{"id":"https://openalex.org/W4402811859","doi":"https://doi.org/10.1109/csr61664.2024.10679426","title":"Cybersecurity as a Backbone for Sustainability","display_name":"Cybersecurity as a Backbone for Sustainability","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402811859","doi":"https://doi.org/10.1109/csr61664.2024.10679426"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679426","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr61664.2024.10679426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022116106","display_name":"Gohar Sargsyan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gohar Sargsyan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5022116106"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":15.7804,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.98801351,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"526","last_page":"530"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.3995000123977661,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.3995000123977661,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sustainability","display_name":"Sustainability","score":0.6453462839126587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5524147152900696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.493720144033432}],"concepts":[{"id":"https://openalex.org/C66204764","wikidata":"https://www.wikidata.org/wiki/Q219416","display_name":"Sustainability","level":2,"score":0.6453462839126587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5524147152900696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.493720144033432},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr61664.2024.10679426","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr61664.2024.10679426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W4249656555"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Recently,":[0],"sustainability":[1,144],"became":[2],"mainstream":[3],"in":[4],"business,":[5],"academia,":[6],"governments":[7],"and":[8,24,91],"individual":[9],"levels.":[10],"Speaking":[11],"of":[12,99,148],"sustainability,":[13],"cybersecurity":[14,107,130],"is":[15,45,53,58,65,73,86],"not":[16,46,134],"the":[17,114,136,146],"first":[18],"thing":[19],"which":[20],"stands":[21],"out":[22],"immediately":[23],"clearly.":[25],"But":[26],"a":[27,40,54,59,110,117,139],"single":[28],"cyberattack":[29],"on":[30,125],"critical":[31],"infrastructure":[32],"can":[33],"have":[34],"an":[35,48,96],"environmental":[36,84],"impact":[37],"equivalent":[38],"to":[39,50],"major":[41],"oil":[42],"spill.":[43],"Cybersecurity":[44],"merely":[47],"add-on":[49],"sustainability;":[51],"it":[52,57],"fundamental":[55],"component;":[56],"backbone.":[60],"Just":[61],"as":[62,109],"physical":[63],"resilience":[64,72],"essential":[66],"for":[67,75,88,116,142],"withstanding":[68],"natural":[69],"disasters,":[70],"cyber":[71],"crucial":[74],"safeguarding":[76],"sustainable":[77,119,126],"systems":[78],"from":[79],"digital":[80],"disruptions.":[81],"Protecting":[82],"sensitive":[83],"data":[85,94],"paramount":[87],"informed":[89],"decision-making":[90],"accountability,":[92],"making":[93],"protection":[95],"indispensable":[97],"aspect":[98],"sustainability.":[100],"This":[101],"article":[102],"delves":[103],"into":[104],"new":[105,140],"ways":[106],"acts":[108],"silent":[111],"guardian,":[112],"paving":[113],"way":[115],"more":[118],"future.":[120],"It":[121],"also":[122],"provides":[123],"insights":[124],"IT":[127],"followed":[128],"by":[129],"emissions.":[131],"Last,":[132],"but":[133],"least,":[135],"author":[137],"offers":[138],"model":[141],"ecosystem's":[143],"through":[145],"lens":[147],"cybersecurity.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
