{"id":"https://openalex.org/W4400948620","doi":"https://doi.org/10.1145/3672919.3672924","title":"Information security protection in hybrid office","display_name":"Information security protection in hybrid office","publication_year":2024,"publication_date":"2024-03-01","ids":{"openalex":"https://openalex.org/W4400948620","doi":"https://doi.org/10.1145/3672919.3672924"},"language":"en","primary_location":{"id":"doi:10.1145/3672919.3672924","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672924","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100809293","display_name":"Jun Ma","orcid":"https://orcid.org/0000-0003-1684-7751"},"institutions":[{"id":"https://openalex.org/I902764099","display_name":"SEGi University","ror":"https://ror.org/05crr5s63","country_code":"MY","type":"education","lineage":["https://openalex.org/I902764099"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Jun Ma","raw_affiliation_strings":["SEGi University, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-1684-7751","affiliations":[{"raw_affiliation_string":"SEGi University, Malaysia","institution_ids":["https://openalex.org/I902764099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013002839","display_name":"Syazwina Binti Alias","orcid":null},"institutions":[{"id":"https://openalex.org/I902764099","display_name":"SEGi University","ror":"https://ror.org/05crr5s63","country_code":"MY","type":"education","lineage":["https://openalex.org/I902764099"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Syazwina Alias","raw_affiliation_strings":["SEGi University, Malaysia"],"raw_orcid":"https://orcid.org/0009-0005-6616-9612","affiliations":[{"raw_affiliation_string":"SEGi University, Malaysia","institution_ids":["https://openalex.org/I902764099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103967863","display_name":"C. Derrick Huang","orcid":"https://orcid.org/0009-0008-9582-2950"},"institutions":[{"id":"https://openalex.org/I2800393352","display_name":"China Tourism Academy","ror":"https://ror.org/01k4abj61","country_code":"CN","type":"government","lineage":["https://openalex.org/I2800393352"]},{"id":"https://openalex.org/I4392738314","display_name":"Guilin Tourism University","ror":"https://ror.org/013a79z51","country_code":null,"type":"education","lineage":["https://openalex.org/I4392738314"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunya Huang","raw_affiliation_strings":["Guilin Tourism University, China"],"raw_orcid":"https://orcid.org/0009-0008-9582-2950","affiliations":[{"raw_affiliation_string":"Guilin Tourism University, China","institution_ids":["https://openalex.org/I2800393352","https://openalex.org/I4392738314"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100809293"],"corresponding_institution_ids":["https://openalex.org/I902764099"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1158407,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.651674211025238},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6445485353469849},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5843080282211304},{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.5271458625793457},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5260750651359558},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.34313663840293884},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3407934308052063},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.30290573835372925},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07360312342643738}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.651674211025238},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6445485353469849},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5843080282211304},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.5271458625793457},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5260750651359558},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.34313663840293884},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3407934308052063},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.30290573835372925},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07360312342643738},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672919.3672924","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672924","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2093355488","https://openalex.org/W2290534421","https://openalex.org/W2605497964","https://openalex.org/W2611452836","https://openalex.org/W2763195657","https://openalex.org/W2806192509","https://openalex.org/W2912254402","https://openalex.org/W3008555299","https://openalex.org/W3090066280","https://openalex.org/W3093964786","https://openalex.org/W3127815173","https://openalex.org/W3196769678","https://openalex.org/W4200224268","https://openalex.org/W4220916691"],"related_works":["https://openalex.org/W2120971814","https://openalex.org/W2508914475","https://openalex.org/W4310892428","https://openalex.org/W4293770853","https://openalex.org/W2356973015","https://openalex.org/W2777401565","https://openalex.org/W2248314326","https://openalex.org/W4390655704","https://openalex.org/W2033357182","https://openalex.org/W4299810435"],"abstract_inverted_index":{"In":[0,147],"a":[1,10,29,63,84],"hybrid":[2],"office":[3,32,166],"work":[4],"environment,":[5],"as":[6],"computers":[7,47,68],"run":[8],"on":[9],"public":[11],"network,":[12],"both":[13],"the":[14,19,36,80,97,101,112,124,138,149,161,164],"computer":[15],"equipment":[16,42],"used":[17,107,130],"and":[18,43,60,110,120,122,133,159],"private":[20],"network":[21,113],"are":[22,48],"more":[23],"susceptible":[24],"to":[25,35,50,56,95,108,131,135],"cyber-attacks":[26],"than":[27],"in":[28,58],"traditional":[30],"workplace":[31],"environment.":[33,167],"Due":[34],"lack":[37],"of":[38,87,151,163],"protection":[39],"from":[40],"firewall":[41],"security":[44],"rings,":[45],"local":[46,67],"subjected":[49],"cyber-flooding":[51],"attacks,":[52],"which":[53],"can":[54,154],"lead":[55],"interruptions":[57],"work,":[59],"there":[61,116,142],"is":[62],"greater":[64],"chance":[65],"that":[66],"will":[69,92,105,117,128,143],"be":[70,93,106,118,129,144],"implanted":[71],"with":[72],"Trojan":[73,125],"horses":[74],"by":[75],"phishing":[76],"websites.":[77],"To":[78],"address":[79],"above":[81,98],"two":[82],"problems,":[83],"complete":[85],"set":[86],"virtual":[88],"desktop":[89],"operating":[90],"environments":[91],"deployed":[94],"solve":[96],"problems.":[99],"Firstly,":[100],"flood":[102],"attack":[103],"algorithm":[104,127],"simulate":[109,132],"test":[111],"attack,":[114],"whether":[115,141],"disconnection":[119],"blockage,":[121],"then":[123],"horse":[126],"try":[134],"break":[136],"through":[137],"cloud":[139,152],"desktop,":[140],"data":[145],"hijacking.":[146],"short,":[148],"use":[150],"desktops":[153],"effectively":[155],"reduce":[156],"business":[157],"risks":[158],"improve":[160],"stability":[162],"overall":[165]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
