{"id":"https://openalex.org/W2801752116","doi":"https://doi.org/10.1007/978-3-319-78816-6_16","title":"Situational Crime Prevention and the Mitigation of Cloud Computing Threats","display_name":"Situational Crime Prevention and the Mitigation of Cloud Computing Threats","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2801752116","doi":"https://doi.org/10.1007/978-3-319-78816-6_16","mag":"2801752116"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-78816-6_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-78816-6_16","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006568408","display_name":"Chaz Vidal","orcid":null},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chaz Vidal","raw_affiliation_strings":["School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, 5095, Australia","School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, 5095, Australia","institution_ids":["https://openalex.org/I170239107"]},{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]},{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU","US"],"is_corresponding":true,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, 78249-0631, USA","School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, 5095, Australia","School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, 78249-0631, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, 5095, Australia","institution_ids":["https://openalex.org/I170239107"]},{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, Australia","institution_ids":["https://openalex.org/I170239107"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001746807"],"corresponding_institution_ids":["https://openalex.org/I170239107","https://openalex.org/I45438204"],"apc_list":null,"apc_paid":null,"fwci":2.3671,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88485487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"218","last_page":"233"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8521518707275391},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7234643697738647},{"id":"https://openalex.org/keywords/situational-ethics","display_name":"Situational ethics","score":0.7142137885093689},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6925172805786133},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6277898550033569},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5960678458213806},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5847867131233215},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5547340512275696},{"id":"https://openalex.org/keywords/crime-prevention","display_name":"Crime prevention","score":0.5459075570106506},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5174053907394409},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4573492407798767},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.12641292810440063},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.12131083011627197}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8521518707275391},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7234643697738647},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.7142137885093689},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6925172805786133},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6277898550033569},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5960678458213806},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5847867131233215},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5547340512275696},{"id":"https://openalex.org/C2776348852","wikidata":"https://www.wikidata.org/wiki/Q855848","display_name":"Crime prevention","level":2,"score":0.5459075570106506},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5174053907394409},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4573492407798767},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12641292810440063},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.12131083011627197},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-78816-6_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-78816-6_16","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W177166538","https://openalex.org/W416981147","https://openalex.org/W561172101","https://openalex.org/W828137986","https://openalex.org/W1551332082","https://openalex.org/W1580178922","https://openalex.org/W1595201491","https://openalex.org/W1808013424","https://openalex.org/W1974961651","https://openalex.org/W1975009369","https://openalex.org/W1995834538","https://openalex.org/W2011353876","https://openalex.org/W2015410758","https://openalex.org/W2026328911","https://openalex.org/W2033050620","https://openalex.org/W2040806443","https://openalex.org/W2047322484","https://openalex.org/W2047701443","https://openalex.org/W2051046095","https://openalex.org/W2070648774","https://openalex.org/W2071185162","https://openalex.org/W2071360859","https://openalex.org/W2074075677","https://openalex.org/W2074786708","https://openalex.org/W2075720570","https://openalex.org/W2082134125","https://openalex.org/W2095806503","https://openalex.org/W2105686707","https://openalex.org/W2121377134","https://openalex.org/W2140677219","https://openalex.org/W2155252714","https://openalex.org/W2161881360","https://openalex.org/W2169466806","https://openalex.org/W2181459745","https://openalex.org/W2250961013","https://openalex.org/W2275530856","https://openalex.org/W2299450638","https://openalex.org/W2406290104","https://openalex.org/W2464420692","https://openalex.org/W2507351359","https://openalex.org/W2507568508","https://openalex.org/W2564835063","https://openalex.org/W2610641682","https://openalex.org/W2618202244","https://openalex.org/W2727141405","https://openalex.org/W2793540135","https://openalex.org/W3117841149","https://openalex.org/W3121410516","https://openalex.org/W4237096239","https://openalex.org/W4253562044","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2385984763","https://openalex.org/W2736004278","https://openalex.org/W2102121228","https://openalex.org/W3207435812","https://openalex.org/W2381554576","https://openalex.org/W2888258457","https://openalex.org/W4234247506","https://openalex.org/W2097370168","https://openalex.org/W2062458914","https://openalex.org/W2888735694"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
