{"id":"https://openalex.org/W2009503555","doi":"https://doi.org/10.1109/msecp.2004.1281246","title":"Hacking the best-seller list","display_name":"Hacking the best-seller list","publication_year":2004,"publication_date":"2004-03-01","ids":{"openalex":"https://openalex.org/W2009503555","doi":"https://doi.org/10.1109/msecp.2004.1281246","mag":"2009503555"},"language":"en","primary_location":{"id":"doi:10.1109/msecp.2004.1281246","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msecp.2004.1281246","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049706053","display_name":"M. Donner","orcid":"https://orcid.org/0000-0002-9694-5150"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Donner","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5049706053"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20054995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"2","first_page":"51","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11197","display_name":"Digital Games and Media","score":0.8428999781608582,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11197","display_name":"Digital Games and Media","score":0.8428999781608582,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.560719907283783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5326853394508362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.355762243270874},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3348901867866516}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.560719907283783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5326853394508362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.355762243270874},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3348901867866516}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msecp.2004.1281246","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msecp.2004.1281246","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2921504876","https://openalex.org/W2725637128","https://openalex.org/W2897593657","https://openalex.org/W3006507989","https://openalex.org/W2555449513","https://openalex.org/W2371430952","https://openalex.org/W2381740503","https://openalex.org/W2123790874"],"abstract_inverted_index":{"In":[0],"the":[1,7,27,37,49,71,89,101,111],"same":[2],"way":[3],"that":[4,94],"Windows":[5],"introduced":[6],"masses":[8],"to":[9,46,81,107,113],"graphical":[10],"user":[11],"interfaces":[12],"without":[13],"having":[14],"invented":[15],"them,":[16],"Dan":[17],"Brown's":[18],"books":[19],"are":[20,105],"exploring":[21],"some":[22],"important":[23],"sci-fi":[24],"themes":[25],"for":[26],"general":[28],"public.":[29],"This":[30,57],"installment":[31],"of":[32,40,51,70,75,91],"Biblio":[33],"Tech":[34],"departs":[35],"from":[36],"normal":[38],"pattern":[39],"examining":[41],"more":[42],"obscure,":[43],"idea-driven":[44],"publications":[45],"focus":[47],"on":[48],"works":[50,102],"a":[52],"contemporary":[53],"best-selling":[54],"author":[55],"instead.":[56],"departure":[58],"is":[59,68],"unusual":[60],"because":[61],"neither":[62],"this":[63,66],"department":[64],"nor":[65],"magazine":[67],"part":[69],"vast":[72],"marketing":[73],"machinery":[74],"today's":[76],"publishing":[77],"industry.":[78],"By":[79],"choosing":[80],"look":[82],"at":[83],"current":[84],"popular":[85],"fiction,":[86],"we":[87,95],"run":[88],"risk":[90],"discovering":[92],"later":[93],"should":[96],"have":[97],"delved":[98],"deeper.":[99],"Nevertheless,":[100],"in":[103,110],"question":[104],"poised":[106],"be":[108],"influential":[109],"years":[112],"come,":[114],"and":[115],"thus":[116],"merit":[117],"our":[118],"attention.":[119]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
