098440"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Miguel \u00c1ngel Abad Arranz","raw_affiliation_strings":["Spanish National Centre for the Protection of Critical Infrastructures (CNPIC), Spain","Spanish National Centre for the Protection of Critical Infrastructures (CNPIC)"],"affiliations":[{"raw_affiliation_string":"Spanish National Centre for the Protection of Critical Infrastructures (CNPIC), Spain","institution_ids":["https://openalex.org/I2809107791"]},{"raw_affiliation_string":"Spanish National Centre for the Protection of Critical Infrastructures (CNPIC)","institution_ids":["https://openalex.org/I2809107791"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057777295"],"corresponding_institution_ids":["https://openalex.org/I2809107791"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07456332,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"313","last_page":"318"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10749","display_name":"International Law and Human Rights","score":0.9289000034332275,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7289183139801025},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.6778697967529297},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.6568164825439453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5634586811065674},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.560832679271698},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.55075603723526},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.5373783111572266},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5098416209220886},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.433654248714447},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.28085821866989136},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.25384944677352905},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1069345772266388}],"concepts":[{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7289183139801025},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.6778697967529297},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.6568164825439453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5634586811065674},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.560832679271698},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.55075603723526},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.5373783111572266},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5098416209220886},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.433654248714447},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.28085821866989136},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.25384944677352905},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1069345772266388},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_33","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_33","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3199529363","https://openalex.org/W4230475103","https://openalex.org/W2897362009","https://openalex.org/W2135039713","https://openalex.org/W1459477531","https://openalex.org/W87937509","https://openalex.org/W2113188272","https://openalex.org/W2075017812","https://openalex.org/W2023338215","https://openalex.org/W137843482"],"abstract_inverted_index":{"Currently,":[0],"the":[1,11,26,30,67,73,77,83,90,109,119,123,129,149,156,159,171,226,234,246,258],"concept":[2],"of":[3,5,10,32,43,50,69,75,79,85,98,101,111,113,144,158,161,174,178,212,238,250,260,277],"\u201cprotection":[4],"critical":[6,70],"infrastructures\u201d":[7],"is":[8,41,264],"one":[9,219],"most":[12],"important":[13],"aspects":[14],"that":[15,65,146,216],"should":[16],"be":[17,104,203],"taken":[18],"into":[19,140],"account":[20,141],"by":[21,88,181,242],"all":[22,44,58],"countries.":[23],"In":[24,126],"Spain,":[25],"National":[27],"Centre":[28],"for":[29,245],"Protection":[31],"Critical":[33],"Infrastructures":[34],"(CNPIC)":[35],"has":[36],"been":[37],"recently":[38],"created,":[39],"which":[40],"responsible":[42,244],"tasks":[45,262],"related":[46],"to":[47,202,205],"this":[48,99,127,275],"type":[49,100,143,276],"protection.":[51],"It":[52],"was":[53],"established":[54],"in":[55,151,200,210,265,274],"accordance":[56],"with":[57,72,188,267],"national":[59,80,172,196,222,251],"and":[60,63,82,197,236,263],"international":[61,198,253],"laws":[62],"regulations":[64],"recommend":[66],"assessment":[68,157],"infrastructures,":[71],"aim":[74],"improving":[76],"security":[78],"infrastructures":[81,102,150],"interests":[84],"Spain":[86],"abroad":[87],"establishing":[89],"existing":[91],"interdependencies":[92],"between":[93],"different":[94,268],"infrastructures.":[95,224,247],"The":[96,176,248],"protection":[97,179],"must":[103,228],"addressed":[105],"not":[106],"only":[107],"from":[108,118,170],"point":[110,173],"view":[112,211],"physical":[114],"security,":[115,240],"but":[116],"also":[117],"logic":[120],"framed":[121],"within":[122,230],"ICT":[124],"sector.":[125],"way,":[128],"CNPIC":[130,227],"permanently":[131],"performs":[132],"risk":[133],"analyses":[134],"at":[135,194],"a":[136,185,195,207],"sectorial":[137],"level,":[138,199],"taking":[139],"each":[142,162,182],"threat":[145],"can":[147],"affect":[148,218],"process.":[152],"This":[153],"analysis":[154],"provides":[155],"criticality":[160],"infrastructure,":[163],"as":[164,166],"well":[165],"its":[167,231],"logical":[168],"prioritisation":[169],"view.":[175],"level":[177],"required":[180],"infrastructure":[183],"demands":[184],"smooth":[186],"communication":[187],"other":[189],"agencies":[190],"or":[191,220,252],"bodies,":[192],"both":[193],"order":[201],"able":[204],"process":[206],"coordinated":[208],"response":[209],"any":[213],"potential":[214],"attack":[215],"may":[217],"various":[221],"strategic":[223],"However,":[225],"act":[229],"responsibilities":[232],"regarding":[233],"support":[235],"coordination":[237],"basic":[239],"applied":[241],"those":[243],"existence":[249],"alert":[254],"networks":[255],"contributes":[256],"towards":[257],"development":[259],"these":[261],"line":[266],"European":[269],"projects,":[270],"whose":[271],"purpose":[272],"lies":[273],"communication.":[278]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
