{"id":"https://openalex.org/W4404124901","doi":"https://doi.org/10.1007/s10207-024-00910-3","title":"PROGRESS: the sectoral approach to cyber resilience","display_name":"PROGRESS: the sectoral approach to cyber resilience","publication_year":2024,"publication_date":"2024-11-07","ids":{"openalex":"https://openalex.org/W4404124901","doi":"https://doi.org/10.1007/s10207-024-00910-3"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-024-00910-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00910-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00910-3.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00910-3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030496467","display_name":"Lior Tabansky","orcid":"https://orcid.org/0000-0001-5198-233X"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Lior Tabansky","raw_affiliation_strings":["Blavatnik Interdisciplinary Cyber Research Center (ICRC), Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Blavatnik Interdisciplinary Cyber Research Center (ICRC), Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114548576","display_name":"Eynan Lichterman","orcid":null},"institutions":[{"id":"https://openalex.org/I157943965","display_name":"Holon Institute of Technology","ror":"https://ror.org/02prqh017","country_code":"IL","type":"education","lineage":["https://openalex.org/I157943965"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Eynan Lichterman","raw_affiliation_strings":["Liacom Systems Ltd, Holon, Israel"],"affiliations":[{"raw_affiliation_string":"Liacom Systems Ltd, Holon, Israel","institution_ids":["https://openalex.org/I157943965"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030496467"],"corresponding_institution_ids":["https://openalex.org/I16391192"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":1.4063,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8132048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"24","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.9666000008583069,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7667902708053589},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6918172836303711},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5216813087463379},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4986426830291748},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3305503726005554}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7667902708053589},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6918172836303711},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5216813087463379},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4986426830291748},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3305503726005554},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-024-00910-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00910-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00910-3.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-024-00910-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00910-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00910-3.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322596","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4404124901.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1968164782","https://openalex.org/W2005602095","https://openalex.org/W2008620264","https://openalex.org/W2113146118","https://openalex.org/W2138984667","https://openalex.org/W2155216551","https://openalex.org/W2277170616","https://openalex.org/W2314516685","https://openalex.org/W2341329701","https://openalex.org/W2766674048","https://openalex.org/W2885223044","https://openalex.org/W2901930902","https://openalex.org/W2912553045","https://openalex.org/W2956710227","https://openalex.org/W2996656423","https://openalex.org/W3045218883","https://openalex.org/W3091426098","https://openalex.org/W3117687755","https://openalex.org/W4200402620","https://openalex.org/W4235019172","https://openalex.org/W4237490897","https://openalex.org/W4390675566"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Abstract":[0],"Each":[1],"critical":[2],"infrastructure":[3],"and":[4,30,44,67,110,151,162,166,173],"vital":[5],"service":[6],"represents":[7],"a":[8,12,62,86,127],"unique":[9],"instance":[10],"of":[11,52,73,89,105,113,135,183,195],"complex":[13,18,106],"socio-technical\u2013economic":[14],"system.":[15],"Resilience":[16],"in":[17,39,122,126,170,177],"systems":[19],"is":[20,31,69],"an":[21],"emergent":[22],"behaviour":[23],"that":[24,190],"occurs":[25],"from":[26,35],"interactions":[27],"between":[28,65,157,175],"components":[29],"not":[32],"easily":[33],"predictable":[34],"understanding":[36],"each":[37],"component":[38],"isolation.":[40],"Yet,":[41],"cybersecurity":[42,108,178,201],"practice":[43],"maturity":[45,82,100],"models":[46],"still":[47],"focus":[48],"on":[49],"the":[50,71,79,103,133,136,146,171,184,193],"robustness":[51],"separate":[53],"components:":[54],"organizational":[55],"units,":[56],"firms,":[57],"or":[58],"IT":[59],"applications.":[60],"Such":[61],"fundamental":[63],"mismatch":[64],"theory":[66],"tools":[68],"among":[70,163],"causes":[72],"pervasive":[74],"cyber":[75,95,140],"insecurity.":[76],"We":[77],"introduce":[78],"sectoral":[80,137,185],"capability":[81],"model":[83,101,118],"to":[84,139],"enable":[85],"comprehensive":[87],"improvement":[88],"systemic":[90],"resilience.":[91],"The":[92,117,180],"promoting":[93],"global":[94],"resilience":[96,123,194],"for":[97,188],"sectors":[98],"cyber-capability":[99],"incorporates":[102],"science":[104],"systems,":[107],"frameworks,":[109],"two":[111],"decades":[112],"CIP":[114],"operations":[115],"experience.":[116],"was":[119],"successfully":[120],"applied":[121],"assessment":[124],"projects":[125],"dozen":[128],"countries.":[129],"Real-life":[130],"experience":[131],"emphasizes":[132],"benefits":[134],"approach":[138,186],"resilience:":[141],"creating":[142],"feedback":[143],"loops":[144],"within":[145],"sector,":[147],"integrating":[148],"supply":[149],"chain":[150],"third-party":[152],"risks,":[153],"facilitating":[154],"information":[155],"flows":[156],"stakeholders,":[158],"enabling":[159],"cooperation":[160],"with":[161],"ministries,":[164],"departments":[165],"other":[167],"authorities,":[168],"weighting":[169],"links":[172],"processes":[174],"actors":[176],"issues.":[179],"established":[181],"value":[182],"calls":[187],"applications":[189],"will":[191],"improve":[192],"essential":[196],"services":[197],"while":[198],"lowering":[199],"sector-wide":[200],"expenditures.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
