{"id":"https://openalex.org/W4385689326","doi":"https://doi.org/10.29007/nlp4","title":"Cyber security threats and how to deal with them","display_name":"Cyber security threats and how to deal with them","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4385689326","doi":"https://doi.org/10.29007/nlp4"},"language":"en","primary_location":{"id":"doi:10.29007/nlp4","is_oa":true,"landing_page_url":"http://dx.doi.org/10.29007/nlp4","pdf_url":"https://easychair.org/publications/open/xHvC","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://easychair.org/publications/open/xHvC","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046080592","display_name":"Raimund Vogl","orcid":"https://orcid.org/0000-0002-6681-1530"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Raimund Vogl","raw_affiliation_strings":["WWU IT, Westflische Wilhelms-Universitt Mnster, Germany","WWU IT, Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster, Germany"],"affiliations":[{"raw_affiliation_string":"WWU IT, Westflische Wilhelms-Universitt Mnster, Germany","institution_ids":["https://openalex.org/I22465464"]},{"raw_affiliation_string":"WWU IT, Westf\u00e4lische Wilhelms-Universit\u00e4t M\u00fcnster, Germany","institution_ids":["https://openalex.org/I22465464"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5046080592"],"corresponding_institution_ids":["https://openalex.org/I22465464"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16657985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"95","issue":null,"first_page":"285","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8751229047775269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7789624333381653},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.6579875349998474},{"id":"https://openalex.org/keywords/bankruptcy","display_name":"Bankruptcy","score":0.5883404016494751},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5605303645133972},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5168976783752441},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.49868345260620117},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.49151501059532166},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.4570905566215515},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4539203643798828},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4029504656791687},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.34148794412612915},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.3331208825111389},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18863102793693542},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1043434739112854},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.07138973474502563}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8751229047775269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7789624333381653},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.6579875349998474},{"id":"https://openalex.org/C504631918","wikidata":"https://www.wikidata.org/wiki/Q152074","display_name":"Bankruptcy","level":2,"score":0.5883404016494751},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5605303645133972},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5168976783752441},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.49868345260620117},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.49151501059532166},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.4570905566215515},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4539203643798828},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4029504656791687},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34148794412612915},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3331208825111389},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18863102793693542},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1043434739112854},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.07138973474502563},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.29007/nlp4","is_oa":true,"landing_page_url":"http://dx.doi.org/10.29007/nlp4","pdf_url":"https://easychair.org/publications/open/xHvC","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.29007/nlp4","is_oa":true,"landing_page_url":"http://dx.doi.org/10.29007/nlp4","pdf_url":"https://easychair.org/publications/open/xHvC","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385689326.pdf","grobid_xml":"https://content.openalex.org/works/W4385689326.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3214090987","https://openalex.org/W4389331041","https://openalex.org/W4237584680","https://openalex.org/W2923881152","https://openalex.org/W2616862624","https://openalex.org/W3041672727","https://openalex.org/W597564880","https://openalex.org/W3183284663","https://openalex.org/W3167935533","https://openalex.org/W48207922"],"abstract_inverted_index":{"Information":[0],"security":[1],"and":[2,26,76,120,128],"cyber":[3,74],"threats":[4,119],"have":[5],"been":[6],"among":[7],"the":[8,19,85,99,116,125],"top":[9],"concerns":[10],"of":[11,21,102,118],"IT":[12,61,110],"managers":[13],"for":[14,98],"many":[15],"years.":[16],"But":[17],"recently,":[18],"level":[20],"threat":[22],"has":[23,27,89],"grown":[24],"considerably":[25],"reached":[28],"a":[29,93],"new":[30],"dimension":[31],"with":[32,51],"companies":[33],"being":[34,40],"severely":[35],"impacted":[36],"by":[37],"cyber-attacks,":[38],"even":[39],"driven":[41],"into":[42],"bankruptcy.":[43],"This":[44,104],"is":[45,64,105],"also":[46,77],"affecting":[47],"higher":[48],"education":[49],"institutions,":[50],"several":[52],"universities":[53],"spectacularly":[54],"falling":[55],"victim":[56],"to":[57,67,69,79,96,107,122],"ransomware":[58],"attacks.":[59,82,103],"For":[60],"managers,":[62],"it":[63],"now":[65],"crucial":[66],"react":[68],"this":[70],"threat,":[71],"strengthen":[72],"their":[73],"defense":[75],"prepare":[78,97],"mitigate":[80],"successful":[81],"We":[83],"describe":[84],"measures":[86],"M\u00fcnster":[87],"university":[88],"recently":[90],"implemented":[91],"in":[92],"massive":[94],"effort":[95],"common":[100],"types":[101],"meant":[106],"be":[108],"an":[109],"manager":[111],"focused":[112],"semi-technical":[113],"overview":[114],"on":[115],"topic":[117],"remedies":[121],"help":[123],"evaluate":[124,129],"own":[126],"situation":[127],"possible":[130],"measures.":[131]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
