{"id":"https://openalex.org/W3182701993","doi":"https://doi.org/10.23919/cycon51939.2021.9467805","title":"Impact of Good Corporate Practices for Security of Digital Products on Global Cyber Stability","display_name":"Impact of Good Corporate Practices for Security of Digital Products on Global Cyber Stability","publication_year":2021,"publication_date":"2021-05-25","ids":{"openalex":"https://openalex.org/W3182701993","doi":"https://doi.org/10.23919/cycon51939.2021.9467805","mag":"3182701993"},"language":"en","primary_location":{"id":"doi:10.23919/cycon51939.2021.9467805","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9467805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035255852","display_name":"Vladimir Radunovi\u0107","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vladimir Radunovic","raw_affiliation_strings":["DiploFoundation, Belgrade, Serbia"],"affiliations":[{"raw_affiliation_string":"DiploFoundation, Belgrade, Serbia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078974995","display_name":"Jonas Gratz-Hoffmann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jonas Gratz-Hoffmann","raw_affiliation_strings":["Federal Department of Foreign Affairs,Bern,Switzerland"],"affiliations":[{"raw_affiliation_string":"Federal Department of Foreign Affairs,Bern,Switzerland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042386862","display_name":"Mar\u00edlia Ferreira Maciel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marilia Maciel","raw_affiliation_strings":["DiploFoundation, Strasbourg, France"],"affiliations":[{"raw_affiliation_string":"DiploFoundation, Strasbourg, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035255852"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2754,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60534878,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8692535758018494},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5199474096298218},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.4971905052661896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4923666715621948},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47859498858451843},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.44109785556793213},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.4375481903553009},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4372912049293518},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4367517828941345},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.4139730930328369},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39584827423095703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34692496061325073},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.28990620374679565},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25140446424484253},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.19484251737594604},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1825958490371704},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.16802996397018433}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8692535758018494},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5199474096298218},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.4971905052661896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4923666715621948},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47859498858451843},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.44109785556793213},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.4375481903553009},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4372912049293518},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4367517828941345},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.4139730930328369},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39584827423095703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34692496061325073},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.28990620374679565},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25140446424484253},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.19484251737594604},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1825958490371704},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.16802996397018433},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon51939.2021.9467805","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9467805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1139510489","https://openalex.org/W1483280370","https://openalex.org/W2082187915","https://openalex.org/W2135191468","https://openalex.org/W2352444199","https://openalex.org/W2362475561","https://openalex.org/W2492407979","https://openalex.org/W2562235242","https://openalex.org/W2563485765","https://openalex.org/W2649501556","https://openalex.org/W2769385013","https://openalex.org/W2785373701","https://openalex.org/W2801537435","https://openalex.org/W2953249558","https://openalex.org/W2954896606","https://openalex.org/W2978765687","https://openalex.org/W2980437788","https://openalex.org/W2989847736","https://openalex.org/W3122877425","https://openalex.org/W3124080276","https://openalex.org/W4234065838","https://openalex.org/W4242581305","https://openalex.org/W6680083286","https://openalex.org/W6748195418","https://openalex.org/W7019706568"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W2377660959","https://openalex.org/W4251169878","https://openalex.org/W4386125109","https://openalex.org/W2405741346"],"abstract_inverted_index":{"The":[0,45,63],"exploitation":[1],"of":[2,13,70,77,110,154,181,198,206,215,219],"vulnerabilities":[3,20],"in":[4,49,58,116,118,132,140,257],"digital":[5,111,199],"products":[6,112,200],"and":[7,34,39,74,102,113,129,175,184,192,201,203,238,240,281],"services":[8,202],"is":[9,67],"an":[10,68],"essential":[11],"component":[12],"sophisticated":[14],"cyberattacks.":[15],"Well-resourced":[16],"adversaries":[17],"increasingly":[18],"exploit":[19],"for":[21,252],"economic,":[22],"political,":[23],"or":[24],"military":[25],"gain,":[26],"causing":[27],"effects":[28],"that":[29,158,168],"destabilise":[30],"cyberspace.":[31],"Several":[32],"multilateral":[33],"multi-stakeholder":[35],"fora":[36],"develop":[37],"norms":[38,183,191],"principles":[40,161,193],"to":[41,178,195,228,270,277],"reduce":[42,249],"such":[43],"vulnerabilities.":[44],"main":[46],"challenge":[47],"lies":[48],"implementation.":[50],"Under":[51],"the":[52,71,78,108,133,179,196,204,211,216,220,258,268],"Geneva":[53,64,79,221],"Dialogue":[54,65,80],"on":[55,267],"Responsible":[56],"Behaviour":[57],"Cyberspace":[59],"<sup":[60],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[61],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">11</sup>":[62],"(https://genevadialogue.ch)":[66],"initiative":[69],"Swiss":[72],"government":[73],"DiploFoundation.":[75],"Partners":[76],"include":[81],"Bi.":[82],"Zone,":[83],"Cisco,":[84],"EnSign,":[85],"FireEye":[86],"Mandiant,":[87],"Kaspersky,":[88],"Huawei,":[89],"Microsoft,":[90],"UBS,":[91],"PNG":[92],"ICT":[93],"Cluster,":[94],"SICPA,":[95],"Siemens,":[96],"SwissRe,":[97],"Tata":[98],"Consultancy":[99],"Services,":[100],"VU,":[101],"Wisekey.":[103],"Good":[104],"corporate":[105,156,225],"practices":[106,157,170,226,273],"regarding":[107],"security":[109,197,229],"services,":[114],"discussed":[115],"detail":[117],"this":[119],"paper,":[120],"have":[121],"been":[122],"developed":[123,151],"through":[124],"15":[125],"group":[126],"online":[127],"meetings":[128],"continuous":[130],"collaboration":[131],"shared":[134],"document,":[135],"conducted":[136],"over":[137],"7":[138],"months":[139],"2020.":[141],"25":[142],"(Geneva":[143],"Dialogue),":[144],"a":[145,152],"dozen":[146],"leading":[147],"global":[148,182,190],"companies":[149],"jointly":[150],"set":[153],"good":[155,224,272],"translate":[159],"high-level":[160],"into":[162,274],"day-to-day":[163],"operations.":[164],"This":[165],"paper":[166],"argues":[167],"these":[169,246],"make":[171],"cyberspace":[172],"less":[173],"vulnerable,":[174],"thus":[176],"contribute":[177],"implementation":[180],"principles.":[185],"It":[186,208,243,265],"further":[187],"analyses":[188],"key":[189],"related":[194,227],"role":[205],"industry.":[207],"then":[209],"presents":[210],"most":[212],"relevant":[213],"results":[214],"ongoing":[217],"work":[218],"Dialogue,":[222],"particularly":[223],"by":[230,263],"design:":[231],"threat":[232],"modelling,":[233],"supply":[234,259],"chain":[235,260],"security,":[236],"development":[237],"deployment,":[239],"vulnerability":[241],"processes.":[242],"discusses":[244],"how":[245],"measures":[247],"may":[248],"vulnerabilities,":[250],"especially":[251],"smaller":[253],"producers":[254],"whose":[255],"importance":[256],"was":[261],"elevated":[262],"COVID-19.":[264],"reflects":[266],"need":[269],"turn":[271],"baseline":[275],"requirements":[276],"support":[278],"market":[279],"newcomers":[280],"regulators":[282],"worldwide.":[283]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
