{"id":"https://openalex.org/W4391387402","doi":"https://doi.org/10.1108/ics-11-2023-0211","title":"Cybersecurity in modern cars: awareness and readiness of auto workshops","display_name":"Cybersecurity in modern cars: awareness and readiness of auto workshops","publication_year":2024,"publication_date":"2024-01-31","ids":{"openalex":"https://openalex.org/W4391387402","doi":"https://doi.org/10.1108/ics-11-2023-0211"},"language":"en","primary_location":{"id":"doi:10.1108/ics-11-2023-0211","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2023-0211","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-23599","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092541161","display_name":"David Hedberg","orcid":null},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"David Hedberg","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Skovde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Skovde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024279614","display_name":"Martin Lundgren","orcid":"https://orcid.org/0000-0003-1692-5721"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Martin Lundgren","raw_affiliation_strings":["Department of Computer Science, Information Systems, University of Sk\u00f6vde, Skovde, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information Systems, University of Sk\u00f6vde, Skovde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077553567","display_name":"Marcus Nohlberg","orcid":"https://orcid.org/0000-0001-5962-9995"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marcus Nohlberg","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092541161"],"corresponding_institution_ids":["https://openalex.org/I205158640"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00705462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"32","issue":"4","first_page":"407","last_page":"419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.8011127710342407},{"id":"https://openalex.org/keywords/thematic-analysis","display_name":"Thematic analysis","score":0.6151188015937805},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5426251888275146},{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.5060304999351501},{"id":"https://openalex.org/keywords/capability-maturity-model","display_name":"Capability Maturity Model","score":0.4187609851360321},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3639744520187378},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.35389015078544617},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33899372816085815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3255699872970581},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.1883433759212494},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13366591930389404},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.10338646173477173}],"concepts":[{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.8011127710342407},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.6151188015937805},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5426251888275146},{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.5060304999351501},{"id":"https://openalex.org/C85890633","wikidata":"https://www.wikidata.org/wiki/Q929673","display_name":"Capability Maturity Model","level":3,"score":0.4187609851360321},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3639744520187378},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.35389015078544617},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33899372816085815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3255699872970581},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.1883433759212494},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13366591930389404},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.10338646173477173},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/ics-11-2023-0211","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2023-0211","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:his-23599","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-23599","pdf_url":null,"source":{"id":"https://openalex.org/S4306401029","display_name":"University Library of Sk\u00f6vde (University of Sk\u00f6vde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205158640","host_organization_name":"University of Sk\u00f6vde","host_organization_lineage":["https://openalex.org/I205158640"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:his-23599","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-23599","pdf_url":null,"source":{"id":"https://openalex.org/S4306401029","display_name":"University Library