{"id":"https://openalex.org/W2603360233","doi":"https://doi.org/10.1145/3055186.3055190","title":"On the Disappearing Boundary Between Digital, Physical, and Social Spaces","display_name":"On the Disappearing Boundary Between Digital, Physical, and Social Spaces","publication_year":2017,"publication_date":"2017-03-31","ids":{"openalex":"https://openalex.org/W2603360233","doi":"https://doi.org/10.1145/3055186.3055190","mag":"2603360233"},"language":"en","primary_location":{"id":"doi:10.1145/3055186.3055190","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3055186.3055190","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060861082","display_name":"Bashar Nuseibeh","orcid":"https://orcid.org/0000-0002-3476-053X"},"institutions":[{"id":"https://openalex.org/I204136569","display_name":"The Open University","ror":"https://ror.org/05mzfcs16","country_code":"GB","type":"education","lineage":["https://openalex.org/I204136569"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Bashar Nuseibeh","raw_affiliation_strings":["The Open University &amp; Lero, Milton Keynes, United Kingdom"],"affiliations":[{"raw_affiliation_string":"The Open University &amp; Lero, Milton Keynes, United Kingdom","institution_ids":["https://openalex.org/I204136569"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5060861082"],"corresponding_institution_ids":["https://openalex.org/I204136569"],"apc_list":null,"apc_paid":null,"fwci":0.3698,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.54357276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6893396973609924},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6466221213340759},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6254693269729614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6157065629959106},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5029048323631287},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3474162220954895},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.30994144082069397}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6893396973609924},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6466221213340759},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6254693269729614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6157065629959106},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5029048323631287},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3474162220954895},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.30994144082069397},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3055186.3055190","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3055186.3055190","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2765017617","display_name":null,"funder_award_id":"291652 - ASAP","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"}],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"},{"id":"https://openalex.org/F4320327550","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Boundaries":[0],"play":[1],"a":[2,168,171,203,221,233,257],"critical":[3],"role":[4],"in":[5,100,220,255,293,311],"the":[6,18,23,32,37,48,58,78,81,84,88,94,97,110,135,154,197,208,249,263,290,294,321,345,358],"systems":[7,67,103,253],"development":[8,250,264],"process.":[9],"In":[10,43,243],"software":[11,24,38,332],"engineering,":[12,45],"boundaries":[13,46,73,79,95,107,239,271],"are":[14,352],"used":[15],"to":[16,27,30,63,184,231,236,273,286,320,354],"scope":[17,31],"real":[19],"world":[20,222],"problems":[21],"that":[22,60,74,87,283,323,342],"is":[25,227],"required":[26],"address,":[28],"and":[29,83,118,130,137,176,178,188,205,216,241,259,276,304,340,349],"design":[33,209],"solutions":[34],"through":[35],"which":[36,51,101,113,314],"will":[39,104],"meet":[40],"its":[41],"requirements.":[42],"security":[44,119,334,348],"delimit":[47],"points":[49],"at":[50],"assets":[52],"may":[53,166,179,194,284],"be":[54,232,274],"legitimately":[55],"accessed":[56],"or":[57,146,210,333],"defences":[59],"attackers":[61],"seek":[62],"breach.":[64],"Cyber":[65],"physical":[66,85,365],"(CPS)":[68],"add":[69],"another":[70],"set":[71,260],"of":[72,125,139,142,156,174,223,251,265,289,344,347,357,361],"require":[75],"consideration":[76],"-":[77,144,148],"between":[80,213],"digital":[82],"spaces":[86,99],"CPS":[89,143,169],"inhabit,":[90],"as":[91,93,170,331],"well":[92],"with":[96,153],"social":[98,189,217],"such":[102,160,256,330],"operate.":[105],"These":[106],"have":[108],"been":[109],"bedrock":[111],"upon":[112],"developers":[114],"build":[115],"software,":[116,301],"systems,":[117,126,269,313],"capabilities.":[120],"They":[121],"help":[122],"manage":[123,131],"complexity":[124],"organise":[127],"their":[128,132],"development,":[129],"deployment.":[133],"However,":[134],"views":[136],"behaviours":[138],"\"end":[140],"users\"":[141],"legitimate":[145],"otherwise":[147],"do":[149],"not":[150,180],"always":[151],"align":[152],"separation":[155],"concerns":[157],"embodied":[158],"by":[159,202],"boundaries.":[161],"Legitimate":[162],"users,":[163],"for":[164,298],"example,":[165],"see":[167],"single":[172,327],"provider":[173],"services":[175],"functions,":[177],"find":[181],"it":[182],"useful":[183],"separate":[185],"digital,":[186,214],"physical,":[187,215],"considerations.":[190],"Similarly,":[191],"malicious":[192],"users":[193],"intentionally":[195],"exploit":[196,207],"larger":[198],"attack":[199],"surfaces":[200],"presented":[201],"CPS,":[204],"actively":[206],"accidental":[211],"interplay":[212,346],"spaces.":[218],"Thus,":[219],"disappearing":[224],"boundaries,":[225],"there":[226],"sometimes":[228],"what":[229],"appears":[230],"conflicting":[234],"need":[235,272],"make":[237],"these":[238],"visible":[240],"explicit.":[242],"our":[244,309],"research":[245,291,310,318],"work,":[246],"we":[247,315,337],"explore":[248],"software-intensive":[252],"deployed":[254],"world,":[258],"this":[261],"against":[262],"secure,":[266],"privacy-aware,":[267],"forensics-ready":[268],"where":[270],"recognised":[275],"managed.":[277],"We":[278,307],"suggest":[279],"some":[280,288,356],"technical":[281,328],"contributions":[282],"contribute":[285],"addressing":[287],"challenges":[292,319,360],"area,":[295],"including":[296],"techniques":[297],"engineering":[299],"adaptive":[300],"collaborative":[302],"security,":[303],"topology":[305],"awareness.":[306],"contextualise":[308],"cyber-physical-social":[312],"argue":[316],"provide":[317],"community":[322],"go":[324],"beyond":[325],"any":[326],"discipline":[329],"engineering.":[335],"Indeed":[336],"further":[338],"argue,":[339],"demonstrate,":[341],"considerations":[343],"human":[350],"behaviour":[351],"fundamental":[353],"tackling":[355],"key":[359],"developing":[362],"secure":[363],"cyber":[364],"systems.":[366]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
