{"id":"https://openalex.org/W2992813907","doi":"https://doi.org/10.1109/icawst.2019.8923373","title":"A Study on Security Trend based on News Analysis","display_name":"A Study on Security Trend based on News Analysis","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2992813907","doi":"https://doi.org/10.1109/icawst.2019.8923373","mag":"2992813907"},"language":"en","primary_location":{"id":"doi:10.1109/icawst.2019.8923373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icawst.2019.8923373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066946316","display_name":"Chia-Mei Chen","orcid":"https://orcid.org/0000-0002-4361-0461"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chia-Mei Chen","raw_affiliation_strings":["Department of Information Management, National Sun Yat-sen University, Kaohsiung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Sun Yat-sen University, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063791350","display_name":"Dan-Wei Wen","orcid":"https://orcid.org/0000-0001-8210-9381"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan-Wei Marian Wen","raw_affiliation_strings":["Business College, Guilin University of Electronic Technology, Guilin City, China"],"affiliations":[{"raw_affiliation_string":"Business College, Guilin University of Electronic Technology, Guilin City, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089433654","display_name":"Fang Junjie","orcid":null},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jun-Jie Fang","raw_affiliation_strings":["Department of Information Management, National Sun Yat-sen University, Kaohsiung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Sun Yat-sen University, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065834709","display_name":"Gu-Hsin Lai","orcid":"https://orcid.org/0000-0001-8310-5120"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gu-Hsin Lai","raw_affiliation_strings":["Department of Technology Crime Investigation, Taiwan Police College, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Technology Crime Investigation, Taiwan Police College, Taipei, Taiwan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057245686","display_name":"Yi-Hung Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi-Hung Liu","raw_affiliation_strings":["Department of Business Administration, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Business Administration, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5066946316"],"corresponding_institution_ids":["https://openalex.org/I142974352"],"apc_list":null,"apc_paid":null,"fwci":0.3522,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71539239,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9412000179290771,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9323999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7338283061981201},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6576328873634338},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5811633467674255},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.5485405325889587},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5208402276039124},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5038878321647644},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4219086170196533},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33278584480285645},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2785244584083557},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20932286977767944}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7338283061981201},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6576328873634338},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5811633467674255},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.5485405325889587},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5208402276039124},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5038878321647644},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4219086170196533},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33278584480285645},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2785244584083557},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20932286977767944},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icawst.2019.8923373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icawst.2019.8923373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","raw_type":"proceedings-article"},{"id":"mag:3034755123","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902278821828789","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W113111301","https://openalex.org/W1576877452","https://openalex.org/W2052452825","https://openalex.org/W2549564015","https://openalex.org/W2605736057","https://openalex.org/W2769984510","https://openalex.org/W2784295274"],"related_works":["https://openalex.org/W2000785801","https://openalex.org/W986318368","https://openalex.org/W2384410913","https://openalex.org/W2352878646","https://openalex.org/W2004734601","https://openalex.org/W2130149817","https://openalex.org/W2990194547","https://openalex.org/W1480123525","https://openalex.org/W2620865396","https://openalex.org/W2414054180"],"abstract_inverted_index":{"Workload":[0],"of":[1,10,65,91,97],"cybersecurity":[2,41,50,58,67,82,92,98,104,114],"administrators":[3,105],"has":[4],"significantly":[5],"increased":[6],"with":[7],"the":[8,11,14,44,63,70],"proliferation":[9],"internet":[12],"and":[13,26,47,73,94,117],"accompanied":[15],"cyberattacks.":[16,135],"In":[17],"order":[18],"to":[19,22,39,77,88,110,130],"help":[20],"firms":[21],"identify":[23],"most":[24],"recent":[25],"emerging":[27],"cyberattacks":[28],"in":[29,106],"a":[30,75],"timely":[31],"manner,":[32],"this":[33,60],"research":[34,61,101],"applies":[35],"machine":[36],"learning":[37],"methods":[38],"detect":[40,89],"trends.":[42],"As":[43],"rich,":[45],"multifaceted,":[46],"updated":[48],"online":[49,66,81],"news":[51,68,83,87,115],"serve":[52],"as":[53,69],"key":[54],"information":[55],"sources":[56],"for":[57],"administrators,":[59],"utilizes":[62],"wealth":[64],"data":[71],"source":[72],"develops":[74],"system":[76],"automatically":[78],"collect":[79],"multiple":[80,113],"outlets,":[84],"analyze":[85],"collected":[86],"emergence":[90],"events":[93,119],"present":[95],"trend":[96],"news.":[99],"This":[100],"can":[102],"facilitate":[103],"saving":[107],"their":[108,121],"time":[109],"read":[111],"through":[112],"websites":[116],"organize":[118],"from":[120],"memories":[122],"or":[123],"other":[124],"records,":[125],"thus":[126],"enhance":[127],"firms'":[128],"capacity":[129],"actively":[131],"protect":[132],"against":[133],"potential":[134]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
