{"id":"https://openalex.org/W2176285992","doi":"https://doi.org/10.1108/ics-09-2014-0060","title":"Towards a framework for the potential cyber-terrorist threat to critical national infrastructure","display_name":"Towards a framework for the potential cyber-terrorist threat to critical national infrastructure","publication_year":2015,"publication_date":"2015-11-03","ids":{"openalex":"https://openalex.org/W2176285992","doi":"https://doi.org/10.1108/ics-09-2014-0060","mag":"2176285992"},"language":"en","primary_location":{"id":"doi:10.1108/ics-09-2014-0060","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-09-2014-0060","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080131741","display_name":"Abdulrahman Alqahtani","orcid":"https://orcid.org/0000-0002-6658-3240"},"institutions":[{"id":"https://openalex.org/I191240316","display_name":"University of Hull","ror":"https://ror.org/04nkhwh30","country_code":"GB","type":"education","lineage":["https://openalex.org/I191240316"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Abdulrahman Alqahtani","raw_affiliation_strings":["School of Politics, Philosophy & International Studies, Hull University, Hull, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Politics, Philosophy & International Studies, Hull University, Hull, United Kingdom","institution_ids":["https://openalex.org/I191240316"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5080131741"],"corresponding_institution_ids":["https://openalex.org/I191240316"],"apc_list":null,"apc_paid":null,"fwci":0.7946,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81358476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"23","issue":"5","first_page":"532","last_page":"569"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.901199996471405,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/grounded-theory","display_name":"Grounded theory","score":0.7220460772514343},{"id":"https://openalex.org/keywords/confirmatory-factor-analysis","display_name":"Confirmatory factor analysis","score":0.5719676613807678},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5267124772071838},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.5023603439331055},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45052769780158997},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4383242428302765},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.42980724573135376},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.4260631799697876},{"id":"https://openalex.org/keywords/qualitative-property","display_name":"Qualitative property","score":0.4237526059150696},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.4108223021030426},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3438984155654907},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3415164351463318},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.3233479857444763},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2355942726135254},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.21334952116012573},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19136399030685425},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.17128929495811462},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16026437282562256},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.14630189538002014},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08308017253875732}],"concepts":[{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.7220460772514343},{"id":"https://openalex.org/C40722632","wikidata":"https://www.wikidata.org/wiki/Q5160137","display_name":"Confirmatory factor analysis","level":3,"score":0.5719676613807678},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5267124772071838},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.5023603439331055},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45052769780158997},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4383242428302765},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.42980724573135376},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.4260631799697876},{"id":"https://openalex.org/C87156501","wikidata":"https://www.wikidata.org/wiki/Q7268708","display_name":"Qualitative property","level":2,"score":0.4237526059150696},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.4108223021030426},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3438984155654907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3415164351463318},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.3233479857444763},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2355942726135254},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.21334952116012573},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19136399030685425},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.17128929495811462},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16026437282562256},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.14630189