{"id":"https://openalex.org/W3177563910","doi":"https://doi.org/10.1145/3466933.3466983","title":"IoT solution information security certification conceptual framework","display_name":"IoT solution information security certification conceptual framework","publication_year":2021,"publication_date":"2021-06-07","ids":{"openalex":"https://openalex.org/W3177563910","doi":"https://doi.org/10.1145/3466933.3466983","mag":"3177563910"},"language":"en","primary_location":{"id":"doi:10.1145/3466933.3466983","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3466933.3466983","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3466933.3466983","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"XVII Brazilian Symposium on Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3466933.3466983","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102409595","display_name":"Luiz Ot\u00e1vio Duarte","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Luiz Otavio Duarte","raw_affiliation_strings":["Facti"],"affiliations":[{"raw_affiliation_string":"Facti","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108255266","display_name":"Jos\u00e9 Augusto de Lima Prestes","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jos\u00e9 Augusto de Lima Prestes","raw_affiliation_strings":["Facti"],"affiliations":[{"raw_affiliation_string":"Facti","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102409595"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5508,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71908984,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.8357874155044556},{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.6727643013000488},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.667424201965332},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6015101075172424},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5001251697540283},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.4925101697444916},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4761062562465668},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4636116921901703},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.457450807094574},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4389958679676056},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.43669593334198},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3727952539920807},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3533281683921814},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1660541594028473},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16430681943893433},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1352045238018036}],"concepts":[{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.8357874155044556},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.6727643013000488},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.667424201965332},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6015101075172424},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5001251697540283},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.4925101697444916},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4761062562465668},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4636116921901703},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.457450807094574},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4389958679676056},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.43669593334198},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3727952539920807},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3533281683921814},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1660541594028473},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16430681943893433},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1352045238018036},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3466933.3466983","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3466933.3466983","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3466933.3466983","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"XVII Brazilian Symposium on Information Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3466933.3466983","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3466933.3466983","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3466933.3466983","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"XVII Brazilian Symposium on Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5102972269","display_name":null,"funder_award_id":"01.16.0053.00","funder_id":"https://openalex.org/F4320322904","funder_display_name":"Financiadora de Estudos e Projetos"}],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"},{"id":"https://openalex.org/F4320321178","display_name":"Governo Brasil","ror":"https://ror.org/00n0s9w57"},{"id":"https://openalex.org/F4320322904","display_name":"Financiadora de Estudos e Projetos","ror":"https://ror.org/030w99567"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3177563910.pdf","grobid_xml":"https://content.openalex.org/works/W3177563910.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W2065427462","https://openalex.org/W2143591442","https://openalex.org/W2258704673","https://openalex.org/W2649501556","https://openalex.org/W2765193740","https://openalex.org/W2972876827","https://openalex.org/W2987636659","https://openalex.org/W2995492222","https://openalex.org/W3101282381"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W2586548817","https://openalex.org/W4311097251","https://openalex.org/W2656997359","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W2022021367"],"abstract_inverted_index":{"The":[0],"rapid":[1],"growth":[2],"of":[3,5,13,43,61,129,144],"Internet":[4],"Things":[6],"(IoT)":[7],"solutions":[8,86,89],"development":[9,15],"and":[10,24,30,56,69,87,101,115,135],"the":[11,19,25,41,54],"rise":[12],"agile":[14],"utilization,":[16],"combined":[17],"with":[18],"so-called":[20],"\u201clow":[21],"touch":[22],"economy\u201d":[23],"recent":[26],"discussions":[27],"on":[28,53],"privacy":[29],"data":[31],"protection":[32],"brought":[33],"several":[34,44],"demands":[35],"related":[36],"to":[37,140,153],"Information":[38,62,67],"Security.":[39],"Despite":[40],"existence":[42],"efforts":[45],"\u2013":[46,51],"either":[47],"academic":[48],"or":[49,149],"not":[50],"focused":[52],"definition":[55],"implementation":[57],"strategies":[58],"for":[59,66],"certification":[60,98,104,163],"Security":[63],"models":[64,105],"designed":[65],"Technology":[68],"Communications":[70],"(ICT)":[71],"solutions,":[72],"these":[73],"aren't":[74],"widely":[75],"adopted.":[76],"In":[77],"addition,":[78],"there":[79],"are":[80,118],"significant":[81],"differences":[82],"between":[83],"typical":[84],"IoT":[85],"ICT":[88],"as":[90,111],"traditionally":[91],"presented,":[92],"which":[93],"ends":[94],"up":[95],"demanding":[96],"different":[97],"strategies.":[99],"Continuous":[100],"more":[102,126],"dynamic":[103],"(using":[106],"cutting":[107],"edge":[108,133],"technologies":[109],"such":[110],"blockchain,":[112],"self-regulation,":[113],"analytics,":[114],"artificial":[116],"intelligence)":[117],"demanded":[119],"in":[120],"this":[121],"context.":[122],"This":[123],"work":[124],"discusses":[125],"effective":[127,160],"forms":[128],"certification,":[130],"using":[131],"innovative":[132],"concepts":[134],"technologies,":[136],"at":[137],"first":[138],"aiming":[139],"identify":[141],"a":[142],"set":[143],"inhibiting":[145],"factors,":[146],"offenders,":[147],"challenges":[148],"issues":[150],"that":[151],"need":[152],"be":[154],"addressed":[155],"correctly":[156],"when":[157],"developing":[158],"an":[159],"large-scale":[161],"security":[162],"model.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
