{"id":"https://openalex.org/W2769822599","doi":"https://doi.org/10.1109/idaacs.2017.8095232","title":"The risks in the social networks \u2014 An exploratory study","display_name":"The risks in the social networks \u2014 An exploratory study","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2769822599","doi":"https://doi.org/10.1109/idaacs.2017.8095232","mag":"2769822599"},"language":"en","primary_location":{"id":"doi:10.1109/idaacs.2017.8095232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs.2017.8095232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032185903","display_name":"Bogdan \u021aig\u0103noaia","orcid":"https://orcid.org/0000-0002-7251-9165"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Bogdan Tiganoaia","raw_affiliation_strings":["Politehnica University of Bucharest"],"affiliations":[{"raw_affiliation_string":"Politehnica University of Bucharest","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021937187","display_name":"Alexandra Cernian","orcid":"https://orcid.org/0000-0002-4736-0826"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Alexandra Cernian","raw_affiliation_strings":["Politehnica University of Bucharest"],"affiliations":[{"raw_affiliation_string":"Politehnica University of Bucharest","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003610228","display_name":"Andrei Niculescu","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Andrei Niculescu","raw_affiliation_strings":["Politehnica University of Bucharest"],"affiliations":[{"raw_affiliation_string":"Politehnica University of Bucharest","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032185903"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21195414,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"974","last_page":"977"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5460259914398193},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5313656330108643},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5302243828773499},{"id":"https://openalex.org/keywords/exploratory-research","display_name":"Exploratory research","score":0.5138445496559143},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47104883193969727},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.46426108479499817},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4520953297615051},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45176202058792114},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.44563955068588257},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.42734819650650024},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40596887469291687},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32184141874313354},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20163553953170776},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.17991238832473755},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.0850771963596344}],"concepts":[{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5460259914398193},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5313656330108643},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5302243828773499},{"id":"https://openalex.org/C85973986","wikidata":"https://www.wikidata.org/wiki/Q1091731","display_name":"Exploratory research","level":2,"score":0.5138445496559143},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47104883193969727},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.46426108479499817},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4520953297615051},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45176202058792114},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.44563955068588257},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.42734819650650024},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40596887469291687},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32184141874313354},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20163553953170776},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.17991238832473755},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0850771963596344},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idaacs.2017.8095232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs.2017.8095232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1490275871","https://openalex.org/W2002356434","https://openalex.org/W2119587968","https://openalex.org/W2747622133","https://openalex.org/W2798323459"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W1977056376","https://openalex.org/W1990545028","https://openalex.org/W4312622923","https://openalex.org/W2728430307","https://openalex.org/W2107786128","https://openalex.org/W2048368023","https://openalex.org/W2735469505","https://openalex.org/W2120116197","https://openalex.org/W159653547"],"abstract_inverted_index":{"While":[0],"social":[1,38,44,64,109,117,132,161],"networking":[2],"has":[3,24],"gone":[4],"on":[5,94,131],"almost":[6],"as":[7,9],"long":[8],"societies":[10],"themselves":[11],"have":[12],"existed,":[13],"the":[14,18,41,58,69,85,105,108,113,116,123,128,150,153,160,164,173,176,191,197],"unparalleled":[15],"potential":[16],"of":[17,32,68,75,101,125,139,152,157,167,175,193],"Web":[19],"to":[20,26,37,89,148],"facilitate":[21],"such":[22,111],"connections":[23],"led":[25],"an":[27,81,90,168],"exponential":[28],"and":[29,46,61,72,155],"ongoing":[30],"expansion":[31],"that":[33,99,145],"phenomenon.":[34],"In":[35],"addition":[36],"media":[39],"platforms,":[40],"capacity":[42],"for":[43,196],"interaction":[45],"collaboration":[47],"is":[48,80,146],"increasingly":[49],"built":[50],"into":[51],"business":[52],"applications":[53,129],"[1].":[54],"The":[55,78,137,184],"risks":[56,106,158,195],"in":[57,63,107,115,159,178,190],"online":[59,198],"space":[60],"particularly":[62],"networks":[65,110],"represent":[66],"one":[67],"most":[70],"important":[71],"opened":[73],"issue":[74],"our":[76],"time.":[77],"paper":[79,171,185],"exploratory":[82],"study":[83],"with":[84,97],"focus":[86],"point":[87],"related":[88],"original":[91],"research":[92,141],"based":[93],"a":[95,143],"questionnaire":[96],"more":[98],"300":[100],"respondents.":[102],"Topics":[103],"about":[104],"as:":[112],"security":[114,126,180],"networks,":[118,133],"incidents,":[119],"viruses,":[120],"worms,":[121],"spam,":[122],"level":[124],"regarding":[127],"used":[130],"etc":[134],"were":[135],"analysed.":[136],"findings":[138,189],"this":[140,170],"provide":[142],"basis":[144],"useful":[147,188],"understand":[149],"importance":[151],"prevention":[154],"treatment":[156],"networks.":[162],"Regarding":[163],"management":[165],"perspective":[166],"organization,":[169],"highlights":[172],"necessity":[174],"investments":[177],"companies":[179],"against":[181],"cyber":[182,194],"risks.":[183],"also":[186],"provides":[187],"field":[192],"community.":[199]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
