{"id":"https://openalex.org/W2990211830","doi":"https://doi.org/10.1145/3357613.3357632","title":"Development of information security quest based on use of information and communication technologies","display_name":"Development of information security quest based on use of information and communication technologies","publication_year":2019,"publication_date":"2019-09-12","ids":{"openalex":"https://openalex.org/W2990211830","doi":"https://doi.org/10.1145/3357613.3357632","mag":"2990211830"},"language":"en","primary_location":{"id":"doi:10.1145/3357613.3357632","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3357613.3357632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028667229","display_name":"Ishchukova Evgenia","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Ishchukova Evgenia","raw_affiliation_strings":["Southern Federal University, SFedU, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, SFedU, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018625534","display_name":"Maro Ekaterina","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Maro Ekaterina","raw_affiliation_strings":["Southern Federal University, SFedU, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, SFedU, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083326053","display_name":"Veselov Gennady","orcid":null},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Veselov Gennady","raw_affiliation_strings":["Southern Federal University, SFedU, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Southern Federal University, SFedU, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028667229"],"corresponding_institution_ids":["https://openalex.org/I137534880"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.21559295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12734","display_name":"Information Systems and Technology Applications","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6727597117424011},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.669384241104126},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6687721014022827},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6458712816238403},{"id":"https://openalex.org/keywords/flash","display_name":"Flash (photography)","score":0.5507909655570984},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5480631589889526},{"id":"https://openalex.org/keywords/envelope","display_name":"Envelope (radar)","score":0.4364137351512909},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3398197293281555},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11859595775604248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6727597117424011},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.669384241104126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6687721014022827},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6458712816238403},{"id":"https://openalex.org/C2777526259","wikidata":"https://www.wikidata.org/wiki/Q221836","display_name":"Flash (photography)","level":2,"score":0.5507909655570984},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5480631589889526},{"id":"https://openalex.org/C65155139","wikidata":"https://www.wikidata.org/wiki/Q5380912","display_name":"Envelope (radar)","level":3,"score":0.4364137351512909},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3398197293281555},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11859595775604248},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3357613.3357632","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3357613.3357632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1978816405","https://openalex.org/W2054626033","https://openalex.org/W2058258244","https://openalex.org/W2064852603","https://openalex.org/W2582409650","https://openalex.org/W2950192549"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2656445685","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W1989237518","https://openalex.org/W2002093701","https://openalex.org/W4399463150"],"abstract_inverted_index":{"The":[0,76],"article":[1],"presents":[2],"a":[3,49],"developed":[4],"quest":[5],"based":[6,33],"on":[7,34],"information":[8,20,42],"security":[9],"tasks":[10],"and":[11,67,82],"aimed":[12],"at":[13,85],"involving":[14],"students":[15],"in":[16],"the":[17,25,46,55,58,74,86],"field":[18],"of":[19,28,36,57,73],"security,":[21],"as":[22,24],"well":[23],"practical":[26],"implementation":[27],"professional":[29],"competencies.":[30],"Quest's":[31],"scenario":[32,48],"investigation":[35,77],"crimes,":[37],"which":[38],"committed":[39],"using":[40],"computer":[41],"technology.":[43],"According":[44],"to":[45],"game":[47],"flash":[50,63],"drive":[51,64],"was":[52],"stolen":[53],"from":[54,69],"office":[56],"famous":[59],"bank":[60],"\"CoinInvest\",":[61],"this":[62],"contains":[65],"keys":[66],"passwords":[68],"entire":[70],"client":[71],"base":[72],"bank.":[75],"team":[78],"founds":[79],"an":[80],"envelope":[81],"several":[83],"clues":[84],"crime":[87],"scene.":[88]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
