{"id":"https://openalex.org/W2462356297","doi":"https://doi.org/10.1109/cybersa.2016.7503291","title":"Cyber crisis management, survival or extinction?","display_name":"Cyber crisis management, survival or extinction?","publication_year":2016,"publication_date":"2016-06-01","ids":{"openalex":"https://openalex.org/W2462356297","doi":"https://doi.org/10.1109/cybersa.2016.7503291","mag":"2462356297"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2016.7503291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2016.7503291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066430942","display_name":"Yoram Golandsky","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yoram Golandsky","raw_affiliation_strings":["CEO @ CybeRisk Security Solutions Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"CEO @ CybeRisk Security Solutions Tel Aviv, Israel","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066430942"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6635,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.78366658,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9490000009536743,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crisis-management","display_name":"Crisis management","score":0.6640779376029968},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.6304716467857361},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6214969158172607},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.5577834248542786},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5066965222358704},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.4721408188343048},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4630899727344513},{"id":"https://openalex.org/keywords/crisis-response","display_name":"Crisis response","score":0.4545828104019165},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4147208333015442},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3996818959712982},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3302549719810486},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.18599382042884827},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.13366812467575073},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.11764326691627502},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.11577290296554565},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.09847772121429443}],"concepts":[{"id":"https://openalex.org/C2780851881","wikidata":"https://www.wikidata.org/wiki/Q1141276","display_name":"Crisis management","level":2,"score":0.6640779376029968},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.6304716467857361},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6214969158172607},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.5577834248542786},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5066965222358704},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.4721408188343048},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4630899727344513},{"id":"https://openalex.org/C2987285537","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Crisis response","level":2,"score":0.4545828104019165},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4147208333015442},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3996818959712982},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3302549719810486},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.18599382042884827},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.13366812467575073},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.11764326691627502},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.11577290296554565},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.09847772121429443},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersa.2016.7503291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2016.7503291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2020037248","https://openalex.org/W4385743339","https://openalex.org/W2756156038","https://openalex.org/W175841918","https://openalex.org/W2169399557","https://openalex.org/W1969017331","https://openalex.org/W2977609303","https://openalex.org/W4392848822","https://openalex.org/W2939985580","https://openalex.org/W3080856720"],"abstract_inverted_index":{"`Cyber":[0],"Incidents'":[1],"are":[2,15,19],"common":[3],"in":[4],"every":[5],"domain":[6],"where":[7],"technology":[8],"is":[9],"prevalent.":[10],"Recurring":[11],"or":[12],"sequential":[13],"incidents":[14,26],"not":[16,52],"unusual":[17],"and":[18,60,62,83,98],"often":[20],"manageable.":[21],"Whilst":[22],"more":[23],"rare,":[24],"the":[25,71,92],"that":[27],"reach":[28],"crisis":[29,77,87],"levels":[30],"have":[31],"been":[32],"shown":[33],"to":[34,43,73],"cause":[35],"an":[36,55,64],"unexpected":[37],"amount":[38],"of":[39],"damage.":[40],"Companies":[41],"need":[42],"remain":[44],"prepared":[45],"for":[46],"such":[47],"cyber":[48,86,95],"crises.":[49],"This":[50],"entails":[51],"only":[53],"building":[54],"Incident":[56],"Response":[57],"Team":[58],"(IRT)":[59],"creating":[61],"testing":[63],"incident":[65],"response":[66],"plan,":[67],"but":[68],"mainly":[69],"establishing":[70],"capability":[72],"properly":[74],"manage":[75],"business":[76],"triggered":[78],"by":[79],"cyber-attacks.":[80],"A":[81],"well-planned":[82],"efficiently":[84],"executed":[85],"management":[88],"plan":[89],"can":[90],"be":[91],"differentiator":[93],"between":[94],"breach":[96],"survival":[97],"extinction.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
