{"id":"https://openalex.org/W4413136448","doi":"https://doi.org/10.1016/j.cose.2025.104617","title":"Guiding cybersecurity compliance: An ontology for the NIS 2 directive","display_name":"Guiding cybersecurity compliance: An ontology for the NIS 2 directive","publication_year":2025,"publication_date":"2025-08-08","ids":{"openalex":"https://openalex.org/W4413136448","doi":"https://doi.org/10.1016/j.cose.2025.104617"},"language":"en","primary_location":{"id":"doi:10.1016/j.cose.2025.104617","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2025.104617","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.cose.2025.104617","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102803577","display_name":"Gianpietro Castiglione","orcid":"https://orcid.org/0000-0003-2215-0416"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Gianpietro Castiglione","raw_affiliation_strings":["University of Catania, Catania, Italy"],"raw_orcid":"https://orcid.org/0000-0003-2215-0416","affiliations":[{"raw_affiliation_string":"University of Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012973308","display_name":"Daniele Francesco Santamaria","orcid":null},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Daniele Francesco Santamaria","raw_affiliation_strings":["University of Catania, Catania, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051511023","display_name":"Giampaolo Bella","orcid":"https://orcid.org/0000-0002-7615-8643"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giampaolo Bella","raw_affiliation_strings":["University of Catania, Catania, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119279958","display_name":"Laura Brisindi","orcid":null},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Laura Brisindi","raw_affiliation_strings":["University of Catania, Catania, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5119279959","display_name":"Gaetano Puccia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096868","display_name":"University of Ragusa","ror":"https://ror.org/00sxtta05","country_code":"IT","type":"education","lineage":["https://openalex.org/I4210096868"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gaetano Puccia","raw_affiliation_strings":["Intrapresa S.r.l., Ragusa, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Intrapresa S.r.l., Ragusa, Italy","institution_ids":["https://openalex.org/I4210096868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102803577"],"corresponding_institution_ids":["https://openalex.org/I39063666"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":{"value":3190,"currency":"USD","value_usd":3190},"fwci":8.7153,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97514053,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"157","issue":null,"first_page":"104617","last_page":"104617"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/directive","display_name":"Directive","score":0.8134239912033081},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.7880046367645264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7149869203567505},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5964815616607666},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5378488898277283}],"concepts":[{"id":"https://openalex.org/C2779547435","wikidata":"https://www.wikidata.org/wiki/Q1121492","display_name":"Directive","level":2,"score":0.8134239912033081},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.7880046367645264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7149869203567505},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5964815616607666},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5378488898277283},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.cose.2025.104617","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2025.104617","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.cose.2025.104617","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2025.104617","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1568922413","https://openalex.org/W2181264476","https://openalex.org/W2261812172","https://openalex.org/W2802093198","https://openalex.org/W2901569074","https://openalex.org/W3013227509","https://openalex.org/W3035080891","https://openalex.org/W4230575913","https://openalex.org/W4240004587","https://openalex.org/W4244301268","https://openalex.org/W4248502591","https://openalex.org/W4281641410","https://openalex.org/W4299626558","https://openalex.org/W4301000019","https://openalex.org/W4365141738","https://openalex.org/W4379985839","https://openalex.org/W4380534756","https://openalex.org/W4383046811","https://openalex.org/W4397048909","https://openalex.org/W4403501116","https://openalex.org/W6606441458","https://openalex.org/W6661564250","https://openalex.org/W6666317856","https://openalex.org/W6697181044","https://openalex.org/W6712382845","https://openalex.org/W6729380768","https://openalex.org/W6729967441","https://openalex.org/W6743674378","https://openalex.org/W6751320450","https://openalex.org/W6753777322","https://openalex.org/W6776544332","https://openalex.org/W6838177422","https://openalex.org/W6853271288","https://openalex.org/W6853459029","https://openalex.org/W6854779005","https://openalex.org/W6866705011"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3033520411","https://openalex.org/W4213457160","https://openalex.org/W2322198081","https://openalex.org/W287724341","https://openalex.org/W3163699091","https://openalex.org/W2539947270","https://openalex.org/W2029349818"],"abstract_inverted_index":{"Security":[0,69],"compliance":[1,50,112],"constitutes":[2],"a":[3,44,130,177],"significant":[4],"source":[5],"of":[6,28,87,100,141,151,166],"concern":[7],"for":[8,169],"many":[9],"corporate":[10],"decision-makers":[11],"due":[12],"to":[13,25,35,63,80,134,182],"its":[14],"complexity":[15],"and":[16,23,46,67,84,92,106,117,126,138,179],"cost.":[17],"These":[18],"may":[19],"be":[20],"due,":[21],"first":[22],"foremost,":[24],"the":[26,49,65,97,101,136,148,164],"style":[27],"juridical":[29],"language,":[30],"which":[31],"is":[32],"often":[33],"challenging":[34],"translate":[36,64],"into":[37,75],"concrete":[38],"operational":[39],"procedures.":[40],"To":[41],"facilitate":[42],"such":[43],"translation":[45],"ultimately":[47],"optimise":[48],"effort,":[51],"this":[52],"article":[53],"presents":[54],"\u201cNIS2Onto\u201d,":[55],"an":[56,76],"Web":[57],"Ontology":[58],"Language":[59],"(OWL)":[60],"ontology":[61,144],"designed":[62],"Network":[66],"Information":[68],"Directive":[70],"version":[71],"2":[72,103],"(NIS":[73],"2)":[74],"ontological":[77],"format":[78],"aimed":[79],"favour":[81],"unambiguous":[82],"understanding":[83],"security":[85,107],"operations":[86],"cybersecurity":[88,161,183],"professionals,":[89],"legal":[90,153],"experts,":[91],"all":[93],"organisational":[94],"stakeholders.":[95],"Through":[96],"semantic":[98],"representation":[99],"NIS":[102],"entities,":[104],"relationships,":[105],"measures,":[108],"NIS2Onto":[109,167],"enables":[110],"automated":[111],"verification,":[113],"streamlined":[114],"risk":[115],"assessments,":[116],"effective":[118],"policy":[119],"implementation.":[120],"Our":[121],"evaluation":[122],"employs":[123],"both":[124],"metrical":[125],"qualitative":[127],"analysis":[128],"through":[129],"real":[131],"case":[132],"study":[133],"witness":[135],"robustness":[137],"practical":[139],"applicability":[140],"NIS2Onto.":[142],"The":[143],"not":[145],"only":[146],"supports":[147],"accurate":[149],"interpretation":[150],"complex":[152],"texts":[154],"but":[155],"also":[156],"aids":[157],"in":[158],"systematically":[159],"enforcing":[160],"measures.":[162],"Furthermore,":[163],"extensibility":[165],"allows":[168],"integration":[170],"with":[171],"other":[172],"regulatory":[173],"frameworks,":[174],"thereby":[175],"fostering":[176],"comprehensive":[178],"unified":[180],"approach":[181],"governance.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-02-03T00:53:05.648605","created_date":"2025-10-10T00:00:00"}
