{"id":"https://openalex.org/W2002379385","doi":"https://doi.org/10.1016/0167-4048(91)90109-q","title":"Accessibility vs. security: A look at the demand for computer security","display_name":"Accessibility vs. security: A look at the demand for computer security","publication_year":1991,"publication_date":"1991-06-01","ids":{"openalex":"https://openalex.org/W2002379385","doi":"https://doi.org/10.1016/0167-4048(91)90109-q","mag":"2002379385"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(91)90109-q","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(91)90109-q","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042522261","display_name":"Gerald V. Post","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gerald V. Post","raw_affiliation_strings":["Department of Finance and MIS, Western Kentucky University, Bowling Green, KY 42101, U.S.A"],"affiliations":[{"raw_affiliation_string":"Department of Finance and MIS, Western Kentucky University, Bowling Green, KY 42101, U.S.A","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024106300","display_name":"Karen-Ann Kievit","orcid":null},"institutions":[{"id":"https://openalex.org/I35566140","display_name":"Loyola Marymount University","ror":"https://ror.org/00xhj8c72","country_code":"US","type":"education","lineage":["https://openalex.org/I35566140"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karen-Ann Kievit","raw_affiliation_strings":["Seaver Hall, Finance and CIS Department, College of Business Administration, Loyola Marymount University, Los Angeles, CA 90045, U.S.A","Seaver Hall, Finance and CIS Department, College of Business Administration, Loyola Marymount University, Los Angeles, CA 90045, U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Seaver Hall, Finance and CIS Department, College of Business Administration, Loyola Marymount University, Los Angeles, CA 90045, U.S.A","institution_ids":[]},{"raw_affiliation_string":"Seaver Hall, Finance and CIS Department, College of Business Administration, Loyola Marymount University, Los Angeles, CA 90045, U.S.A.#TAB#","institution_ids":["https://openalex.org/I35566140"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042522261"],"corresponding_institution_ids":[],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":3.3737,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.91913868,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"10","issue":"4","first_page":"331","last_page":"344"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/respondent","display_name":"Respondent","score":0.791413426399231},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7044216990470886},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6382997632026672},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5627890229225159},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5394518971443176},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.524699330329895},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4882090389728546},{"id":"https://openalex.org/keywords/security-system","display_name":"Security system","score":0.48601871728897095},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.46849164366722107},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4615161120891571},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.44094857573509216},{"id":"https://openalex.org/keywords/logical-security","display_name":"Logical security","score":0.4150370657444},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.41273564100265503},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3986368775367737},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.38545146584510803},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.2807554006576538},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09384134411811829},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06138619780540466}],"concepts":[{"id":"https://openalex.org/C2776640315","wikidata":"https://www.wikidata.org/wiki/Q7315941","display_name":"Respondent","level":2,"score":0.791413426399231},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7044216990470886},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6382997632026672},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5627890229225159},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5394518971443176},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.524699330329895},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4882090389728546},{"id":"https://openalex.org/C2984192347","wikidata":"https://www.wikidata.org/wiki/Q1497831","display_name":"Security system","level":2,"score":0.48601871728897095},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.46849164366722107},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4615161120891571},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.44094857573509216},{"id":"https://openalex.org/C178639896","wikidata":"https://www.wikidata.org/wiki/Q604035","display_name":"Logical security","level":5,"score":0.4150370657444},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.41273564100265503},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3986368775367737},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.38545146584510803},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2807554006576538},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09384134411811829},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06138619780540466},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/0167-4048(91)90109-q","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(91)90109-q","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W123568189","https://openalex.org/W308251696","https://openalex.org/W607764481","https://openalex.org/W1993091451","https://openalex.org/W2022041593","https://openalex.org/W2056632160","https://openalex.org/W2137620023","https://openalex.org/W2143049370","https://openalex.org/W2152505375","https://openalex.org/W2970970920","https://openalex.org/W2992117700","https://openalex.org/W4251300370","https://openalex.org/W6618618592","https://openalex.org/W6680228085","https://openalex.org/W6681191609","https://openalex.org/W6682897138"],"related_works":["https://openalex.org/W2165898552","https://openalex.org/W2290724697","https://openalex.org/W1811024770","https://openalex.org/W2108147409","https://openalex.org/W2018644264","https://openalex.org/W4230385779","https://openalex.org/W2384598124","https://openalex.org/W2553295645","https://openalex.org/W2359155699","https://openalex.org/W575472869"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
