{"id":"https://openalex.org/W4226403573","doi":"https://doi.org/10.1093/cybsec/tyac003","title":"Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure","display_name":"Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4226403573","doi":"https://doi.org/10.1093/cybsec/tyac003"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyac003","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac003","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac003/47918912/tyac003.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac003/47918912/tyac003.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022899819","display_name":"Yuxuan Zhang","orcid":"https://orcid.org/0000-0002-0073-3437"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Yuxuan (Cicilia) Zhang","raw_affiliation_strings":["International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada"],"affiliations":[{"raw_affiliation_string":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada","institution_ids":["https://openalex.org/I18014758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030367930","display_name":"Richard Frank","orcid":"https://orcid.org/0000-0003-4382-1039"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Richard Frank","raw_affiliation_strings":["International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada"],"affiliations":[{"raw_affiliation_string":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada","institution_ids":["https://openalex.org/I18014758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036298542","display_name":"Noelle Warkentin","orcid":"https://orcid.org/0000-0002-0522-6506"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Noelle Warkentin","raw_affiliation_strings":["International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada"],"affiliations":[{"raw_affiliation_string":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada","institution_ids":["https://openalex.org/I18014758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024385871","display_name":"Naomi Zakimi","orcid":"https://orcid.org/0000-0003-3582-3261"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Naomi Zakimi","raw_affiliation_strings":["International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada"],"affiliations":[{"raw_affiliation_string":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University , 8888 University Drive, Burnaby, BC, V5A 1S6, Canada","institution_ids":["https://openalex.org/I18014758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022899819"],"corresponding_institution_ids":["https://openalex.org/I18014758"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":2.122,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.89446569,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.85506272315979},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6672476530075073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6583359837532043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5914658308029175},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5562002062797546},{"id":"https://openalex.org/keywords/thematic-analysis","display_name":"Thematic analysis","score":0.4923509359359741},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.47349151968955994},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4373806118965149},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4236375689506531},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3658287525177002},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.15515118837356567}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.85506272315979},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6672476530075073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6583359837532043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5914658308029175},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5562002062797546},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.4923509359359741},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.47349151968955994},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4373806118965149},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4236375689506531},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3658287525177002},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.15515118837356567},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyac003","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac003","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac003/47918912/tyac003.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:summit.sfu.ca:22472","is_oa":true,"landing_page_url":"http://summit.sfu.ca/item/22472","pdf_url":null,"source":{"id":"https://openalex.org/S4306400490","display_name":"Summit (Simon Fraser University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I18014758","host_organization_name":"Simon Fraser University","host_organization_lineage":["https://openalex.org/I18014758"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyac003","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac003","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac003/47918912/tyac003.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6200000047683716}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334620","display_name":"Natural Resources Canada","ror":"https://ror.org/05hepy730"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4226403573.pdf","grobid_xml":"https://content.openalex.org/works/W4226403573.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W305188959","https://openalex.org/W1667368742","https://openalex.org/W1983442091","https://openalex.org/W2013779715","https://openalex.org/W2018270682","https://openalex.org/W2060479059","https://openalex.org/W2094741359","https://openalex.org/W2097151841","https://openalex.org/W2129552973","https://openalex.org/W2137105166","https://openalex.org/W2335888457","https://openalex.org/W2561197570","https://openalex.org/W2563320891","https://openalex.org/W2737837745","https://openalex.org/W2742131967","https://openalex.org/W2782101021","https://openalex.org/W2789823311","https://openalex.org/W2790062073","https://openalex.org/W2794376943","https://openalex.org/W2808266100","https://openalex.org/W2883094363","https://openalex.org/W2912641888","https://openalex.org/W2914724518","https://openalex.org/W2947868256","https://openalex.org/W2967229930","https://openalex.org/W2972568755","https://openalex.org/W3000208506","https://openalex.org/W3011182217","https://openalex.org/W3019791958","https://openalex.org/W3165990123","https://openalex.org/W3213653057","https://openalex.org/W4239319433","https://openalex.org/W6753125379","https://openalex.org/W6766699307"],"related_works":["https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W3005543248","https://openalex.org/W4320802206","https://openalex.org/W2912641888","https://openalex.org/W2460691332","https://openalex.org/W2943610928","https://openalex.org/W3119634295","https://openalex.org/W4366290225","https://openalex.org/W3191735619"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"order":[2],"to":[3,23,27,34,38,84,100,135,143,159,163,170,230],"efficiently":[4],"manage":[5],"and":[6,16,30,40,61,67,70,86,108,121,128,132,196,227,232,236],"operate":[7],"industrial-level":[8],"production,":[9],"an":[10,206],"increasing":[11,207],"number":[12],"of":[13,46,79,90,155,167,182,209],"industrial":[14,217,234],"devices":[15],"critical":[17],"infrastructure":[18],"(CI)":[19],"are":[20,94],"now":[21],"connected":[22],"the":[24,43,80,88,104,151,222],"internet,":[25],"exposed":[26],"malicious":[28,97,171,184,214],"hackers":[29,64],"cyberterrorists":[31],"who":[32],"aim":[33],"cause":[35],"significant":[36],"damage":[37],"institutions":[39],"countries.":[41],"Throughout":[42],"various":[44,57],"stages":[45],"a":[47],"cyber-attack,":[48],"Open-source":[49],"Intelligence":[50],"(OSINT)":[51],"tools":[52],"could":[53,140,186],"gather":[54],"data":[55,92,183],"from":[56,150,202],"publicly":[58],"available":[59],"platforms,":[60],"thus":[62],"help":[63],"identify":[65,87],"vulnerabilities":[66],"develop":[68],"malware":[69],"attack":[71],"strategies":[72],"against":[73,103,216],"targeted":[74],"CI":[75,105,137,168],"sectors.":[76],"The":[77,199],"purpose":[78],"current":[81],"study":[82,204],"is":[83],"explore":[85],"types":[89,181],"OSINT":[91,189],"that":[93,139],"useful":[95,142,212],"for":[96,213,224],"individuals":[98],"intending":[99],"conduct":[101],"cyber-attacks":[102],"industry.":[106],"Applying":[107],"searching":[109],"keyword":[110],"queries":[111],"in":[112],"four":[113],"open-source":[114,152,210],"surface":[115],"web":[116],"platforms":[117],"(Google,":[118],"YouTube,":[119],"Reddit,":[120],"Shodan),":[122],"search":[123],"results":[124,147,201],"published":[125],"between":[126],"2015":[127],"2020":[129],"were":[130,148,157],"reviewed":[131],"qualitatively":[133],"analyzed":[134,149],"categorize":[136],"information":[138,161,211],"be":[141],"hackers.":[144],"Over":[145],"4000":[146],"websites,":[153],"250":[154],"which":[156],"found":[158],"provide":[160],"related":[162],"hacking":[164],"and/or":[165],"cybersecurity":[166],"facilities":[169],"actors.":[172],"Using":[173],"thematic":[174,200],"content":[175],"analysis,":[176],"we":[177],"identified":[178],"three":[179],"major":[180],"attackers":[185,215],"retrieve":[187],"using":[188],"tools:":[190],"indirect":[191],"reconnaissance":[192],"data,":[193],"proof-of-concept":[194],"codes,":[195],"educational":[197],"materials.":[198],"this":[203],"reveal":[205],"amount":[208],"devices,":[218],"as":[219,221],"well":[220],"need":[223],"programs,":[225],"training,":[226],"policies":[228],"required":[229],"protect":[231],"secure":[233],"systems":[235],"CI.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
