{"id":"https://openalex.org/W2511901265","doi":"https://doi.org/10.1145/2905055.2905327","title":"The Cyber Security Issues over Emergency Management","display_name":"The Cyber Security Issues over Emergency Management","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2511901265","doi":"https://doi.org/10.1145/2905055.2905327","mag":"2511901265"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905327","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035437719","display_name":"Jayanthi G. Prisilla","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jayanthi G. Prisilla","raw_affiliation_strings":["Cadet Training Wing, MCEME, Secunderabad"],"affiliations":[{"raw_affiliation_string":"Cadet Training Wing, MCEME, Secunderabad","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5035437719"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.1294239,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9157000184059143,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9157000184059143,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7878674268722534},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5729939341545105},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5496019124984741},{"id":"https://openalex.org/keywords/natural-disaster","display_name":"Natural disaster","score":0.5466535091400146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4778273105621338},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.4707781970500946},{"id":"https://openalex.org/keywords/emergency-management","display_name":"Emergency management","score":0.46693840622901917},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4206305146217346},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3826157748699188}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7878674268722534},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5729939341545105},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5496019124984741},{"id":"https://openalex.org/C166566181","wikidata":"https://www.wikidata.org/wiki/Q8065","display_name":"Natural disaster","level":2,"score":0.5466535091400146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4778273105621338},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.4707781970500946},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.46693840622901917},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4206305146217346},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3826157748699188},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905327","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W151163830","https://openalex.org/W1557947870","https://openalex.org/W1565709248","https://openalex.org/W2187598445","https://openalex.org/W2205291726"],"related_works":["https://openalex.org/W2803684864","https://openalex.org/W4362685783","https://openalex.org/W4399776323","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W3110253113","https://openalex.org/W2898614832","https://openalex.org/W2525905077","https://openalex.org/W2999272536","https://openalex.org/W3080113686"],"abstract_inverted_index":{"The":[0],"necessity":[1],"on":[2],"networks":[3],"for":[4,18,49,62,78],"gathering":[5],"information,":[6],"coordination":[7],"and":[8,11,33,57,84,89],"physical":[9,39],"control":[10],"increase":[12],"in":[13,25],"network":[14,26],"failures":[15],"opens":[16],"access":[17],"cybersecurity.":[19],"A":[20],"cyberattack":[21],"causes":[22],"intentional":[23],"failure":[24],"system":[27],"to":[28],"obstruct":[29],"the":[30,35,50,63,74,100],"first":[31],"retort":[32],"maximize":[34],"impact":[36],"of":[37,97,103],"a":[38,45,79],"emergency.":[40],"Cyber":[41,82],"security":[42,83],"has":[43,53],"become":[44],"national,":[46],"economic":[47],"concern":[48],"society.":[51],"Networking":[52],"linked":[54],"food,":[55],"water":[56],"energy":[58],"as":[59],"critical":[60],"resources":[61],"national":[64],"economy.":[65],"When":[66],"cyber":[67],"infrastructure":[68],"is":[69],"attacked":[70],"by":[71,99],"one":[72],"means,":[73],"analogous":[75],"result":[76],"signifies":[77],"natural":[80],"disaster.":[81],"climate":[85],"change":[86],"are":[87],"associated":[88],"major":[90],"concerns":[91],"can":[92],"make":[93],"an":[94],"essential":[95],"element":[96],"peace":[98],"proposed":[101],"set":[102],"acts":[104]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