538002014},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08308017253875732},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-09-2014-0060","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-09-2014-0060","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W119818611","https://openalex.org/W136176785","https://openalex.org/W312212258","https://openalex.org/W369775116","https://openalex.org/W412364655","https://openalex.org/W1446543390","https://openalex.org/W1545460766","https://openalex.org/W1573234480","https://openalex.org/W1573958368","https://openalex.org/W1590365279","https://openalex.org/W1774460361","https://openalex.org/W1941162072","https://openalex.org/W1985419904","https://openalex.org/W1987258130","https://openalex.org/W1987834455","https://openalex.org/W1988897250","https://openalex.org/W1991623719","https://openalex.org/W2005423324","https://openalex.org/W2011309176","https://openalex.org/W2013313241","https://openalex.org/W2034562813","https://openalex.org/W2040780635","https://openalex.org/W2047345533","https://openalex.org/W2049159124","https://openalex.org/W2058599614","https://openalex.org/W2090552208","https://openalex.org/W2102010715","https://openalex.org/W2116305749","https://openalex.org/W2122700558","https://openalex.org/W2123735857","https://openalex.org/W2132747867","https://openalex.org/W2146410840","https://openalex.org/W2159306398","https://openalex.org/W2163914445","https://openalex.org/W2169281074","https://openalex.org/W2249595199","https://openalex.org/W2313325349","https://openalex.org/W2507942439","https://openalex.org/W2900590395","https://openalex.org/W2904588591","https://openalex.org/W2988324561","https://openalex.org/W3122877168","https://openalex.org/W3157407122","https://openalex.org/W3193532866","https://openalex.org/W4230637740","https://openalex.org/W4237788945","https://openalex.org/W4243173434","https://openalex.org/W4252534912","https://openalex.org/W4254434816","https://openalex.org/W4285719527","https://openalex.org/W7075621315"],"related_works":["https://openalex.org/W1546533203","https://openalex.org/W2054080977","https://openalex.org/W2015439768","https://openalex.org/W4361008414","https://openalex.org/W2109806719","https://openalex.org/W3040823075","https://openalex.org/W2092147963","https://openalex.org/W2620765995","https://openalex.org/W1535784397","https://openalex.org/W569815712"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,70,139,232],"The":[2,140],"main":[3],"purpose":[4],"of":[5,16,20,43,76,120,157,160,181,185,199,203,215,226],"this":[6],"research":[7],"is":[8,234],"to":[9,22,27,33,48,59,115,124,190,212],"produce":[10],"the":[11,17,23,35,41,61,74,77,84,89,93,117,121,126,130,134,155,158,161,170,182,197,200,204,213,216,220,223,227,251],"most":[12],"accurate":[13],"theoretical":[14,36,179],"framework":[15,37,218],"potential":[18,183],"threat":[19,42,184],"cyberterrorism":[21,44],"national":[24,49,192],"security,":[25],"compared":[26],"conventional":[28,46,188],"terrorism.":[29],"So":[30],"it":[31,175,195],"aims":[32],"identify":[34],"that":[38,153],"best":[39],"explains":[40],"and":[45,58,96,123,133,187,219,245,248],"terrorism":[47,189],"security":[50,246],"derived":[51],"from":[52,242],"empirical":[53,239],"data,":[54,94],"using":[55],"grounded":[56,63,201],"theory,":[57],"validate":[60],"developed":[62],"theory":[64,122,202],"statistically":[65],"by":[66],"quantitative":[67,78,166],"data.":[68,90],"Design/methodology/approach":[69],"This":[71],"paper":[72],"presents":[73],"results":[75],"study":[79,205,228,236],"survey.":[80],"It":[81,208,233],"provides":[82,154,176,196],"in":[83,250],"beginning":[85],"basic":[86],"information":[87],"about":[88],"To":[91],"purify":[92],"reliability":[95],"exploratory":[97,146],"factor":[98,104],"analysis,":[99],"as":[100,102,143,164],"well":[101],"confirmatory":[103,167],"analysis":[105],"(CFA),":[106],"were":[107],"performed.":[108],"Then,":[109],"structural":[110],"equation":[111],"modelling":[112],"was":[113],"utilised":[114],"test":[116],"final":[118],"model":[119,132],"assess":[125],"overall":[127],"goodness-of-fit":[128],"between":[129],"proposed":[131],"collected":[135,241],"data":[136,151,240],"set.":[137],"Findings":[138],"first":[141],"study,":[142,147,163,174],"a":[144,149,165,177],"qualitative":[145,173],"gives":[148],"rich":[150],"set":[152],"foundation":[156],"development":[159,198,214],"second":[162,224],"study.":[168],"In":[169],"researcher\u2019s":[171],"previous":[172],"better":[178],"understanding":[180],"cyber":[186],"Saudi":[191,243],"security.":[193],"Also,":[194],"(Figure":[206],"1).":[207],"also":[209],"has":[210],"led":[211],"conceptual":[217],"hypotheses":[221],"for":[222],"phase":[225],"(i.e.":[229],"survey).":[230],"Originality/value":[231],"original":[235],"based":[237],"on":[238],"military":[244],"officials":[247],"experts":[249],"critical":[252],"infrastructures.":[253]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
