{"id":"https://openalex.org/W1944403676","doi":"https://doi.org/10.3233/jcs-150536","title":"Service security and privacy as a\u00a0socio-technical problem","display_name":"Service security and privacy as a\u00a0socio-technical problem","publication_year":2015,"publication_date":"2015-09-29","ids":{"openalex":"https://openalex.org/W1944403676","doi":"https://doi.org/10.3233/jcs-150536","mag":"1944403676"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-150536","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-150536","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs536?id=journal-of-computer-security%2Fjcs536","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs536?id=journal-of-computer-security%2Fjcs536","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051511023","display_name":"Giampaolo Bella","orcid":"https://orcid.org/0000-0002-7615-8643"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giampaolo Bella","raw_affiliation_strings":["Dipartimento di Matematica e Informatica, Universit\u00e0 di Catania, Catania, Italy. E-mail:\u00a0giamp@dmi.unict.it"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Matematica e Informatica, Universit\u00e0 di Catania, Catania, Italy. E-mail:\u00a0giamp@dmi.unict.it","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025355465","display_name":"Paul Curzon","orcid":"https://orcid.org/0000-0002-1301-9734"},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Curzon","raw_affiliation_strings":["School of Electronic Engineering and Computer Science, Queen Mary University of London, London, UK. E-mail:\u00a0p.curzon@qmul.ac.uk"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering and Computer Science, Queen Mary University of London, London, UK. E-mail:\u00a0p.curzon@qmul.ac.uk","institution_ids":["https://openalex.org/I166337079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070924321","display_name":"Gabriele Lenzini","orcid":"https://orcid.org/0000-0001-8229-3270"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Gabriele Lenzini","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg. E-mail:\u00a0gabriele.lenzini@uni.lu"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg. E-mail:\u00a0gabriele.lenzini@uni.lu","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051511023"],"corresponding_institution_ids":["https://openalex.org/I39063666"],"apc_list":null,"apc_paid":null,"fwci":2.4704,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.91057783,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"23","issue":"5","first_page":"563","last_page":"585"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7027848958969116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6113575100898743},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5481165647506714},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5059892535209656},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.48596441745758057},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4616926908493042},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.45237717032432556},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4229654371738434},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.373440146446228},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3246191740036011},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.22551757097244263},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.18895119428634644},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.18536600470542908},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0974518358707428}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7027848958969116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6113575100898743},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5481165647506714},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5059892535209656},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.48596441745758057},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4616926908493042},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.45237717032432556},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4229654371738434},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.373440146446228},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3246191740036011},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.22551757097244263},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.18895119428634644},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.18536600470542908},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0974518358707428},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3233/jcs-150536","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-150536","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs536?id=journal-of-computer-security%2Fjcs536","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/25412","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/25412","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 23 (5), 563-585 (2015)","raw_type":"peer reviewed"},{"id":"pmh:oai:qmro.qmul.ac.uk:123456789/10296","is_oa":false,"landing_page_url":"http://qmro.qmul.ac.uk/xmlui/handle/123456789/10296","pdf_url":null,"source":{"id":"https://openalex.org/S4306400530","display_name":"Queen Mary Research Online (Queen Mary University of London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I166337079","host_organization_name":"Queen Mary University of