of Sk\u00f6vde (University of Sk\u00f6vde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205158640","host_organization_name":"University of Sk\u00f6vde","host_organization_lineage":["https://openalex.org/I205158640"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W114786163","https://openalex.org/W303020954","https://openalex.org/W1857045448","https://openalex.org/W2053452380","https://openalex.org/W2211487354","https://openalex.org/W2308318934","https://openalex.org/W2597561986","https://openalex.org/W2614448992","https://openalex.org/W2616243981","https://openalex.org/W2753691335","https://openalex.org/W2964029596","https://openalex.org/W2971831522","https://openalex.org/W2989230094","https://openalex.org/W3028012504","https://openalex.org/W3033870338","https://openalex.org/W3198295470","https://openalex.org/W4224142968","https://openalex.org/W4385251924"],"related_works":["https://openalex.org/W4283172224","https://openalex.org/W2992877076","https://openalex.org/W2563825355","https://openalex.org/W4382725623","https://openalex.org/W2888066950","https://openalex.org/W2889844859","https://openalex.org/W3217511980","https://openalex.org/W2806063704","https://openalex.org/W4384822944","https://openalex.org/W2912268755"],"abstract_inverted_index":{"Purpose":[0],"This":[1,28,137],"study":[2,29,35,187],"aims":[3],"to":[4,14,65,80,115,117,147,191,202,233,257,282],"explore":[5],"auto":[6,47,86,127,167,239,269],"mechanics":[7],"awareness":[8],"of":[9,37,58,71,83,175,285],"repairs":[10,264],"and":[11,18,45,90,99,109,112,196,208,265,279,287,293],"maintenance":[12],"related":[13],"the":[15,59,66,84,110,144,160,258,276,283,297],"car\u2019s":[16],"cybersecurity":[17,73,260,284],"provide":[19],"insights":[20],"into":[21],"challenges":[22,183,278],"based":[23,31],"on":[24,32,238],"current":[25,85],"practice.":[26],"Design/methodology/approach":[27],"is":[30,93,143,201],"an":[33],"empirical":[34],"consisting":[36],"semistructured":[38],"interviews":[39],"with":[40,152,162,255],"representatives":[41],"from":[42,268],"both":[43],"branded":[44,100,194],"independent":[46,97,197],"workshops.":[48,101,198],"The":[49,182,199],"data":[50],"was":[51,63,77,139],"analyzed":[52],"using":[53],"thematic":[54],"analysis.":[55],"A":[56],"version":[57],"capability":[60],"maturity":[61],"model":[62],"introduced":[64],"respondents":[67],"as":[68],"a":[69,94,172],"self-evaluation":[70],"their":[72],"awareness.":[74],"Findings":[75],"Cybersecurity":[76],"not":[78],"found":[79],"be":[81],"part":[82],"workshop":[87,128],"work":[88],"culture,":[89],"that":[91,245],"there":[92],"gap":[95],"between":[96],"workshops":[98,168,195,270],"Specifically,":[102],"in":[103,130,150,185,228,263,296],"how":[104,288],"they":[105,220,289],"function,":[106],"approach":[107],"problems":[108],"tools":[111],"support":[113],"available":[114],"them":[116],"resolve":[118],"(particularly":[119],"regarding":[120],"previously":[121,243],"unknown)":[122],"issues.":[123,154,214],"Research":[124],"limitations/implications":[125],"Only":[126],"managers":[129],"Sweden":[131],"were":[132],"interviewed":[133],"for":[134,225],"this":[135,186],"study.":[136],"role":[138,259],"picked":[140],"because":[141],"it":[142],"most":[145],"likely":[146],"have":[148,158],"come":[149],"contact":[151],"cybersecurity-related":[153],"They":[155],"may":[156],"also":[157,221],"discussed":[159],"topic":[161],"mechanics,":[163],"manufacturers":[164],"or":[165,178,212],"other":[166],"\u2013":[169],"thus":[170],"providing":[171],"broader":[173],"view":[174],"potential":[176,223,231],"issues":[177,280],"challenges.":[179],"Practical":[180],"implications":[181],"identified":[184],"offers":[188],"actionable":[189],"advice":[190],"car":[192],"manufacturers,":[193],"goal":[200],"further":[203],"cooperation,":[204],"improve":[205],"knowledge":[206],"sharing":[207],"avoid":[209],"unnecessary":[210],"safety":[211],"security":[213],"Originality/value":[215],"As":[216],"cars":[217,246],"become":[218,222],"smarter,":[219],"targets":[224],"cyberattacks,":[226],"which":[227,241],"turn":[229],"poses":[230],"threats":[232],"human":[234],"safety.":[235],"However,":[236],"research":[237,253],"workshops,":[240],"has":[242,250],"ensured":[244],"are":[247,290],"road":[248,294],"safe,":[249],"received":[251],"little":[252],"attention":[254],"regards":[256],"can":[261,271],"play":[262],"maintenance.":[266],"Insights":[267],"therefore":[272],"shed":[273],"light":[274],"upon":[275],"unique":[277],"tied":[281],"cars,":[286],"kept":[291],"up-to-date":[292],"safe":[295],"digital":[298],"era.":[299]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
