{"id":"https://openalex.org/W4412855161","doi":"https://doi.org/10.1145/3757318","title":"Analyzing and Categorizing Emerging Cybersecurity Regulations","display_name":"Analyzing and Categorizing Emerging Cybersecurity Regulations","publication_year":2025,"publication_date":"2025-08-02","ids":{"openalex":"https://openalex.org/W4412855161","doi":"https://doi.org/10.1145/3757318"},"language":"en","primary_location":{"id":"doi:10.1145/3757318","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3757318","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dspace.mit.edu/bitstream/1721.1/162660/1/3757318.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087045548","display_name":"Angelica Marotta","orcid":"https://orcid.org/0000-0002-0021-1305"},"institutions":[{"id":"https://openalex.org/I4210109586","display_name":"Moscow Institute of Thermal Technology","ror":"https://ror.org/021es5e59","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210109586"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Angelica Marotta","raw_affiliation_strings":["MIT Sloan School of Management","Information Technologies / Cybersecurity at MIT Sloan, MIT"],"raw_orcid":"https://orcid.org/0000-0002-0021-1305","affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management","institution_ids":[]},{"raw_affiliation_string":"Information Technologies / Cybersecurity at MIT Sloan, MIT","institution_ids":["https://openalex.org/I4210109586"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017345211","display_name":"Stuart Madnick","orcid":"https://orcid.org/0000-0001-9240-2573"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stuart Madnick","raw_affiliation_strings":["MIT Sloan School of Management","Sloan School of Management & School of Engineering, Massachusetts Institute of Technology"],"raw_orcid":"https://orcid.org/0000-0001-9240-2573","affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management","institution_ids":[]},{"raw_affiliation_string":"Sloan School of Management & School of Engineering, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087045548"],"corresponding_institution_ids":["https://openalex.org/I4210109586"],"apc_list":null,"apc_paid":null,"fwci":5.8102,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.96037011,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"58","issue":"2","first_page":"1","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8732357025146484},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6547584533691406},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3564792573451996}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8732357025146484},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6547584533691406},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3564792573451996}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3757318","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3757318","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},{"id":"pmh:oai:dspace.mit.edu:1721.1/162660","is_oa":true,"landing_page_url":"https://hdl.handle.net/1721.1/162660","pdf_url":"https://dspace.mit.edu/bitstream/1721.1/162660/1/3757318.pdf","source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Association for Computing Machinery","raw_type":"http://purl.org/eprint/type/JournalArticle"}],"best_oa_location":{"id":"pmh:oai:dspace.mit.edu:1721.1/162660","is_oa":true,"landing_page_url":"https://hdl.handle.net/1721.1/162660","pdf_url":"https://dspace.mit.edu/bitstream/1721.1/162660/1/3757318.pdf","source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Association for Computing Machinery","raw_type":"http://purl.org/eprint/type/JournalArticle"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412855161.pdf","grobid_xml":"https://content.openalex.org/works/W4412855161.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W1512740566","https://openalex.org/W2037238094","https://openalex.org/W2080940090","https://openalex.org/W2089203649","https://openalex.org/W2269524735","https://openalex.org/W2466177857","https://openalex.org/W2545393715","https://openalex.org/W2605365772","https://openalex.org/W2736433677","https://openalex.org/W2745105925","https://openalex.org/W2751899792","https://openalex.org/W2759989706","https://openalex.org/W2762774091","https://openalex.org/W2792184768","https://openalex.org/W2888478464","https://openalex.org/W2896632748","https://openalex.org/W2904338335","https://openalex.org/W2904413997","https://openalex.org/W2921697258","https://openalex.org/W2940371396","https://openalex.org/W2953532875","https://openalex.org/W2963511536","https://openalex.org/W3005609131","https://openalex.org/W3016971872","https://openalex.org/W3023366668","https://openalex.org/W3026130332","https://openalex.org/W3026444438","https://openalex.org/W3035286874","https://openalex.org/W3114503382","https://openalex.org/W3130705826","https://openalex.org/W3133550094","https://openalex.org/W3154297256","https://openalex.org/W3159979075","https://openalex.org/W3161336129","https://openalex.org/W3162766663","https://openalex.org/W3171504222","https://openalex.org/W3177301840","https://openalex.org/W3193851656","https://openalex.org/W3196695106","https://openalex.org/W3206777315","https://openalex.org/W4212876892","https://openalex.org/W4213292645","https://openalex.org/W4224941017","https://openalex.org/W4281790849","https://openalex.org/W4282945617","https://openalex.org/W4285120793","https://openalex.org/W4285259005","https://openalex.org/W4296455816","https://openalex.org/W4297910636","https://openalex.org/W4307030391","https://openalex.org/W4319989507","https://openalex.org/W4366299825","https://openalex.org/W4385562826","https://openalex.org/W4386107645","https://openalex.org/W4387372023","https://openalex.org/W4388362003","https://openalex.org/W4401717450","https://openalex.org/W4408792604"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"As":[0],"cyber-attacks":[1],"become":[2],"more":[3],"frequent,":[4],"sophisticated,":[5],"and":[6,26,38,60,87,92,101,121],"impactful,":[7],"governments":[8,123],"worldwide":[9],"are":[10],"responding":[11],"by":[12,78],"introducing":[13],"or":[14],"proposing":[15],"new":[16,118,125],"cybersecurity":[17,29,75,103,119,126],"regulations.":[18,127],"This":[19,65],"article":[20],"examines":[21],"over":[22],"170":[23],"recent":[24],"regulations":[25,86,120],"trends":[27],"in":[28,45],"across":[30],"various":[31],"regions,":[32],"including":[33],"the":[34,74,82,115,122],"United":[35],"States,":[36],"Europe,":[37],"beyond.":[39],"It":[40],"identifies":[41],"17":[42],"key":[43],"features":[44],"many":[46],"of":[47,84,117],"these":[48,85],"regulations,":[49],"which":[50],"we":[51],"have":[52],"grouped":[53],"into":[54],"5":[55],"categories,":[56],"analyzes":[57],"observed":[58],"patterns,":[59],"proposes":[61],"areas":[62],"for":[63],"improvement.":[64],"article's":[66],"primary":[67],"objective":[68],"is":[69],"to":[70,73,90,110,113],"significantly":[71],"contribute":[72],"compliance":[76],"domain":[77],"helping":[79,88],"researchers":[80],"understand":[81],"structure":[83],"organizations":[89],"assess":[91],"mitigate":[93],"their":[94],"cyber":[95],"risk":[96],"within":[97],"an":[98],"increasingly":[99],"complex":[100],"regulated":[102],"environment.":[104],"Our":[105],"findings":[106],"provide":[107],"valuable":[108],"direction":[109],"those":[111],"trying":[112],"navigate":[114],"flood":[116],"enacting":[124]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
