{"id":"https://openalex.org/W2164248281","doi":"https://doi.org/10.1109/mipro.2014.6859696","title":"Computer classroom operating system security (Windows)","display_name":"Computer classroom operating system security (Windows)","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2164248281","doi":"https://doi.org/10.1109/mipro.2014.6859696","mag":"2164248281"},"language":"en","primary_location":{"id":"doi:10.1109/mipro.2014.6859696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2014.6859696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021531855","display_name":"Mario Zovkic","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mario Zovkic","raw_affiliation_strings":["Primary school Barilovi\u0107, Barilovi\u0107 & Primary school Katarine Zrinski Krnjak, Krnjak, Croatia"],"affiliations":[{"raw_affiliation_string":"Primary school Barilovi\u0107, Barilovi\u0107 & Primary school Katarine Zrinski Krnjak, Krnjak, Croatia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002578630","display_name":"Tedo Vrbanec","orcid":"https://orcid.org/0000-0002-4934-255X"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Tedo Vrbanec","raw_affiliation_strings":["Faculty of Teacher Education, University of Zagreb, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Faculty of Teacher Education, University of Zagreb, Zagreb, Croatia","institution_ids":["https://openalex.org/I181343428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021531855"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.409,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75610752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"905","last_page":"910"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9532999992370605,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.7362000346183777},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6960095763206482},{"id":"https://openalex.org/keywords/ignorance","display_name":"Ignorance","score":0.6059538722038269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.580491840839386},{"id":"https://openalex.org/keywords/multitude","display_name":"Multitude","score":0.5671866536140442},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5043143033981323},{"id":"https://openalex.org/keywords/microsoft-windows","display_name":"Microsoft Windows","score":0.5039853453636169},{"id":"https://openalex.org/keywords/group-policy","display_name":"Group Policy","score":0.48877188563346863},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4520556330680847},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4380040168762207},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43491053581237793},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2860146164894104},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10359960794448853}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.7362000346183777},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6960095763206482},{"id":"https://openalex.org/C2778732403","wikidata":"https://www.wikidata.org/wiki/Q815577","display_name":"Ignorance","level":2,"score":0.6059538722038269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.580491840839386},{"id":"https://openalex.org/C2780565519","wikidata":"https://www.wikidata.org/wiki/Q1208937","display_name":"Multitude","level":2,"score":0.5671866536140442},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5043143033981323},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.5039853453636169},{"id":"https://openalex.org/C84240569","wikidata":"https://www.wikidata.org/wiki/Q263678","display_name":"Group Policy","level":4,"score":0.48877188563346863},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4520556330680847},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4380040168762207},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43491053581237793},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2860146164894104},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10359960794448853},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mipro.2014.6859696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2014.6859696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W173145589","https://openalex.org/W1873737388","https://openalex.org/W2002754870","https://openalex.org/W2058410460","https://openalex.org/W6639258355"],"related_works":["https://openalex.org/W232475811","https://openalex.org/W239178537","https://openalex.org/W4256444941","https://openalex.org/W2500685539","https://openalex.org/W2744572443","https://openalex.org/W161957845","https://openalex.org/W2598898341","https://openalex.org/W592873502","https://openalex.org/W351038018","https://openalex.org/W2289386437"],"abstract_inverted_index":{"Computer":[0],"security,":[1],"school":[2,6,14,94],"security":[3,24,33],"policy":[4],"and":[5,16,32,72,104],"computers":[7,15,57,110],"usability":[8],"should":[9],"be":[10],"important":[11],"for":[12,90],"all":[13],"network":[17],"resources":[18],"users.":[19],"But":[20],"instead":[21],"of":[22,35,49,61,68,87,93],"implementing":[23],"policy,":[25],"users":[26],"often":[27,53],"unintentionally":[28],"compromise":[29],"computer":[30],"functionality":[31],"out":[34],"ignorance":[36],"or":[37],"negligence.":[38],"Since":[39],"Windows":[40,112],"is":[41],"the":[42,47,59,66],"default":[43],"operating":[44],"system":[45],"in":[46,58,64,77,100],"majority":[48],"Croatian":[50],"schools,":[51],"students":[52],"have":[54],"to":[55,83],"use":[56,109],"role":[60],"administrator.":[62],"Bearing":[63],"mind":[65],"multitude":[67],"new":[69],"technological":[70],"solutions":[71,89],"continual":[73],"changes":[74],"which":[75,96,108],"happen":[76],"this":[78,80],"industry,":[79],"paper":[81],"tries":[82],"provide":[84],"an":[85],"overview":[86],"software":[88],"IT":[91],"administrators":[92],"computers,":[95],"are":[97],"also":[98],"applicable":[99],"libraries,":[101],"colleges,":[102],"universities":[103],"other":[105],"public":[106],"places":[107],"with":[111],"OS.":[113]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
