{"id":"https://openalex.org/W4206391215","doi":"https://doi.org/10.1145/3498891","title":"New Security Paradigms Workshop","display_name":"New Security Paradigms Workshop","publication_year":2021,"publication_date":"2021-10-25","ids":{"openalex":"https://openalex.org/W4206391215","doi":"https://doi.org/10.1145/3498891"},"language":"en","primary_location":{"id":"doi:10.1145/3498891","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3498891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/normative","display_name":"Normative","score":0.7622227668762207},{"id":"https://openalex.org/keywords/appeal","display_name":"Appeal","score":0.7348426580429077},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6622004508972168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5092290639877319},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5024731159210205},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.47840389609336853},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.45454829931259155},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.3711400032043457},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.33249348402023315},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2505544424057007},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.20523539185523987},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19755405187606812},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07891732454299927}],"concepts":[{"id":"https://openalex.org/C44725695","wikidata":"https://www.wikidata.org/wiki/Q288156","display_name":"Normative","level":2,"score":0.7622227668762207},{"id":"https://openalex.org/C2778449503","wikidata":"https://www.wikidata.org/wiki/Q329777","display_name":"Appeal","level":2,"score":0.7348426580429077},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6622004508972168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5092290639877319},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5024731159210205},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.47840389609336853},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.45454829931259155},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.3711400032043457},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.33249348402023315},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2505544424057007},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.20523539185523987},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19755405187606812},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07891732454299927},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3498891","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3498891","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2270327411","https://openalex.org/W2161479870","https://openalex.org/W1528479792","https://openalex.org/W581435334","https://openalex.org/W2372523617","https://openalex.org/W2537778971","https://openalex.org/W2381437869","https://openalex.org/W3144558929","https://openalex.org/W1530384998","https://openalex.org/W4386651600"],"abstract_inverted_index":{"This":[0],"paper":[1],"considers":[2],"which":[3],"types":[4],"of":[5,30],"evidence":[6],"guide":[7],"cybersecurity":[8],"decisions.":[9],"We":[10],"argue":[11],"that":[12,39],"the":[13,17],"\u201cInfoSec":[14],"belongs":[15],"to":[16,32],"quants\u201d":[18],"paradigm":[19],"will":[20],"not":[21],"be":[22],"realised":[23],"despite":[24],"its":[25],"normative":[26],"appeal.":[27],"In":[28],"terms":[29],"progress":[31],"date,":[33],"we":[34],"find":[35],"few":[36],"empirical":[37],"results":[38],"...":[40]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
