{"id":"https://openalex.org/W2146429994","doi":"https://doi.org/10.1186/2190-8532-1-17","title":"Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use","display_name":"Biologically-inspired analysis in the real world: computing, informatics, and ecologies of use","publication_year":2012,"publication_date":"2012-11-06","ids":{"openalex":"https://openalex.org/W2146429994","doi":"https://doi.org/10.1186/2190-8532-1-17","mag":"2146429994"},"language":"en","primary_location":{"id":"doi:10.1186/2190-8532-1-17","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2190-8532-1-17","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/2190-8532-1-17","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/2190-8532-1-17","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079760146","display_name":"Laura A. McNamara","orcid":null},"institutions":[{"id":"https://openalex.org/I192454743","display_name":"Sandia National Laboratories California","ror":"https://ror.org/058m7ey48","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I1330989302","https://openalex.org/I192454743","https://openalex.org/I198811213","https://openalex.org/I198811213","https://openalex.org/I4210104735"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Laura A McNamara","raw_affiliation_strings":["Sandia National Laboratories, PO Box 5800, MS 0519, Albuquerque, NM, 87185-0519, USA","[Sandia National Laboratories, Albuquerque, USA]"],"affiliations":[{"raw_affiliation_string":"Sandia National Laboratories, PO Box 5800, MS 0519, Albuquerque, NM, 87185-0519, USA","institution_ids":["https://openalex.org/I192454743"]},{"raw_affiliation_string":"[Sandia National Laboratories, Albuquerque, USA]","institution_ids":["https://openalex.org/I192454743"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5079760146"],"corresponding_institution_ids":["https://openalex.org/I192454743"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.2082242,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9625999927520752,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.8284474611282349},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7704455852508545},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5870867967605591},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5763233304023743},{"id":"https://openalex.org/keywords/informatics","display_name":"Informatics","score":0.4571118652820587},{"id":"https://openalex.org/keywords/citizen-journalism","display_name":"Citizen journalism","score":0.45201265811920166},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4489419758319855},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.42651963233947754},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.32711368799209595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3028358817100525},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18224751949310303},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10154828429222107}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.8284474611282349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7704455852508545},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5870867967605591},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5763233304023743},{"id":"https://openalex.org/C191630685","wikidata":"https://www.wikidata.org/wiki/Q4027615","display_name":"Informatics","level":2,"score":0.4571118652820587},{"id":"https://openalex.org/C203663800","wikidata":"https://www.wikidata.org/wiki/Q848979","display_name":"Citizen journalism","level":2,"score":0.45201265811920166},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4489419758319855},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.42651963233947754},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.32711368799209595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3028358817100525},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18224751949310303},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10154828429222107},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/2190-8532-1-17","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2190-8532-1-17","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/2190-8532-1-17","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/2190-8532-1-17","is_oa":true,"landing_page_url":"https://doi.org/10.1186/2190-8532-1-17","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/2190-8532-1-17","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332186","display_name":"Defense Threat Reduction Agency","ror":"https://ror.org/04tz64554"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2146429994.pdf","grobid_xml":"https://content.openalex.org/works/W2146429994.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W15726484","https://openalex.org/W158431156","https://openalex.org/W273869986","https://openalex.org/W289311805","https://openalex.org/W338913944","https://openalex.org/W581433353","https://openalex.org/W1483709980","https://openalex.org/W1491862280","https://openalex.org/W1493903988","https://openalex.org/W1499005519","https://openalex.org/W1525261894","https://openalex.org/W1557276260","https://openalex.org/W1589029596","https://openalex.org/W1591457272","https://openalex.org/W1605914096","https://openalex.org/W1606108609","https://openalex.org/W1607334069","https://openalex.org/W1608124789","https://openalex.org/W1664374833","https://openalex.org/W1926969605","https://openalex.org/W1947962627","https://openalex.org/W1980373863","https://openalex.org/W1990513740","https://openalex.org/W1991691398","https://openalex.org/W1996291799","https://openalex.org/W2021222801","https://openalex.org/W2028229144","https://openalex.org/W2039392572","https://openalex.org/W2067949175","https://openalex.org/W2068172675","https://openalex.org/W2070916214","https://openalex.org/W2072131797","https://openalex.org/W2075637845","https://openalex.org/W2106044202","https://openalex.org/W2115072199","https://openalex.org/W2153194131","https://openalex.org/W2160412901","https://openalex.org/W2186094990","https://openalex.org/W2308373634","https://openalex.org/W2342091124","https://openalex.org/W2478250960","https://openalex.org/W2612002453","https://openalex.org/W2615362921","https://openalex.org/W2621579488","https://openalex.org/W4206628868","https://openalex.org/W4207081475","https://openalex.org/W4230172260","https://openalex.org/W4235983156","https://openalex.org/W4241483628","https://openalex.org/W4301105553","https://openalex.org/W6677501357"],"related_works":["https://openalex.org/W2982321410","https://openalex.org/W95465806","https://openalex.org/W2392004567","https://openalex.org/W2046296964","https://openalex.org/W2940029036","https://openalex.org/W4388292429","https://openalex.org/W2756595502","https://openalex.org/W2010789764","https://openalex.org/W2187233292","https://openalex.org/W2219281195"],"abstract_inverted_index":{"Biological":[0],"metaphors":[1],"abound":[2],"in":[3],"computational":[4],"modeling":[5,100,117],"and":[6,10,17,47,64,98,104,110,115,118],"simulation,":[7],"inspiring":[8],"creative":[9],"novel":[11],"approaches":[12,120],"to":[13,43,52,107],"conceptualizing,":[14],"representing,":[15],"simulating":[16],"analyzing":[18],"a":[19,40],"wide":[20],"range":[21],"of":[22,25,72,83,112],"phenomena.":[23],"Proponents":[24],"this":[26,90],"research":[27,59],"suggest":[28],"that":[29,67,93],"biologically-inspired":[30],"informatics":[31],"have":[32],"practical":[33,105],"national":[34,73,87,123],"security":[35,74,88,124],"importance,":[36],"because":[37],"they":[38],"represent":[39],"new":[41],"way":[42],"analyze":[44],"sociopolitical":[45],"dynamics":[46],"trends,":[48],"from":[49],"terrorist":[50],"recruitment":[51],"cyber":[53],"warfare.":[54],"However,":[55],"translating":[56],"innovative":[57],"basic":[58],"into":[60],"useful,":[61,113],"usable,":[62,114],"adoptable,":[63],"trustworthy":[65],"tools":[66],"benefit":[68],"the":[69],"daily":[70],"work":[71],"experts":[75],"is":[76],"challenging.":[77],"Drawing":[78],"on":[79],"several":[80],"years\u2019":[81],"worth":[82],"ethnographic":[84],"fieldwork":[85],"among":[86],"experts,":[89],"paper":[91],"suggests":[92],"information":[94],"ecology,":[95],"activity":[96],"theory,":[97],"participatory":[99],"provide":[101],"theoretical":[102],"frameworks":[103],"suggestions":[106],"support":[108],"design":[109],"development":[111],"adoptable":[116],"simulation":[119],"for":[121],"complex":[122],"challenges.":[125]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
