{"id":"https://openalex.org/W2210897771","doi":"https://doi.org/10.1145/2751957.2751977","title":"Cracks in the Security Foundation","display_name":"Cracks in the Security Foundation","publication_year":2015,"publication_date":"2015-06-02","ids":{"openalex":"https://openalex.org/W2210897771","doi":"https://doi.org/10.1145/2751957.2751977","mag":"2210897771"},"language":"en","primary_location":{"id":"doi:10.1145/2751957.2751977","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2751957.2751977","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106128555","display_name":"Michelle L. Kaarst\u2010Brown","orcid":"https://orcid.org/0000-0003-4328-5010"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michelle L. Kaarst-Brown","raw_affiliation_strings":["Syracuse University, Syracuse, NY, Uganda"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, Uganda","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052116336","display_name":"E. Dale Thompson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E. Dale Thompson","raw_affiliation_strings":["Thompson &amp; Associates, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"Thompson &amp; Associates, Dallas, TX, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5106128555"],"corresponding_institution_ids":["https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.13344088,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.6850351095199585},{"id":"https://openalex.org/keywords/classified-information","display_name":"Classified information","score":0.5908944606781006},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5907330513000488},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5543069839477539},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5370824337005615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49463269114494324},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.47932732105255127},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.45200297236442566},{"id":"https://openalex.org/keywords/criticality","display_name":"Criticality","score":0.4489905834197998},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4444020688533783},{"id":"https://openalex.org/keywords/foundation","display_name":"Foundation (evidence)","score":0.42648112773895264},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4201137125492096},{"id":"https://openalex.org/keywords/everyday-life","display_name":"Everyday life","score":0.41428685188293457},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3761400580406189},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3705536723136902},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.20493623614311218},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.18914812803268433},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.18495431542396545},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.13988322019577026}],"concepts":[{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.6850351095199585},{"id":"https://openalex.org/C124181835","wikidata":"https://www.wikidata.org/wiki/Q846498","display_name":"Classified information","level":2,"score":0.5908944606781006},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5907330513000488},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5543069839477539},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5370824337005615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49463269114494324},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.47932732105255127},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.45200297236442566},{"id":"https://openalex.org/C125611927","wikidata":"https://www.wikidata.org/wiki/Q17008131","display_name":"Criticality","level":2,"score":0.4489905834197998},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4444020688533783},{"id":"https://openalex.org/C2780966255","wikidata":"https://www.wikidata.org/wiki/Q5474306","display_name":"Foundation (evidence)","level":2,"score":0.42648112773895264},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4201137125492096},{"id":"https://openalex.org/C2779018934","wikidata":"https://www.wikidata.org/wiki/Q1129653","display_name":"Everyday life","level":2,"score":0.41428685188293457},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3761400580406189},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3705536723136902},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.20493623614311218},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.18914812803268433},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.18495431542396545},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.13988322019577026},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2751957.2751977","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2751957.2751977","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W409122566","https://openalex.org/W1495403436","https://openalex.org/W1502300933","https://openalex.org/W1516532723","https://openalex.org/W1622882452","https://openalex.org/W1969134440","https://openalex.org/W1976340141","https://openalex.org/W1994354959","https://openalex.org/W2048263301","https://openalex.org/W2049026256","https://openalex.org/W2094908256","https://openalex.org/W2105992541","https://openalex.org/W2139836766","https://openalex.org/W2148404854","https://openalex.org/W2410922291","https://openalex.org/W2506490502","https://openalex.org/W3126074005","https://openalex.org/W4210904733","https://openalex.org/W4244021162","https://openalex.org/W4285719527","https://openalex.org/W4386598265"],"related_works":["https://openalex.org/W118448456","https://openalex.org/W2260680879","https://openalex.org/W2596305496","https://openalex.org/W2172222246","https://openalex.org/W2050283318","https://openalex.org/W2290534421","https://openalex.org/W2210897771","https://openalex.org/W4301222081","https://openalex.org/W2963272729","https://openalex.org/W2541669863"],"abstract_inverted_index":{"Despite":[0],"the":[1,28,74,95,104,127],"increased":[2],"focus":[3],"on":[4,11,17,136],"IT":[5,75,86,153,160],"security,":[6],"much":[7],"of":[8,30,35,132,145,163,173],"our":[9],"reliance":[10],"\"information":[12],"sensitivity":[13,96,122],"classifications\"":[14],"is":[15,48,124],"based":[16],"broadly":[18],"specified":[19],"technical":[20,90],"\"access":[21],"controls\"":[22],"or":[23,55],"policies":[24],"and":[25,46,92,94,114,130,161,167],"procedures":[26],"for":[27,152],"handling":[29],"organizational":[31],"data":[32],"--":[33],"many":[34],"them":[36],"developed":[37],"incrementally":[38],"over":[39],"decades.":[40],"One":[41],"area":[42],"ignored":[43],"in":[44,61,73,112,155,159],"research":[45],"practice":[47],"how":[49,156],"human":[50,171],"beings":[51],"make":[52,102],"\"sensitivity":[53],"judgments\"":[54],"\"classify\"":[56],"information":[57,106,121,133],"they":[58,107],"may":[59],"encounter":[60],"everyday":[62,99],"activities.":[63],"This":[64,78],"has":[65,80],"left":[66],"what":[67],"we":[68,148],"view":[69],"as":[70],"a":[71,82,117,137],"crack":[72,79],"security":[76,87,154],"foundation.":[77],"created":[81],"tension":[83],"between":[84],"formal":[85],"classification":[88,123],"schema,":[89],"controls,":[91],"policy,":[93],"judgments":[97,172],"that":[98,141],"workers":[100],"must":[101],"about":[103],"non-coded":[105],"deal":[108],"with.":[109],"As":[110],"noted":[111],"government":[113],"private":[115],"reports,":[116],"new":[118],"look":[119],"at":[120],"vital":[125],"to":[126,169],"expanding":[128],"reach":[129],"criticality":[131],"security.":[134],"Based":[135],"grounded":[138],"theory":[139],"study":[140],"elicited":[142],"188":[143],"judgements":[144],"sensitive":[146,174],"information,":[147],"found":[149],"valuable":[150],"lessons":[151],"workers,":[157],"both":[158],"outside":[162],"IT,":[164],"recognize,":[165],"classify,":[166],"react":[168],"their":[170],"information.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
