{"id":"https://openalex.org/W2912654124","doi":"https://doi.org/10.1145/2994539","title":"Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security","display_name":"Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2912654124","doi":"https://doi.org/10.1145/2994539","mag":"2912654124"},"language":"en","primary_location":{"id":"doi:10.1145/2994539","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2994539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.8507999777793884,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.8507999777793884,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7838000059127808,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.7242000102996826,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5573893785476685},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.47895532846450806},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4514155387878418},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4412488043308258},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.42558354139328003},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4228877127170563},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.4223024547100067},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4079650640487671},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37088003754615784},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.3621750771999359},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3308194875717163},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2400898039340973},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.17966124415397644}],"concepts":[{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5573893785476685},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.47895532846450806},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4514155387878418},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4412488043308258},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.42558354139328003},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4228877127170563},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.4223024547100067},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4079650640487671},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37088003754615784},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3621750771999359},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3308194875717163},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2400898039340973},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.17966124415397644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2994539","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2994539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4239903230","https://openalex.org/W2736591912","https://openalex.org/W2413139217","https://openalex.org/W2062888213","https://openalex.org/W377587031","https://openalex.org/W2804010965","https://openalex.org/W2101639287","https://openalex.org/W2015658718"],"abstract_inverted_index":{"It":[0],"is":[1,26,84,92,241],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,27,47,113,211],"welcome":[6],"you":[7],"the":[9,29,53,96,107,116,122,126,159,208,212,229,246,270],"2016":[10],"ACM":[11],"Workshop":[12],"on":[13],"Information":[14,214],"Sharing":[15,215],"and":[16,35,56,59,100,131,139,145,158,162,178,201,217,264],"Collaborative":[17],"Security":[18],"--":[19],"WISCS'16.":[20],"The":[21,40,88,148,164,204],"mission":[22],"of":[23,118,128,170,187,231,248,273],"this":[24],"workshop":[25],"advance":[28],"scientific":[30],"foundations":[31],"for":[32,42,125,150,191,196,222],"sharing":[33,45,83,193],"threat":[34],"security-related":[36],"data":[37],"among":[38],"organizations.":[39],"call":[41],"better":[43],"information":[44,192,197],"continues":[46],"be":[48,114],"a":[49,79,185,242],"major":[50],"theme":[51],"in":[52,109,135,245,253,261],"security":[54,68,249],"community":[55,91],"inspires":[57],"exciting":[58],"diverse":[60],"academic":[61],"research.":[62],"In":[63],"addition":[64],"commercial":[65],"offerings":[66],"by":[67,71,224],"vendors":[69],"are":[70,77],"now":[72],"operational,":[73],"suggesting":[74],"that":[75,234],"we":[76],"reaching":[78],"stage":[80],"where":[81],"automated":[82],"becoming":[85],"more":[86],"common.":[87],"public":[89],"policy":[90,146],"debating,":[93],"sometimes":[94],"vigorously,":[95],"privacy,":[97],"civil":[98],"liberties":[99],"liability":[101],"issues":[102],"involved.":[103],"This":[104],"year's":[105],"workshop,":[106],"third":[108],"its":[110],"series,":[111],"aims":[112],"at":[115,228],"forefront":[117],"these":[119],"developments":[120],"as":[121,141,143,175,180],"premier":[123],"forum":[124],"presentation":[127],"research":[129],"results":[130],"practical":[132],"case":[133],"studies":[134,200],"collaborative":[136],"security,":[137],"privacy":[138],"confidentiality,":[140],"well":[142],"legal":[144],"issues.":[147],"Call":[149],"Papers":[151],"attracted":[152],"submissions":[153,169],"from":[154],"Africa,":[155],"Asia,":[156],"Europe,":[157,254],"United":[160],"States":[161],"Canada.":[163],"program":[165,205],"committee":[166],"reviewed":[167],"24":[168],"which":[171],"8":[172],"were":[173],"accepted":[174],"full":[176],"papers":[177],"1":[179],"short":[181],"papers.":[182],"They":[183],"cover":[184],"variety":[186],"topics":[188],"including":[189],"models":[190],"intelligence,":[194],"tools":[195],"sharing,":[198],"real-world":[199],"many":[202],"others.":[203],"opens":[206],"with":[207],"keynote":[209],"'Back":[210],"Roots:":[213],"Economics":[216],"What":[218],"We":[219],"Can":[220],"Learn":[221],"Security'":[223],"Rainer":[225,240],"B\u00f6hme,":[226],"Professor":[227],"University":[230],"Innsbruck":[232],"(Austria)":[233],"will":[235],"surely":[236],"stimulate":[237],"interesting":[238],"discussions.":[239],"leading":[243],"scientist":[244],"economics":[247],"recognized":[250],"not":[251],"only":[252],"but":[255],"world-wide.":[256],"For":[257],"his":[258,265],"work":[259],"published":[260],"WISCS'15":[262],"he":[263],"co-author":[266],"Stefan":[267],"Laube":[268],"received":[269],"Lloyd's":[271],"Science":[272],"Risk":[274],"Prize":[275],"2015.":[276]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
