{"id":"https://openalex.org/W3174670271","doi":"https://doi.org/10.1108/ics-02-2020-0027","title":"A collaborative approach for national cybersecurity incident management","display_name":"A collaborative approach for national cybersecurity incident management","publication_year":2021,"publication_date":"2021-06-25","ids":{"openalex":"https://openalex.org/W3174670271","doi":"https://doi.org/10.1108/ics-02-2020-0027","mag":"3174670271"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2020-0027","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2020-0027","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017948684","display_name":"Oluwafemi Oriola","orcid":"https://orcid.org/0000-0003-0255-6160"},"institutions":[{"id":"https://openalex.org/I26999989","display_name":"University of the Free State","ror":"https://ror.org/009xwd568","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26999989"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Oluwafemi Oriola","raw_affiliation_strings":["Department of Computer Science and Informatics, University of the Free State, Bloemfontein, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Informatics, University of the Free State, Bloemfontein, South Africa","institution_ids":["https://openalex.org/I26999989"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113704293","display_name":"Adesesan B. Adeyemo","orcid":null},"institutions":[{"id":"https://openalex.org/I181631907","display_name":"University of Ibadan","ror":"https://ror.org/03wx2rr30","country_code":"NG","type":"education","lineage":["https://openalex.org/I181631907"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Adesesan Barnabas Adeyemo","raw_affiliation_strings":["Department of Computer Science, University of Ibadan, Ibadan, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Ibadan, Ibadan, Nigeria","institution_ids":["https://openalex.org/I181631907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021254494","display_name":"Maria Papadaki","orcid":"https://orcid.org/0000-0003-0817-2651"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maria Papadaki","raw_affiliation_strings":["Centre for Security, Communications and Networks, Plymouth University, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Security, Communications and Networks, Plymouth University, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024659623","display_name":"Eduan Kotz\u00e9","orcid":"https://orcid.org/0000-0002-5572-4319"},"institutions":[{"id":"https://openalex.org/I26999989","display_name":"University of the Free State","ror":"https://ror.org/009xwd568","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26999989"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Eduan Kotz\u00e9","raw_affiliation_strings":["Department of Computer Science and Informatics, University of the Free State, Bloemfontein, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Informatics, University of the Free State, Bloemfontein, South Africa","institution_ids":["https://openalex.org/I26999989"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017948684"],"corresponding_institution_ids":["https://openalex.org/I26999989"],"apc_list":null,"apc_paid":null,"fwci":1.987,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.88902155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"29","issue":"3","first_page":"457","last_page":"484"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incident-management","display_name":"Incident management","score":0.9237868785858154},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.9117999076843262},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6402047276496887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5497777462005615},{"id":"https://openalex.org/keywords/incident-report","display_name":"Incident report","score":0.5107643604278564},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.49698570370674133}],"concepts":[{"id":"https://openalex.org/C2780952636","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident management","level":2,"score":0.9237868785858154},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.9117999076843262},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6402047276496887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5497777462005615},{"id":"https://openalex.org/C2909164965","wikidata":"https://www.wikidata.org/wiki/Q6014597","display_name":"Incident report","level":2,"score":0.5107643604278564},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.49698570370674133},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/ics-02-2020-0027","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2020-0027","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:derby.openrepository.com:10545/625883","is_oa":false,"landing_page_url":"http://hdl.handle.net/10545/625883","pdf_url":null,"source":{"id":"https://openalex.org/S4306402138","display_name":"University