{"id":"https://openalex.org/W4293024072","doi":"https://doi.org/10.1145/3538969.3544456","title":"The cybersecurity-related ethical issues of cloud technology and how to avoid them","display_name":"The cybersecurity-related ethical issues of cloud technology and how to avoid them","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4293024072","doi":"https://doi.org/10.1145/3538969.3544456"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3544456","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544456","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047739580","display_name":"Aleksandra Pawlicka","orcid":"https://orcid.org/0000-0003-4380-014X"},"institutions":[{"id":"https://openalex.org/I4654613","display_name":"University of Warsaw","ror":"https://ror.org/039bjqg32","country_code":"PL","type":"education","lineage":["https://openalex.org/I4654613"]},{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Aleksandra Pawlicka","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and University of Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and University of Warsaw, Poland","institution_ids":["https://openalex.org/I4210118437","https://openalex.org/I4654613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088536972","display_name":"Marek Pawlicki","orcid":"https://orcid.org/0000-0001-5881-6406"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]},{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marek Pawlicki","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035207896","display_name":"Rafa\u0142 Renk","orcid":"https://orcid.org/0000-0001-8518-4440"},"institutions":[{"id":"https://openalex.org/I59411706","display_name":"Adam Mickiewicz University in Pozna\u0144","ror":"https://ror.org/04g6bbq64","country_code":"PL","type":"education","lineage":["https://openalex.org/I59411706"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Renk","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Adam Mickiewicz University, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Adam Mickiewicz University, Poland","institution_ids":["https://openalex.org/I59411706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]},{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047739580"],"corresponding_institution_ids":["https://openalex.org/I4210118437","https://openalex.org/I4654613"],"apc_list":null,"apc_paid":null,"fwci":0.1457,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.38921114,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7553336024284363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7016994953155518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5226671099662781},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4457990825176239}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7553336024284363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7016994953155518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5226671099662781},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4457990825176239},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3538969.3544456","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544456","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2170828276","https://openalex.org/W2288062722","https://openalex.org/W2293944511","https://openalex.org/W2336683339","https://openalex.org/W2744898876","https://openalex.org/W2897197223","https://openalex.org/W3080759852","https://openalex.org/W3101140866","https://openalex.org/W3117690632","https://openalex.org/W3121026260","https://openalex.org/W3190805652","https://openalex.org/W3209552014","https://openalex.org/W4281693361","https://openalex.org/W6809766586"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214"],"abstract_inverted_index":{"Nowadays,":[0],"cloud":[1,56,69,81,112],"technology":[2,20,57,82],"is":[3,14,58,100],"assuming":[4],"immense":[5],"significance,":[6],"being":[7],"treated":[8],"as":[9,37],"a":[10,16,25,73,126,144],"critical":[11],"infrastructure,":[12],"and":[13,31,44,105,131,142],"also":[15,22],"buzzword.":[17],"Nevertheless,":[18],"the":[19,40,47,53,65,76,80,85,91,107,116,123],"has":[21,34],"brought":[23],"about":[24],"number":[26],"of":[27,42,55,68,75,79,87,97,111,129],"new":[28],"adverse":[29],"phenomena":[30],"threats;":[32],"it":[33,102],"attracted":[35],"criminals,":[36],"well.":[38],"Whenever":[39],"questions":[41],"\u201cgood\u201d":[43],"\u201cbad\u201d":[45],"arise,":[46],"ethical":[48,66,77,109,140,152],"issues":[49,78],"arise":[50],"alongside":[51],"them;":[52],"cybersecurity":[54,153],"no":[59],"exception.":[60],"This":[61],"paper":[62],"deals":[63],"with":[64],"dilemmas":[67,110],"technology.":[70],"It":[71],"discusses":[72],"collection":[74,119],"presented":[83],"from":[84],"perspective":[86],"cybersecurity,":[88],"based":[89],"on":[90],"state-of-the-art":[92],"literature.":[93],"The":[94],"main":[95],"contribution":[96],"this":[98],"work":[99,124],"that":[101],"gathers,":[103],"synthesizes":[104],"organises":[106],"cybersecurity-related":[108],"technology,":[113],"thus":[114],"offering":[115],"most":[117],"extensive":[118],"thereof.":[120],"In":[121],"addition,":[122],"presents":[125],"comprehensive":[127],"list":[128],"recommendations":[130],"suggestions":[132],"which":[133],"may":[134],"help":[135],"solve":[136],"or":[137],"prevent":[138],"these":[139],"issues,":[141],"are":[143],"good":[145],"starting":[146],"point":[147],"for":[148],"anyone":[149],"designing":[150],"an":[151],"strategy.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
