{"id":"https://openalex.org/W1976442033","doi":"https://doi.org/10.1109/isias.2010.5604182","title":"Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework","display_name":"Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W1976442033","doi":"https://doi.org/10.1109/isias.2010.5604182","mag":"1976442033"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604182","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604182","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056334347","display_name":"Zahri Yunos","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zahri Yunos","raw_affiliation_strings":["CyberSecurity Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"CyberSecurity Malaysia, Kuala Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103446574","display_name":"Rabiah Ahmad","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rabiah Ahmad","raw_affiliation_strings":["Center for Advance Software Engineering, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Advance Software Engineering, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023744687","display_name":"Syahrul Hafidz Suid","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Syahrul Hafidz Suid","raw_affiliation_strings":["CyberSecurity Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"CyberSecurity Malaysia, Kuala Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002776700","display_name":"Zuraini Ismail","orcid":"https://orcid.org/0000-0002-2425-1205"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zuraini Ismail","raw_affiliation_strings":["Center for Advance Software Engineering, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Advance Software Engineering, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056334347"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.0014,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93824924,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9495000243186951,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7448354959487915},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.7334229350090027},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.645577609539032},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.6281445622444153},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.6137247681617737},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5854488611221313},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5423583984375},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.5222328901290894},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4917292892932892},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.48418906331062317},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.42823293805122375},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.34600120782852173},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.26826733350753784},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.25986891984939575},{"id":"https://openalex.org/keywords/international-trade","display_name":"International trade","score":0.09507143497467041}],"concepts":[{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7448354959487915},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.7334229350090027},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.645577609539032},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.6281445622444153},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.6137247681617737},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5854488611221313},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5423583984375},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.5222328901290894},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4917292892932892},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.48418906331062317},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.42823293805122375},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34600120782852173},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.26826733350753784},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.25986891984939575},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.09507143497467041},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604182","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604182","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W51650145","https://openalex.org/W73893363","https://openalex.org/W147350318","https://openalex.org/W2033781656","https://openalex.org/W2141696017","https://openalex.org/W2507942439","https://openalex.org/W2790927322","https://openalex.org/W6602074848"],"related_works":["https://openalex.org/W2362985804","https://openalex.org/W2085358621","https://openalex.org/W3045199176","https://openalex.org/W4386971846","https://openalex.org/W3004302778","https://openalex.org/W2184280487","https://openalex.org/W578380379","https://openalex.org/W2604003881","https://openalex.org/W3047124310","https://openalex.org/W4386959929"],"abstract_inverted_index":{"Critical":[0],"National":[1],"Information":[2],"Infrastructure":[3],"(CNII)":[4],"is":[5],"crucial":[6],"to":[7,35,65],"the":[8,26,52,59,66,77,89,98,101,108,114],"survivability":[9],"of":[10,17,54,68,82,100,110,116],"a":[11,95],"nation.":[12],"The":[13],"destruction":[14],"or":[15],"disruption":[16,67],"these":[18],"systems":[19],"and":[20,31,37,40,79],"communication":[21],"networks":[22],"would":[23,43],"significantly":[24],"affect":[25],"economic":[27],"strength,":[28],"image,":[29],"defense":[30],"security,":[32],"government":[33],"capabilities":[34],"function,":[36],"public":[38],"health":[39],"safety.":[41],"CNII":[42,117],"probably":[44],"become":[45],"an":[46,74],"attractive":[47],"target":[48],"for":[49,97,123],"terrorists":[50],"as":[51,94],"result":[53],"cyber":[55,83,90,119],"attacks":[56],"could":[57],"leave":[58],"nation":[60],"with":[61],"difficult":[62],"conditions":[63],"due":[64],"critical":[69],"services.":[70],"This":[71,85,104],"paper":[72,86,105],"provides":[73],"overview":[75],"on":[76],"concept":[78],"fundamental":[80],"elements":[81],"terrorism.":[84],"also":[87],"highlights":[88],"security":[91],"policy":[92,102,111],"initiatives":[93],"guideline":[96],"development":[99,112],"framework.":[103],"further":[106],"recommends":[107],"need":[109],"addressing":[113],"protection":[115],"from":[118],"terrorism":[120],"activities":[121],"specifically":[122],"Malaysia.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
