{"id":"https://openalex.org/W2593327258","doi":"https://doi.org/10.1109/ic3ina.2016.7863047","title":"Strengthening the security of critical data in cyberspace, a policy review","display_name":"Strengthening the security of critical data in cyberspace, a policy review","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2593327258","doi":"https://doi.org/10.1109/ic3ina.2016.7863047","mag":"2593327258"},"language":"en","primary_location":{"id":"doi:10.1109/ic3ina.2016.7863047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3ina.2016.7863047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088891502","display_name":"Ahmad Budi Setiawan","orcid":"https://orcid.org/0000-0002-2561-3976"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ahmad Budi Setiawan","raw_affiliation_strings":["Research and HR Development, Agency Ministry of CIT, Indonesia"],"affiliations":[{"raw_affiliation_string":"Research and HR Development, Agency Ministry of CIT, Indonesia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040694378","display_name":"Ashwin Sasongko Sastrosubroto","orcid":null},"institutions":[{"id":"https://openalex.org/I19128659","display_name":"Indonesian Institute of Sciences","ror":"https://ror.org/03d7c1451","country_code":"ID","type":"facility","lineage":["https://openalex.org/I19128659"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Ashwin Sasongko Sastrosubroto","raw_affiliation_strings":["Research Center for Informatics, Indonesian Institute of Sciences"],"affiliations":[{"raw_affiliation_string":"Research Center for Informatics, Indonesian Institute of Sciences","institution_ids":["https://openalex.org/I19128659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088891502"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6635,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82046533,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"185","last_page":"190"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9118000268936157,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9118000268936157,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.948063313961029},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6913634538650513},{"id":"https://openalex.org/keywords/national-strategy-to-secure-cyberspace","display_name":"National Strategy to Secure Cyberspace","score":0.6719403266906738},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.560011088848114},{"id":"https://openalex.org/keywords/sovereignty","display_name":"Sovereignty","score":0.5496993660926819},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5221427083015442},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.4938426613807678},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4793625473976135},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.42641395330429077},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4153624176979065},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40970343351364136},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.34045180678367615},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3309410810470581},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2741647958755493},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.2621598243713379},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.16564106941223145},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.15749213099479675},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10725387930870056}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.948063313961029},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6913634538650513},{"id":"https://openalex.org/C20780181","wikidata":"https://www.wikidata.org/wiki/Q6978718","display_name":"National Strategy to Secure Cyberspace","level":4,"score":0.6719403266906738},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.560011088848114},{"id":"https://openalex.org/C186229450","wikidata":"https://www.wikidata.org/wiki/Q42008","display_name":"Sovereignty","level":3,"score":0.5496993660926819},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5221427083015442},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.4938426613807678},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4793625473976135},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.42641395330429077},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4153624176979065},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40970343351364136},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.34045180678367615},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3309410810470581},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2741647958755493},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2621598243713379},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.16564106941223145},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15749213099479675},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10725387930870056},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3ina.2016.7863047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3ina.2016.7863047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337407","display_name":"Division of Human Resource Development","ror":"https://ror.org/03mamvh39"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2000588234"],"related_works":["https://openalex.org/W4386125109","https://openalex.org/W2405741346","https://openalex.org/W2617269589","https://openalex.org/W1990990278","https://openalex.org/W3122395515","https://openalex.org/W1589617853","https://openalex.org/W2289230786","https://openalex.org/W9758914","https://openalex.org/W2353454713","https://openalex.org/W2353315471"],"abstract_inverted_index":{"Securing":[0],"critical":[1,36,62,126,169,200],"data":[2,39,63,127,160,170,201],"in":[3,64,171,202,216],"cyberspace":[4,47,65,134],"against":[5],"growing":[6],"and":[7,19,38,86,98,101,112,118,143,148,162,181,187],"evolving":[8],"cyber":[9,80,93,178,214],"threats":[10],"requires":[11,95],"a":[12],"layered":[13],"approach.":[14],"It":[15,173],"involves":[16],"strategy,":[17],"regulations":[18,182],"also":[20,220],"policies.":[21],"Cyberspace":[22],"is":[23,48,73,174,204],"composed":[24],"of":[25,27,29,50,61,71,79,125,213],"hundreds":[26],"thousands":[28],"interconnected":[30],"computers,":[31],"servers,":[32],"etc":[33],"that":[34,176,194],"allow":[35],"infrastructures":[37],"to":[40,45,54,67,75,122,130,198],"work.":[41],"The":[42,88,218],"National":[43,168],"Strategy":[44],"secure":[46],"part":[49],"our":[51],"overall":[52],"effort":[53],"protect":[55,68],"the":[56,59,76,91,123,131,138,153,192,196,211],"Nation.":[57],"Strengthening":[58],"security":[60,94,114,135,179,215],"aims":[66],"basic":[69],"interests":[70],"nation-states":[72],"related":[74],"three":[77],"aspects":[78],"security,":[81,104],"which":[82],"are":[83,183],"confidentiality,":[84],"integrity":[85],"availability.":[87],"foundation":[89],"for":[90,103,108,140,157,166,223],"government's":[92],"assigning":[96],"clear":[97],"unambiguous":[99],"authority":[100],"responsibility":[102],"holding":[105],"officials":[106],"accountable":[107],"fulfilling":[109],"those":[110],"responsibilities,":[111],"integrating":[113],"requirements":[115],"into":[116],"policies":[117,147,156,180],"regulations.":[119,149],"Since":[120],"disruption":[121],"sovereignty":[124,161],"will":[128],"impact":[129],"economy,":[132],"then":[133],"should":[136],"become":[137],"spirit":[139],"all":[141],"Information":[142],"Communication":[144],"Technology":[145],"(ICT)":[146],"This":[150,190],"study":[151,219],"reviews":[152],"Indonesian":[154],"Government's":[155],"strengthening":[158],"crititical":[159],"proposes":[163],"initial":[164],"recommendation":[165],"securing":[167],"cyberspace.":[172],"shown":[175],"many":[177],"not":[184,205],"properly":[185],"implemented":[186,206],"enforced":[188],"yet.":[189],"include":[191,221],"fact":[193],"even":[195],"regulation":[197],"store":[199],"country,":[203],"yet,":[207],"raising":[208],"questions":[209],"on":[210],"awareness":[212],"Indonesia.":[217],"recommendations":[222],"necessary":[224],"actions":[225],"as":[226,228],"well":[227],"further":[229],"studies":[230],"required.":[231]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
