{"id":"https://openalex.org/W2803249698","doi":"https://doi.org/10.1016/s1353-4858(18)30042-4","title":"Making cyber-security a strategic business priority","display_name":"Making cyber-security a strategic business priority","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2803249698","doi":"https://doi.org/10.1016/s1353-4858(18)30042-4","mag":"2803249698"},"language":"en","primary_location":{"id":"doi:10.1016/s1353-4858(18)30042-4","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(18)30042-4","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110321290","display_name":"L Brown James","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lee James","raw_affiliation_strings":["Rackspace"],"affiliations":[{"raw_affiliation_string":"Rackspace","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5110321290"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1781,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84698842,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2018","issue":"5","first_page":"6","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9398999810218811,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9398999810218811,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5994722843170166},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5911256670951843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5607972145080566},{"id":"https://openalex.org/keywords/business-practice","display_name":"Business practice","score":0.48122596740722656},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.46115872263908386},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.39686596393585205},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3285325765609741},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.26245197653770447},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.24331533908843994},{"id":"https://openalex.org/keywords/business-administration","display_name":"Business administration","score":0.15443876385688782}],"concepts":[{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5994722843170166},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5911256670951843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5607972145080566},{"id":"https://openalex.org/C2994232177","wikidata":"https://www.wikidata.org/wiki/Q873451","display_name":"Business practice","level":2,"score":0.48122596740722656},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.46115872263908386},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.39686596393585205},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3285325765609741},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.26245197653770447},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24331533908843994},{"id":"https://openalex.org/C178550888","wikidata":"https://www.wikidata.org/wiki/Q2043282","display_name":"Business administration","level":1,"score":0.15443876385688782},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s1353-4858(18)30042-4","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(18)30042-4","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2730112582","https://openalex.org/W2358580169","https://openalex.org/W2111347279","https://openalex.org/W2110696645","https://openalex.org/W2487211728","https://openalex.org/W2378096925","https://openalex.org/W2625363013"],"abstract_inverted_index":{"Five":[0],"years":[1],"ago,":[2],"cyber-security":[3],"wasn't":[4],"something":[5],"you'd":[6],"necessarily":[7],"associate":[8],"with":[9,72],"daily":[10],"business":[11,73],"practice.":[12],"Lines":[13],"of":[14,61,104,138],"code":[15],"felt":[16],"meaningless":[17],"and":[18,39,75,128],"the":[19,78,89,102,114,124,130],"concept":[20],"itself":[21],"still":[22],"seemed":[23],"futuristic.":[24],"Most":[25],"companies":[26],"were":[27],"unwilling":[28],"to":[29,34,44,77,85,95,107],"overhaul":[30],"their":[31,105],"entire":[32],"strategies":[33],"combat":[35],"this":[36],"potential":[37],"threat,":[38],"an":[40],"\u2018it":[41],"won't":[42],"happen":[43],"me\u2019":[45],"attitude":[46],"was":[47],"commonplace.":[48],"No":[49],"longer":[50],"can":[51],"security":[52,67],"be":[53,70,108],"viewed":[54],"as":[55,109,111],"a":[56],"prohibited":[57],"silo":[58],"residing":[59],"outside":[60],"key":[62],"boardroom":[63],"discussions.":[64],"An":[65],"organisation's":[66],"strategy":[68,74],"must":[69,118],"aligned":[71],"integral":[76],"senior":[79],"leadership's":[80],"decision-making":[81],"process.":[82],"For":[83],"organisations":[84],"operate":[86],"safely":[87],"in":[88],"contemporary":[90],"threat":[91],"landscape,":[92],"they":[93,98,117,121],"need":[94],"make":[96],"sure":[97],"are":[99,122],"consistently":[100],"evaluating":[101],"effectiveness":[103],"defences":[106],"secure":[110],"possible.":[112],"At":[113],"same":[115],"time":[116],"ensure":[119],"that":[120],"utilising":[123],"most":[125],"modern":[126],"solutions":[127],"have":[129],"right":[131],"expertise":[132],"at":[133],"hand,":[134],"explains":[135],"Lee":[136],"James":[137],"Rackspace.":[139]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
