{"id":"https://openalex.org/W4410951371","doi":"https://doi.org/10.1108/ics-12-2024-0318","title":"User adoption of TETRA mobile radio communication networks: an information security perspective","display_name":"User adoption of TETRA mobile radio communication networks: an information security perspective","publication_year":2025,"publication_date":"2025-06-02","ids":{"openalex":"https://openalex.org/W4410951371","doi":"https://doi.org/10.1108/ics-12-2024-0318"},"language":"en","primary_location":{"id":"doi:10.1108/ics-12-2024-0318","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2024-0318","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://his.diva-portal.org/smash/get/diva2:1968084/FULLTEXT02","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035768806","display_name":"Marcus Dansarie","orcid":"https://orcid.org/0000-0001-9246-0263"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]},{"id":"https://openalex.org/I1291458624","display_name":"Swedish Defence Research Agency","ror":"https://ror.org/0470cgs30","country_code":"SE","type":"funder","lineage":["https://openalex.org/I1291458624"]},{"id":"https://openalex.org/I101466613","display_name":"Swedish Defence University","ror":"https://ror.org/04mj8af82","country_code":"SE","type":"education","lineage":["https://openalex.org/I101466613"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Marcus Dansarie","raw_affiliation_strings":["Swedish Defence University Department of Systems Science for Defence and Security, , Stockholm, , and School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden, and"],"affiliations":[{"raw_affiliation_string":"Swedish Defence University Department of Systems Science for Defence and Security, , Stockholm, , and School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden, and","institution_ids":["https://openalex.org/I101466613","https://openalex.org/I205158640","https://openalex.org/I1291458624"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077553567","display_name":"Marcus Nohlberg","orcid":"https://orcid.org/0000-0001-5962-9995"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marcus Nohlberg","raw_affiliation_strings":["University of Sk\u00f6vde School of Informatics, , Sk\u00f6vde,"],"affiliations":[{"raw_affiliation_string":"University of Sk\u00f6vde School of Informatics, , Sk\u00f6vde,","institution_ids":["https://openalex.org/I205158640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035768806"],"corresponding_institution_ids":["https://openalex.org/I101466613","https://openalex.org/I1291458624","https://openalex.org/I205158640"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10580387,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":"5","first_page":"766","last_page":"784"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tetra","display_name":"Tetra","score":0.6538492441177368},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6294541358947754},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.5022861957550049},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4616483747959137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45650914311408997},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3926529288291931},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37383967638015747},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.08101314306259155}],"concepts":[{"id":"https://openalex.org/C2777873363","wikidata":"https://www.wikidata.org/wiki/Q13533436","display_name":"Tetra","level":2,"score":0.6538492441177368},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6294541358947754},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.5022861957550049},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4616483747959137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45650914311408997},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3926529288291931},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37383967638015747},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.08101314306259155},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C155647269","wikidata":"https://www.wikidata.org/wiki/Q243455","display_name":"Medicinal chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/ics-12-2024-0318","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-12-2024-0318","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:his-25198","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-25198","pdf_url":"https://his.diva-portal.org/smash/get/diva2:1968084/FULLTEXT02","source":{"id":"https://openalex.org/S4306401028","display_name":"University Library of Sk\u00f6vde (University of Sk\u00f6vde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205158640","host_organization_name":"University of Sk\u00f6vde","host_organization_lineage":["https://openalex.org/I205158640"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:his-25198","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-25198","pdf_url":"https://his.diva-portal.org/smash/get/diva2:1968084/FULLTEXT02","source":{"id":"https://openalex.org/S4306401028","display_name":"University Library of Sk\u00f6vde (University of Sk\u00f6vde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205158640","host_organization_name":"University of Sk\u00f6vde","host_organization_lineage":["https://openalex.org/I205158640"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410951371.pdf","grobid_xml":"https://content.openalex.org/works/W4410951371.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1573919739","https://openalex.org/W1960059812","https://openalex.org/W2072227929","https://openalex.org/W2131220052","https://openalex.org/W2288762662","https://openalex.org/W2408621407","https://openalex.org/W2537151272","https://openalex.org/W2582100929","https://openalex.org/W2923040934","https://openalex.org/W4311000453","https://openalex.org/W4385624000","https://openalex.org/W4400071599"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W4246755741","https://openalex.org/W2950370291","https://openalex.org/W2023448582","https://openalex.org/W2171516250","https://openalex.org/W2076418881","https://openalex.org/W2037202901","https://openalex.org/W2072649844","https://openalex.org/W2345369776","https://openalex.org/W2342666804"],"abstract_inverted_index":{"Purpose":[0],"Digital":[1],"mobile":[2,196],"radio":[3,197],"communication":[4,198],"networks":[5,43,125,199],"are":[6,60,177],"used":[7,39,116],"for":[8,41,171],"coordinating":[9],"operations":[10,176],"in":[11,73,89,102,141,194,205,238],"many":[12],"important":[13],"sectors,":[14],"including":[15],"critical":[16,48],"infrastructures":[17],"and":[18,68,93,105,111,151,157,169,231],"large":[19],"industries.":[20],"Despite":[21],"this,":[22],"there":[23],"is":[24,34,44,79,126,159,209],"a":[25,106],"dearth":[26],"of":[27,50,71,99,109,123,136,139,155,215,229,234],"knowledge":[28,135],"about":[29],"how":[30,58,62],"their":[31,63,142],"information":[32,66,224],"security":[33,67,140,193,236],"managed.":[35],"The":[36,77],"most":[37],"commonly":[38],"standard":[40],"such":[42],"TETRA.":[45],"Given":[46],"the":[47,69,74,103,119,137,153,166,210,213,216,226,232],"role":[49],"TETRA":[51,95,124,130,182],"networks,":[52,96,183],"this":[53,239],"study":[54,78,208],"aims":[55],"to":[56,117,212,219,223],"clarify":[57],"they":[59],"used,":[61],"users":[64,101,110,162],"manage":[65],"implications":[70,233],"vulnerabilities":[72,204],"standard.":[75],"Design/methodology/approach":[76],"based":[80],"on":[81,149,165,180,192,202],"semi-structured":[82],"interviews":[83],"with":[84,133],"representatives":[85],"from":[86],"11":[87],"organizations":[88,145],"Sweden":[90],"that":[91],"own":[92],"operate":[94],"representing":[97],"32%":[98],"registered":[100],"country":[104],"wide":[107],"range":[108],"applications.":[112],"Thematic":[113],"analysis":[114],"was":[115],"analyze":[118],"data.":[120],"Findings":[121],"Management":[122],"generally":[127,163],"outsourced,":[128],"leaving":[129],"network":[131],"owners":[132],"scant":[134],"state":[138],"networks.":[143],"Although":[144],"have":[146,186],"high":[147],"demands":[148],"availability":[150],"integrity,":[152],"use":[154],"encryption":[156],"authentication":[158],"rare.":[160],"Instead,":[161],"rely":[164],"protocol\u2019s":[167],"complexity":[168],"obscurity":[170],"security.":[172],"Because":[173],"organizations\u2019":[174],"core":[175],"often":[178],"dependent":[179],"functioning":[181],"attacks":[184,230],"can":[185],"severe":[187],"consequences.":[188],"Originality/value":[189],"Previous":[190],"research":[191],"digital":[195],"has":[200],"focused":[201],"technical":[203],"standards.":[206],"This":[207],"first,":[211],"best":[214],"authors\u2019":[217],"knowledge,":[218],"investigate":[220],"users\u2019":[221],"approaches":[222],"security,":[225],"potential":[227],"consequences":[228],"known":[235],"issues":[237],"context.":[240]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
