{"id":"https://openalex.org/W4205516939","doi":"https://doi.org/10.1145/3402127.3402130","title":"Risks to the Public","display_name":"Risks to the Public","publication_year":2020,"publication_date":"2020-07-09","ids":{"openalex":"https://openalex.org/W4205516939","doi":"https://doi.org/10.1145/3402127.3402130"},"language":"en","primary_location":{"id":"doi:10.1145/3402127.3402130","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3402127.3402130","pdf_url":null,"source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015261693","display_name":"Peter G. Neumann","orcid":"https://orcid.org/0009-0008-1197-8000"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]},{"id":"https://openalex.org/I4210099336","display_name":"Menlo School","ror":"https://ror.org/01240pn49","country_code":"US","type":"education","lineage":["https://openalex.org/I4210099336"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Peter G. Neumann","raw_affiliation_strings":["SRI International Computer Science Lab, Menlo Park, CA, USA"],"affiliations":[{"raw_affiliation_string":"SRI International Computer Science Lab, Menlo Park, CA, USA","institution_ids":["https://openalex.org/I1298353152","https://openalex.org/I4210099336"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5015261693"],"corresponding_institution_ids":["https://openalex.org/I1298353152","https://openalex.org/I4210099336"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30275997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"45","issue":"3","first_page":"6","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.06199999898672104,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.06199999898672104,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10747","display_name":"Disaster Management and Resilience","score":0.06129999831318855,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.05290000140666962,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/courtesy","display_name":"Courtesy","score":0.719646692276001},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4580674469470978},{"id":"https://openalex.org/keywords/disk-formatting","display_name":"Disk formatting","score":0.45389270782470703},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.44866734743118286},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.43280982971191406},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4206911623477936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3652965724468231},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3425803482532501},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.3324236273765564},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2954212427139282},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22487106919288635},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.18386521935462952},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09167814254760742}],"concepts":[{"id":"https://openalex.org/C2781168864","wikidata":"https://www.wikidata.org/wiki/Q16515017","display_name":"Courtesy","level":2,"score":0.719646692276001},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4580674469470978},{"id":"https://openalex.org/C88006597","wikidata":"https://www.wikidata.org/wiki/Q690117","display_name":"Disk formatting","level":2,"score":0.45389270782470703},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.44866734743118286},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.43280982971191406},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4206911623477936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3652965724468231},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3425803482532501},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.3324236273765564},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2954212427139282},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22487106919288635},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.18386521935462952},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09167814254760742},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3402127.3402130","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3402127.3402130","pdf_url":null,"source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.44999998807907104,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W562431089","https://openalex.org/W4242728282","https://openalex.org/W4237943178","https://openalex.org/W4254554183","https://openalex.org/W4233439465","https://openalex.org/W4243139849","https://openalex.org/W4235271934","https://openalex.org/W4251298749","https://openalex.org/W592804099"],"abstract_inverted_index":{"Edited":[0],"by":[1,9],"PGN":[2],"(Risks":[3],"Forum":[4,48],"Moderator,":[5],"with":[6,19,64,73],"contribu-":[7],"tions":[8],"others":[10],"as":[11],"indicated.":[12],"Opinions":[13],"are":[14,69],"individual":[15],"rather":[16],"than":[17],"organizational,":[18],"usual":[20],"disclaimers":[21],"implied.":[22],"We":[23],"ad-":[24],"dress":[25],"problems":[26],"relating":[27],"to":[28,36,44],"software,":[29],"hardware,":[30],"people,":[31],"and":[32,61,77],"other":[33],"circumstances":[34],"relevant":[35],"computer":[37],"systems.":[38],"Ref-":[39],"erences":[40],"(R":[41],"i":[42,52],"j)":[43],"the":[45],"online":[46],"Risks":[47],"denote":[49],"RISKS":[50,56,67],"vol":[51],"number":[53],"j.":[54],"Cited":[55],"items":[57],"generally":[58],"identify":[59],"contributors":[60],"sources,":[62],"together":[63],"URLs.":[65],"Official":[66],"archives":[68],"available":[70],"at":[71,85],"www.risks.org,":[72],"nice":[74],"html":[75],"formatting":[76],"search":[78],"engine":[79],"courtesy":[80],"of":[81],"Lindsay":[82],"Mar-":[83],"shall":[84],"Newcastle:;":[86],"http://catless.ncl.ac.uk/Risks/i.j.html":[87],"(also":[88],"ftp://www.sri.com/risks).":[89],"CACM":[90],"Inside":[91],"Risks:":[92],"http://www.csl.sri.com/neumann/insiderisks.html":[93]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
