{"id":"https://openalex.org/W2049101313","doi":"https://doi.org/10.1145/2751957.2751970","title":"Is Managing IT Security a Mirage?","display_name":"Is Managing IT Security a Mirage?","publication_year":2015,"publication_date":"2015-06-02","ids":{"openalex":"https://openalex.org/W2049101313","doi":"https://doi.org/10.1145/2751957.2751970","mag":"2049101313"},"language":"en","primary_location":{"id":"doi:10.1145/2751957.2751970","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2751957.2751970","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085171081","display_name":"Conrad Shayo","orcid":null},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Conrad Shayo","raw_affiliation_strings":["California State University, San Bernardino, San Bernardino, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, San Bernardino, San Bernardino, CA, USA","institution_ids":["https://openalex.org/I43369023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056526552","display_name":"Javier Torner","orcid":null},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Javier Torner","raw_affiliation_strings":["California State University, San Bernardino, San Bernardino, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, San Bernardino, San Bernardino, CA, USA","institution_ids":["https://openalex.org/I43369023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109123290","display_name":"Frank Yeong\u2010Sung Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frank Lin","raw_affiliation_strings":["California State University, San Bernardino, San Bernardino, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, San Bernardino, San Bernardino, CA, USA","institution_ids":["https://openalex.org/I43369023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036794214","display_name":"Jake Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jake Zhu","raw_affiliation_strings":["California State University, San Bernardino, San Bernardino, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, San Bernardino, San Bernardino, CA, USA","institution_ids":["https://openalex.org/I43369023"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070211047","display_name":"Joon Son","orcid":null},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joon Son","raw_affiliation_strings":["California State University, San Bernardino, San Bernardino, USA"],"affiliations":[{"raw_affiliation_string":"California State University, San Bernardino, San Bernardino, USA","institution_ids":["https://openalex.org/I43369023"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085171081"],"corresponding_institution_ids":["https://openalex.org/I43369023"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.095433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"97","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.672835111618042},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6546880006790161},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.63034588098526},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6027337908744812},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5989530682563782},{"id":"https://openalex.org/keywords/critical-security-studies","display_name":"Critical security studies","score":0.566905677318573},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5358385443687439},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4948529601097107},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.45617222785949707},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.44272708892822266},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.42934104800224304},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.42763036489486694},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4051501452922821},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3961256742477417},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3644255995750427},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.27730420231819153},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.19530734419822693},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12426623702049255}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.672835111618042},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6546880006790161},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.63034588098526},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6027337908744812},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5989530682563782},{"id":"https://openalex.org/C505623098","wikidata":"https://www.wikidata.org/wiki/Q3002932","display_name":"Critical security studies","level":5,"score":0.566905677318573},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5358385443687439},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4948529601097107},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.45617222785949707},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.44272708892822266},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.42934104800224304},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42763036489486694},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4051501452922821},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3961256742477417},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3644255995750427},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.27730420231819153},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.19530734419822693},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12426623702049255},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2751957.2751970","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2751957.2751970","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1984946784","https://openalex.org/W2248649183"],"related_works":["https://openalex.org/W3044656951","https://openalex.org/W833563683","https://openalex.org/W2165898552","https://openalex.org/W2379320583","https://openalex.org/W1602866665","https://openalex.org/W265693751","https://openalex.org/W88610236","https://openalex.org/W2418642600","https://openalex.org/W1528506334","https://openalex.org/W2030343105"],"abstract_inverted_index":{"The":[0,20,80],"purpose":[1],"of":[2,61,102],"this":[3],"panel":[4,81],"is":[5,71],"to":[6,10,53,67,74],"provide":[7],"a":[8,116],"forum":[9],"discuss":[11,25],"the":[12,26,45,62,86,100,105,110],"main":[13],"IT":[14,31,42,55,77,88,114],"security":[15,32,43,56,78,89],"issues":[16],"confronting":[17],"organizations":[18],"today.":[19],"panelists":[21],"and":[22,58,91,98],"attendees":[23],"will":[24,82],"existing":[27],"gap":[28],"between":[29],"current":[30],"practices":[33,36,92],"vs.":[34],"best":[35],"based":[37],"on":[38,41],"survey":[39],"trends":[40],"for":[44],"past":[46],"5":[47],"years,":[48],"explore":[49],"popular":[50,64],"models":[51],"used":[52],"justify":[54],"investments,":[57],"showcase":[59],"some":[60],"most":[63],"hacking":[65],"tools":[66],"demonstrate":[68],"why":[69],"it":[70],"so":[72],"easy":[73],"compromise":[75],"organizational":[76],"assets.":[79],"conclude":[83],"by":[84],"discussing":[85],"emerging":[87],"standards":[90],"that":[93],"may":[94],"help":[95],"deter,":[96],"detect,":[97],"mitigate":[99],"impact":[101],"cyber-attacks.":[103],"As":[104],"title":[106],"suggests,":[107],"we":[108],"posit":[109],"question:":[111],"Is":[112],"Managing":[113],"Security":[115],"Mirage?":[117]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
