{"id":"https://openalex.org/W2104233571","doi":"https://doi.org/10.1109/icitst.2009.5402535","title":"The impact of information security on Latin America","display_name":"The impact of information security on Latin America","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2104233571","doi":"https://doi.org/10.1109/icitst.2009.5402535","mag":"2104233571"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2009.5402535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035877557","display_name":"Jorge Gon\u00e7alves","orcid":"https://orcid.org/0000-0002-5228-6165"},"institutions":[{"id":"https://openalex.org/I4210127296","display_name":"Governo do Estado de S\u00e3o Paulo","ror":"https://ror.org/02xta6736","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210127296"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"J.M. Goncalves","raw_affiliation_strings":["PRODESP Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil","PRODESP - Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil"],"affiliations":[{"raw_affiliation_string":"PRODESP Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil","institution_ids":["https://openalex.org/I4210127296"]},{"raw_affiliation_string":"PRODESP - Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil","institution_ids":["https://openalex.org/I4210127296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112723420","display_name":"F. Fernandes","orcid":"https://orcid.org/0009-0001-2322-650X"},"institutions":[{"id":"https://openalex.org/I4210127296","display_name":"Governo do Estado de S\u00e3o Paulo","ror":"https://ror.org/02xta6736","country_code":"BR","type":"government","lineage":["https://openalex.org/I4210127296"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"F. Fernandes","raw_affiliation_strings":["PRODESP Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil","PRODESP - Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil"],"affiliations":[{"raw_affiliation_string":"PRODESP Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil","institution_ids":["https://openalex.org/I4210127296"]},{"raw_affiliation_string":"PRODESP - Cia. de Processamento de Dados do Estado de Sao Paulo, Brazil","institution_ids":["https://openalex.org/I4210127296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035877557"],"corresponding_institution_ids":["https://openalex.org/I4210127296"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.15376767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9434999823570251,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9434999823570251,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.7977787256240845},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7044548392295837},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6588017344474792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6273146271705627},{"id":"https://openalex.org/keywords/latin-americans","display_name":"Latin Americans","score":0.5943337678909302},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5760864615440369},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5438547134399414},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4702669084072113},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.45756393671035767},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3967285454273224},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3808837831020355},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2259368896484375},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1928987205028534}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.7977787256240845},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7044548392295837},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6588017344474792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6273146271705627},{"id":"https://openalex.org/C158886217","wikidata":"https://www.wikidata.org/wiki/Q16799549","display_name":"Latin Americans","level":2,"score":0.5943337678909302},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5760864615440369},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5438547134399414},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4702669084072113},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.45756393671035767},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3967285454273224},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3808837831020355},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2259368896484375},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1928987205028534},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2009.5402535","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402535","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W2166943775","https://openalex.org/W1903420481","https://openalex.org/W2158007046","https://openalex.org/W2775236000","https://openalex.org/W2071426633","https://openalex.org/W2612547561","https://openalex.org/W3212927647","https://openalex.org/W4286859165"],"abstract_inverted_index":{"This":[0],"paper":[1,72,90],"focuses":[2],"on":[3,23],"the":[4,10,18,24,36,56,61,74,78,84,87,104,122,130,140],"experience":[5],"of":[6,9,20,63,65,69,83,86,96,107,117],"PRODESP,":[7],"one":[8],"biggest":[11],"Data":[12,53],"Centers":[13],"in":[14,17,51,55,99,103,109,111,129,143],"Latin":[15],"America":[16],"treatment":[19,66],"security":[21,116],"incidents":[22,68],"Internet":[25,118],"and":[26,80,120,134],"initiatives":[27],"to":[28,59,101,113,132],"curb":[29],"these":[30],"incidents.":[31],"It":[32],"is":[33,47],"shown":[34],"how":[35,121],"CSIRT":[37,46],"-":[38,44],"Computer":[39],"Security":[40],"Incident":[41],"Response":[42],"Team":[43],"acts.":[45],"a":[48,52,93,136],"group":[49,98],"created":[50],"Center":[54],"public":[57],"sector":[58],"address":[60],"problem":[62],"lack":[64],"for":[67,139],"security.":[70],"The":[71,89],"shows":[73],"solution":[75],"adopted":[76],"with":[77,125],"implementation":[79],"constant":[81],"monitoring":[82],"environment":[85,138],"Internet.":[88],"further":[91,115],"exploits":[92],"pioneering":[94],"initiative":[95],"this":[97],"regard":[100],"participation":[102],"National":[105],"Consortium":[106],"Honeypots":[108],"deployment":[110],"Brazil,":[112],"ensure":[114,135],"users":[119],"team":[123],"interacts":[124],"other":[126],"congeners":[127],"groups":[128],"world":[131],"create":[133],"safe":[137],"user":[141],"community":[142],"general.":[144]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