of Derby Online Research Archive. (University of Derby)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I22128151","host_organization_name":"University of Derby","host_organization_lineage":["https://openalex.org/I22128151"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information &amp; Computer Security","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W38991701","https://openalex.org/W1024175129","https://openalex.org/W1537328738","https://openalex.org/W1549716092","https://openalex.org/W1646865657","https://openalex.org/W1963615444","https://openalex.org/W2017948180","https://openalex.org/W2092642267","https://openalex.org/W2101234009","https://openalex.org/W2108072891","https://openalex.org/W2111142701","https://openalex.org/W2119972750","https://openalex.org/W2131084676","https://openalex.org/W2136561182","https://openalex.org/W2137430899","https://openalex.org/W2142175015","https://openalex.org/W2157861429","https://openalex.org/W2170810185","https://openalex.org/W2186012532","https://openalex.org/W2287317733","https://openalex.org/W2298668407","https://openalex.org/W2316686487","https://openalex.org/W2328026294","https://openalex.org/W2396324716","https://openalex.org/W2397657997","https://openalex.org/W2414339927","https://openalex.org/W2529082006","https://openalex.org/W2771251662","https://openalex.org/W2784241349","https://openalex.org/W2890149277","https://openalex.org/W3029684234","https://openalex.org/W4234388477","https://openalex.org/W4248198585","https://openalex.org/W6601261378","https://openalex.org/W6633324877"],"related_works":["https://openalex.org/W3204723561","https://openalex.org/W3199928954","https://openalex.org/W4236345345","https://openalex.org/W4251008024","https://openalex.org/W612990953","https://openalex.org/W1991606108","https://openalex.org/W2088796177","https://openalex.org/W4206206623","https://openalex.org/W3022724426","https://openalex.org/W1561922874"],"abstract_inverted_index":{"Purpose":[0],"Collaborative-based":[1],"national":[2,45,66,120,133],"cybersecurity":[3,46,67,121,134],"incident":[4,12,37,40,47,68,76,100,107,117,122,135,194],"management":[5,48,69,77,93,123,136,163],"benefits":[6],"from":[7],"the":[8,85,131,157,174,182,205,218,225,238],"huge":[9],"size":[10],"of":[11,20,84,159],"information,":[13],"large-scale":[14],"information":[15,142],"security":[16,21,75],"devices":[17],"and":[18,39,91,95,102,109,143,197,211,231],"aggregation":[19],"skills.":[22],"However,":[23],"no":[24],"existing":[25,183],"collaborative":[26,56,106,151],"approach":[27,57,152,176,191,203],"has":[28],"been":[29],"able":[30],"to":[31,53,58,181],"cater":[32],"for":[33,116,217,237],"multiple":[34],"regulators,":[35],"divergent":[36],"views":[38],"reputation":[41],"trust":[42],"issues":[43,61],"that":[44,113,173],"presents.":[49],"This":[50],"paper":[51],"aims":[52],"propose":[54],"a":[55,140],"handle":[59],"these":[60],"cost-effectively.":[62],"Design/methodology/approach":[63],"A":[64],"collaborative-based":[65,132],"architecture":[70],"based":[71,155,185],"on":[72,156,186],"ITU-T":[73],"X.1056":[74],"framework":[78],"is":[79,82,147,153,177],"proposed.":[80,125],"It":[81],"composed":[83],"cooperative":[86,90],"regulatory":[87],"unit":[88],"with":[89,99],"third-party":[92],"strategies":[94],"an":[96,160],"execution":[97],"unit,":[98],"handling":[101,118],"response":[103,207,227],"strategies.":[104],"Novel":[105],"prioritization":[108],"mitigation":[110],"planning":[111],"models":[112],"are":[114,124],"fit":[115],"in":[119],"Findings":[126],"Use":[127],"case":[128],"depicting":[129],"how":[130],"would":[137],"function":[138],"within":[139],"typical":[141],"communication":[144],"technology":[145],"ecosystem":[146],"illustrated.":[148],"The":[149,170,190,202],"proposed":[150,175],"evaluated":[154],"performances":[158],"experimental":[161],"cyber-incident":[162],"system":[164],"against":[165],"two":[166],"multistage":[167],"attack":[168,220,240],"scenarios.":[169],"results":[171],"show":[172],"more":[178],"reliable":[179],"compared":[180],"ones":[184],"descriptive":[187],"statistics.":[188],"Originality/value":[189],"produces":[192],"better":[193],"impact":[195],"scores":[196],"rankings":[198],"than":[199],"standard":[200],"tools.":[201],"reduces":[204,224],"total":[206,226],"costs":[208,228],"by":[209,215,229,235],"8.33%":[210],"false":[212,232],"positive":[213,233],"rate":[214,234],"97.20%":[216],"first":[219],"scenario,":[221],"while":[222],"it":[223],"26.67%":[230],"78.83%":[236],"second":[239],"scenario.":[241]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
