{"id":"https://openalex.org/W2047260733","doi":"https://doi.org/10.1108/09685220510602004","title":"System survivability: a critical security problem","display_name":"System survivability: a critical security problem","publication_year":2005,"publication_date":"2005-06-22","ids":{"openalex":"https://openalex.org/W2047260733","doi":"https://doi.org/10.1108/09685220510602004","mag":"2047260733"},"language":"en","primary_location":{"id":"doi:10.1108/09685220510602004","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220510602004","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/System_survivability_a_critical_security_problem/20539161","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047082701","display_name":"J. Redman","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"J. Redman","raw_affiliation_strings":["School of Information Systems, Deakin University, Geelong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084370797","display_name":"Matthew Warren","orcid":"https://orcid.org/0000-0002-7529-431X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"M. Warren","raw_affiliation_strings":["School of Information Systems, Deakin University, Geelong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108206949","display_name":"William Hutchinson","orcid":null},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"W. Hutchinson","raw_affiliation_strings":["School of Computer and Information Science, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Science, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047082701"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":4.2402,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.94399716,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"13","issue":"3","first_page":"182","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9375,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.8245133757591248},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5851069092750549},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5522235035896301},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.44126245379447937},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.33191168308258057},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15940886735916138}],"concepts":[{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.8245133757591248},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5851069092750549},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5522235035896301},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.44126245379447937},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33191168308258057},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15940886735916138}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1108/09685220510602004","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220510602004","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworks-4003","is_oa":false,"landing_page_url":"https://ro.ecu.edu.au/ecuworks/3004","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ECU Publications Pre. 2011","raw_type":"journalarticle"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30003251","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20539161","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/System_survivability_a_critical_security_problem/20539161","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20539161","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/System_survivability_a_critical_security_problem/20539161","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W78421519","https://openalex.org/W121011528","https://openalex.org/W153594749","https://openalex.org/W1614184547","https://openalex.org/W1966282711","https://openalex.org/W2095767682"],"related_works":["https://openalex.org/W2366754845","https://openalex.org/W205191581","https://openalex.org/W2163996062","https://openalex.org/W2995830239","https://openalex.org/W2377761643","https://openalex.org/W4242728933","https://openalex.org/W108998119","https://openalex.org/W2119047917","https://openalex.org/W3112590680","https://openalex.org/W4254172721"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,54,102],"This":[2],"paper":[3],"seeks":[4],"to":[5,74,97,119],"delve":[6],"into":[7],"the":[8,12,24,28,40,46,105],"concept":[9],"of":[10,14,30,42,50,56,83,87],"determining":[11,39],"survivability":[13,41,86],"critical":[15,43,88],"infrastructure":[16],"in":[17,38,64,78,108],"society,":[18],"especially":[19],"information\u2010based":[20],"networks.":[21],"Design/methodology/approach\u2013":[22],"Discusses":[23],"need":[25],"for":[26],"and":[27,48,67,76,124,128],"importance":[29],"an":[31],"analysis":[32],"language":[33],"called":[34],"EASEL,":[35],"which":[36],"aids":[37],"systems":[44,89,123],"through":[45],"use":[47],"creation":[49],"emergent":[51],"simulations.":[52],"Findings":[53],"Much":[55],"what":[57],"has":[58],"been":[59],"presented":[60],"here":[61],"is":[62,71,112],"still":[63,72],"its":[65],"conceptual":[66],"research":[68,81],"stage.":[69],"There":[70],"much":[73],"determine":[75],"define":[77],"this":[79,109],"new":[80],"discipline":[82],"survivability.":[84],"The":[85],"can":[90,116],"be":[91],"determined":[92],"by":[93],"utilizing":[94],"EASEL":[95],"simulations":[96],"describe":[98],"security":[99],"situations.":[100],"Originality/value":[101],"Armed":[103],"with":[104],"knowledge":[106],"gained":[107],"paper,":[110],"it":[111],"hoped":[113],"that":[114],"organizations":[115],"adopt":[117],"strategies":[118],"protect":[120],"their":[121],"information":[122],"make":[125],"them":[126],"resilient":[127],"survivable.":[129]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
