{"id":"https://openalex.org/W2514060096","doi":"https://doi.org/10.1145/2905055.2905358","title":"Data Vault","display_name":"Data Vault","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2514060096","doi":"https://doi.org/10.1145/2905055.2905358","mag":"2514060096"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905358","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905358","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049861514","display_name":"Ashka Shastri","orcid":null},"institutions":[{"id":"https://openalex.org/I3132447494","display_name":"Raksha Shakti University","ror":"https://ror.org/00147fj93","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132447494"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ashka Shastri","raw_affiliation_strings":["Raksha Shakti University, Ahmedabad, India"],"affiliations":[{"raw_affiliation_string":"Raksha Shakti University, Ahmedabad, India","institution_ids":["https://openalex.org/I3132447494"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112648609","display_name":"Priyanka Sharma","orcid":null},"institutions":[{"id":"https://openalex.org/I3132447494","display_name":"Raksha Shakti University","ror":"https://ror.org/00147fj93","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132447494"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Priyanka Sharma","raw_affiliation_strings":["Raksha Shakti University, Ahmedabad, India"],"affiliations":[{"raw_affiliation_string":"Raksha Shakti University, Ahmedabad, India","institution_ids":["https://openalex.org/I3132447494"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049861514"],"corresponding_institution_ids":["https://openalex.org/I3132447494"],"apc_list":null,"apc_paid":null,"fwci":0.6635,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79228772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6234480738639832},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6231670379638672},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6223864555358887},{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.6054525971412659},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5164608955383301},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3485829830169678}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6234480738639832},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6231670379638672},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6223864555358887},{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.6054525971412659},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5164608955383301},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3485829830169678},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905358","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905358","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W102776276","https://openalex.org/W2013745554","https://openalex.org/W2161158131","https://openalex.org/W2182726966","https://openalex.org/W2209896279","https://openalex.org/W2312250904","https://openalex.org/W2545822818","https://openalex.org/W4235400066"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2360288732","https://openalex.org/W2379137242","https://openalex.org/W2758694247","https://openalex.org/W2356928735","https://openalex.org/W2367116219","https://openalex.org/W2382617248","https://openalex.org/W2386142251","https://openalex.org/W2393106355","https://openalex.org/W2364196019"],"abstract_inverted_index":{"The":[0,40,70],"paper":[1,108],"focuses":[2],"on":[3,9,115],"data":[4,21,116],"theft":[5,117],"and":[6,49,85,92,103,118,121],"its":[7,75,82,119],"impact":[8],"organization.":[10],"It":[11],"has":[12],"become":[13],"trivially":[14],"easy":[15],"to":[16,55,61,77,110],"copy":[17],"large":[18],"amount":[19],"of":[20,42,45,64,89],"from":[22,59],"almost":[23],"any":[24,62],"computer":[25],"using":[26],"ever-higher-capacity":[27],"portable":[28],"storage":[29],"devices,":[30],"such":[31],"as":[32,123],"CD/DVD,":[33],"Hard":[34],"Drives,":[35],"USB":[36],"pen":[37],"drives,":[38],"etc.":[39],"development":[41],"new":[43],"forms":[44],"communication":[46],"like":[47],"web-mail":[48],"e-mail":[50],"had":[51],"made":[52],"it":[53],"easier":[54],"transfer":[56],"key":[57],"files":[58],"organizations":[60,79],"part":[63],"the":[65,78,90,101],"world":[66],"often":[67],"in":[68,129],"bulk.":[69],"study":[71],"then":[72],"further":[73],"explores":[74],"consequences":[76],"along":[80],"with":[81],"legal,":[83],"operational":[84],"compliance":[86],"issues.":[87],"Some":[88],"detection":[91],"mitigation":[93],"solution":[94],"available":[95],"will":[96],"be":[97],"discussed":[98],"after":[99],"presenting":[100],"threats":[102],"their":[104,130],"associated":[105],"risks.":[106],"This":[107],"aims":[109],"provide":[111],"a":[112],"comprehensive":[113],"discussion":[114],"prevention,":[120],"serve":[122],"an":[124],"initial":[125],"point":[126],"for":[127],"businesses":[128],"fight":[131],"against":[132],"it.":[133]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-09-16T00:00:00"}