London","host_organization_lineage":["https://openalex.org/I166337079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.3233/jcs-150536","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-150536","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs536?id=journal-of-computer-security%2Fjcs536","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1944403676.pdf","grobid_xml":"https://content.openalex.org/works/W1944403676.grobid-xml"},"referenced_works_count":84,"referenced_works":["https://openalex.org/W55130875","https://openalex.org/W65833265","https://openalex.org/W109249458","https://openalex.org/W126663066","https://openalex.org/W560070107","https://openalex.org/W593789991","https://openalex.org/W619999426","https://openalex.org/W966622827","https://openalex.org/W1495408127","https://openalex.org/W1498728415","https://openalex.org/W1529733883","https://openalex.org/W1534850143","https://openalex.org/W1606860058","https://openalex.org/W1731979679","https://openalex.org/W1782799247","https://openalex.org/W1851952272","https://openalex.org/W1930546125","https://openalex.org/W1969334942","https://openalex.org/W1973054120","https://openalex.org/W1978384394","https://openalex.org/W1984117315","https://openalex.org/W1986330503","https://openalex.org/W1988811748","https://openalex.org/W1993246901","https://openalex.org/W1995088068","https://openalex.org/W2021986315","https://openalex.org/W2023057589","https://openalex.org/W2032862247","https://openalex.org/W2039640681","https://openalex.org/W2042720915","https://openalex.org/W2045591401","https://openalex.org/W2046143708","https://openalex.org/W2055760912","https://openalex.org/W2066158003","https://openalex.org/W2066606468","https://openalex.org/W2068412756","https://openalex.org/W2081436185","https://openalex.org/W2081803968","https://openalex.org/W2085675184","https://openalex.org/W2091833612","https://openalex.org/W2091949034","https://openalex.org/W2095540958","https://openalex.org/W2097719378","https://openalex.org/W2098786798","https://openalex.org/W2106192381","https://openalex.org/W2114189125","https://openalex.org/W2114969359","https://openalex.org/W2116705992","https://openalex.org/W2123870853","https://openalex.org/W2123948869","https://openalex.org/W2125212367","https://openalex.org/W2134251664","https://openalex.org/W2136647314","https://openalex.org/W2136983815","https://openalex.org/W2141582527","https://openalex.org/W2148279836","https://openalex.org/W2148976755","https://openalex.org/W2150341374","https://openalex.org/W2151495258","https://openalex.org/W2152408744","https://openalex.org/W2156515881","https://openalex.org/W2162691770","https://openalex.org/W2162840341","https://openalex.org/W2175939862","https://openalex.org/W2188948342","https://openalex.org/W2208744237","https://openalex.org/W2211995104","https://openalex.org/W2212082856","https://openalex.org/W2214120337","https://openalex.org/W2275530856","https://openalex.org/W2335888457","https://openalex.org/W2401210256","https://openalex.org/W2469438417","https://openalex.org/W2471207260","https://openalex.org/W2483101662","https://openalex.org/W2495768893","https://openalex.org/W2512503597","https://openalex.org/W2548832091","https://openalex.org/W2622548307","https://openalex.org/W4250846042","https://openalex.org/W6656207227","https://openalex.org/W6671205463","https://openalex.org/W6672048118","https://openalex.org/W6680704226"],"related_works":["https://openalex.org/W2065250680","https://openalex.org/W2348567840","https://openalex.org/W2390665136","https://openalex.org/W4206199931","https://openalex.org/W2092708554","https://openalex.org/W2101582069","https://openalex.org/W2336014427","https://openalex.org/W139145738","https://openalex.org/W2495229164","https://openalex.org/W2494428682"],"abstract_inverted_index":{"The":[0,110,182],"security":[1,39,116,142,196],"and":[2,42,58,80,117,143,170,197],"privacy":[3,97,118,198],"of":[4,88,188,193,217],"the":[5,27,60,63,78,81,95,104,114,129,137,147,160,186,189],"data":[6,64],"that":[7,112],"users":[8,55,69],"transmit,":[9],"more":[10],"or":[11,73,103],"less":[12],"deliberately,":[13],"to":[14,26,53,93,166,207,213],"modern":[15],"services":[16,194],"is":[17,22],"an":[18],"open":[19,201],"problem.":[20],"It":[21,135],"not":[23,204],"solely":[24],"limited":[25],"actual":[28],"Internet":[29],"traversal,":[30],"a":[31,101,121,132,153,175],"sub-problem":[32],"vastly":[33],"tackled":[34],"by":[35,100,108],"consolidated":[36],"research":[37,155],"in":[38,83],"protocol":[40],"design":[41],"analysis.":[43],"By":[44],"contrast,":[45],"it":[46,151],"enta":[47],"ils":[48],"much":[49],"broader":[50],"dimensions":[51],"pertaining":[52],"how":[54,165],"approach":[56,111],"technology":[57],"understand":[59],"risks":[61],"for":[62],"they":[65],"enter.":[66],"For":[67],"example,":[68],"may":[70,90,179],"express":[71],"cautious":[72],"distracted":[74],"personas":[75],"depending":[76],"on":[77,140],"service":[79,115,141],"point":[82],"time;":[84],"further,":[85],"pre-established":[86],"paths":[87],"practice":[89],"lead":[91],"them":[92],"neglect":[94],"intrusive":[96],"policy":[98],"offered":[99],"service,":[102],"outdated":[105],"protections":[106],"adopted":[107],"another.":[109],"sees":[113],"problem":[119,161],"as":[120],"socio-technical":[122,148,202],"one":[123],"needs":[124],"consolidation.":[125],"With":[126],"this":[127],"motivation,":[128],"article":[130,183],"makes":[131],"threefold":[133],"contribution.":[134],"reviews":[136],"existing":[138,168],"literature":[139],"privacy,":[144],"especially":[145],"from":[146],"standpoint.":[149],"Further,":[150],"outlines":[152],"general":[154],"methodology":[156],"aimed":[157],"at":[158,163,172],"layering":[159],"appropriately,":[162],"suggesting":[164],"position":[167],"findings,":[169],"ultimately":[171],"indicating":[173],"where":[174],"transdisciplinary":[176],"task":[177],"force":[178],"fit":[180],"in.":[181],"concludes":[184],"with":[185],"description":[187],"three":[190],"challenge":[191],"domains":[192],"whose":[195],"we":[199],"deem":[200],"problems,":[203],"only":[205],"due":[206],"their":[208,214],"inherent":[209],"facets":[210],"but":[211],"also":[212],"huge":[215],"number":[216],"users.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2016-06-24T00:00:00"}
