{"id":"https://openalex.org/W4242542685","doi":"https://doi.org/10.1145/3167996","title":"Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust","display_name":"Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust","publication_year":2018,"publication_date":"2018-12-05","ids":{"openalex":"https://openalex.org/W4242542685","doi":"https://doi.org/10.1145/3167996"},"language":"en","primary_location":{"id":"doi:10.1145/3167996","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3167996","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8471999764442444,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8471999764442444,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5655961036682129},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.5054192543029785},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.444768488407135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33247655630111694},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2336885929107666},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21671897172927856}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5655961036682129},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.5054192543029785},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.444768488407135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33247655630111694},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2336885929107666},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21671897172927856}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3167996","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3167996","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4388258507","https://openalex.org/W2392013855","https://openalex.org/W4318064328","https://openalex.org/W2357926602","https://openalex.org/W2374569605","https://openalex.org/W2386062718","https://openalex.org/W899618282","https://openalex.org/W2386129765","https://openalex.org/W2368742525"],"abstract_inverted_index":{"We":[0],"are":[1,52],"glad":[2],"to":[3,61,88],"present,":[4],"also":[5],"this":[6],"year,":[7],"STAST,":[8],"the":[9,32,59,67,78],"Workshop":[10],"on":[11],"Socio-Technical":[12],"Aspects":[13],"in":[14,20,54,74,84],"Security":[15,35],"and":[16,28,56],"Trust.":[17],"The":[18],"workshop,":[19],"its":[21,40],"7th":[22],"edition,":[23],"is":[24],"once":[25],"more":[26],"time":[27],"proudly":[29],"co-located":[30],"with":[31],"Annual":[33],"Computer":[34],"Applications":[36],"Conference":[37],"(ACSAC).":[38],"At":[39],"conception,":[41],"STAST":[42],"has":[43],"been":[44],"thought":[45],"as":[46],"a":[47],"forum":[48],"for":[49],"researchers":[50],"who":[51],"interested":[53,83],"security":[55,90],"have":[57],"14":[58],"challenge":[60],"develop":[62],"an":[63],"interdisciplinary":[64],"understanding":[65],"of":[66],"subject,":[68],"being":[69],"them":[70],"computer":[71],"scientists":[72],"venturing":[73],"other":[75,80],"domains":[76],"or":[77],"vice-versa,":[79],"domains'":[81],"experts":[82],"steering":[85],"their":[86],"research":[87],"include":[89],"aspects.":[91]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
