{"id":"https://openalex.org/W2943031340","doi":"https://doi.org/10.23919/icact.2019.8702015","title":"Conceptualizing the cyber incident &amp; event statistics reporting standards","display_name":"Conceptualizing the cyber incident &amp; event statistics reporting standards","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2943031340","doi":"https://doi.org/10.23919/icact.2019.8702015","mag":"2943031340"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2019.8702015","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2019.8702015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010046919","display_name":"Sang-Oun Lee","orcid":"https://orcid.org/0000-0003-0749-881X"},"institutions":[{"id":"https://openalex.org/I40347166","display_name":"University of Chicago","ror":"https://ror.org/024mw5h28","country_code":"US","type":"education","lineage":["https://openalex.org/I40347166"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sang-Oun LEE","raw_affiliation_strings":["The University of Chicago Harris School of Public Policy, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"The University of Chicago Harris School of Public Policy, Chicago, IL, USA","institution_ids":["https://openalex.org/I40347166"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040360815","display_name":"Hyeongmin Seo","orcid":"https://orcid.org/0009-0001-7246-2568"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"H. J. SEO","raw_affiliation_strings":["The Attached Institute of ETRI, Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"The Attached Institute of ETRI, Daejeon, Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010046919"],"corresponding_institution_ids":["https://openalex.org/I40347166"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0451347,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"672","last_page":"675"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11499","display_name":"ICT Impact and Policies","score":0.9223999977111816,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9126999974250793,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8224863409996033},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5991225838661194},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5676653385162354},{"id":"https://openalex.org/keywords/descriptive-statistics","display_name":"Descriptive statistics","score":0.5527528524398804},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5490787029266357},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5476408004760742},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5368592739105225},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.42150717973709106},{"id":"https://openalex.org/keywords/official-statistics","display_name":"Official statistics","score":0.4132315516471863},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.27894166111946106},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.187531977891922},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16696447134017944},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.114321768283844},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09769293665885925}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8224863409996033},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5991225838661194},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5676653385162354},{"id":"https://openalex.org/C39896193","wikidata":"https://www.wikidata.org/wiki/Q380344","display_name":"Descriptive statistics","level":2,"score":0.5527528524398804},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5490787029266357},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5476408004760742},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5368592739105225},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.42150717973709106},{"id":"https://openalex.org/C198052957","wikidata":"https://www.wikidata.org/wiki/Q7079603","display_name":"Official statistics","level":2,"score":0.4132315516471863},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.27894166111946106},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.187531977891922},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16696447134017944},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.114321768283844},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09769293665885925},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2019.8702015","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2019.8702015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1483280370","https://openalex.org/W2324568558","https://openalex.org/W2766105896","https://openalex.org/W2972457854"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W3167675181","https://openalex.org/W2360897455","https://openalex.org/W2377660959","https://openalex.org/W4251169878","https://openalex.org/W2131575257","https://openalex.org/W1961102902","https://openalex.org/W2612826732"],"abstract_inverted_index":{"The":[0,188],"development":[1],"of":[2,39,78,83,109,148,154,173,196],"technology":[3,54],"led":[4],"the":[5,12,25,37,41,47,49,52,63,67,76,81,93,101,125,134,145,161,178,192,199,213,220,223,230,239,242,252],"cyberspace":[6],"to":[7,11,21,31,104,130,143,205,228],"be":[8,122,182],"directly":[9],"connected":[10],"daily":[13],"life.":[14],"For":[15,74],"a":[16,33,88,106,151,207],"nation,":[17],"it":[18],"is":[19,57,72,160],"essential":[20],"collect":[22],"and":[23,55,80,95,97,112,170],"analyze":[24],"statistics":[26,64,114],"produced":[27],"from":[28],"cyber-attack":[29],"incidents":[30],"formulate":[32],"policy.":[34,218],"Specifically,":[35],"in":[36,46,60,70,91,167,216,226,233],"Republic":[38],"Korea,":[40],"second":[42],"most":[43],"cyber-attacked":[44],"country":[45],"world,":[48],"synchronization":[50],"between":[51],"cybersecurity":[53,197,217],"policy":[56,174],"essential.":[58],"However,":[59],"current":[61],"status,":[62],"collected":[65],"by":[66,198,202],"government":[68],"ministries":[69],"Korea":[71],"varied.":[73],"instance,":[75],"Ministry":[77,82],"Defense":[79],"Science":[84],"&":[85],"Technology":[86],"has":[87],"different":[89,146],"standard":[90,153,232],"defining":[92],"event":[94,113],"incident":[96,111,166,236],"its":[98],"numbers.":[99],"Thus,":[100],"study":[102],"aims":[103],"propose":[105,222],"standardized":[107],"concept":[108,180,209],"cyber":[110,156,165,235],"which":[115,120,210],"can":[116,121,181,211],"provide":[117,131,206],"singularized":[118],"criteria":[119],"adopted":[123],"across":[124],"ministerial":[126],"disciplines.":[127],"In":[128],"order":[129,227],"aforementioned":[132],"concept,":[133],"authors":[135,189,221,240],"have":[136],"posed":[137],"following":[138],"research":[139,248],"questions.":[140],"First,":[141],"how":[142],"conceptualize":[144],"types":[147],"cyber-attacks":[149],"into":[150],"single":[152,231],"reporting":[155],"incidents?":[157],"Second,":[158],"what":[159],"proper":[162],"definition":[163],"for":[164,245],"both":[168],"national":[169],"international":[171,186],"levels":[172],"dialogue?":[175],"Third,":[176],"will":[177],"established":[179],"proposed":[183,201,253],"as":[184],"an":[185],"standard?":[187],"first":[190],"breakdown":[191],"scattered":[193],"conceptual":[194],"knowledge":[195,215],"methodology":[200],"Gerring":[203],"(1999)":[204],"better":[208,214],"deliver":[212],"After,":[219],"qualitative":[224],"method":[225],"develop":[229],"collecting":[234],"statistics.":[237],"Finally,":[238],"leave":[241],"possible":[243],"extensions":[244],"future":[246],"related":[247],"area":[249],"based":[250],"on":[251],"method.":[254]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
