{"id":"https://openalex.org/W1903563735","doi":"https://doi.org/10.3233/jcs-2008-16305","title":"Protection against unauthorized access and computer crime in Norwegian enterprises","display_name":"Protection against unauthorized access and computer crime in Norwegian enterprises","publication_year":2008,"publication_date":"2008-04-22","ids":{"openalex":"https://openalex.org/W1903563735","doi":"https://doi.org/10.3233/jcs-2008-16305","mag":"1903563735"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2008-16305","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2008-16305","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030738602","display_name":"Janne Merete Hagen","orcid":"https://orcid.org/0000-0001-5900-7061"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Janne Merete Hagen","raw_affiliation_strings":["Gj\u00f8vik University College, Norway"],"affiliations":[{"raw_affiliation_string":"Gj\u00f8vik University College, Norway","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050905628","display_name":"Tormod Kalberg Sivertsen","orcid":null},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Tormod Kalberg Sivertsen","raw_affiliation_strings":["Norwegian Defence Research Establishment (FFI), Norway. E-mail: tks@ffi.no"],"affiliations":[{"raw_affiliation_string":"Norwegian Defence Research Establishment (FFI), Norway. E-mail: tks@ffi.no","institution_ids":["https://openalex.org/I163244428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108044249","display_name":"Chunming Rong","orcid":"https://orcid.org/0000-0002-8347-0539"},"institutions":[{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]},{"id":"https://openalex.org/I92008406","display_name":"University of Stavanger","ror":"https://ror.org/02qte9q33","country_code":"NO","type":"education","lineage":["https://openalex.org/I92008406"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Chunming Rong","raw_affiliation_strings":["University of Stavanger (UiS), University of Oslo/UNIK, Norway. E-mail: chunming.rong@uis.no"],"affiliations":[{"raw_affiliation_string":"University of Stavanger (UiS), University of Oslo/UNIK, Norway. E-mail: chunming.rong@uis.no","institution_ids":["https://openalex.org/I92008406","https://openalex.org/I184942183"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030738602"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6919,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.88338136,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"16","issue":"3","first_page":"341","last_page":"366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7242195010185242},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5879037976264954},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5550737380981445},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5448747277259827},{"id":"https://openalex.org/keywords/norwegian","display_name":"Norwegian","score":0.5442020297050476},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.535521388053894},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.5313732624053955},{"id":"https://openalex.org/keywords/swot-analysis","display_name":"SWOT analysis","score":0.5130049586296082},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.5025591850280762},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4506705403327942},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.4205591678619385},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4139677882194519},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3473498821258545},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.20499593019485474},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08966049551963806}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7242195010185242},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5879037976264954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5550737380981445},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5448747277259827},{"id":"https://openalex.org/C63428231","wikidata":"https://www.wikidata.org/wiki/Q9043","display_name":"Norwegian","level":2,"score":0.5442020297050476},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.535521388053894},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.5313732624053955},{"id":"https://openalex.org/C119059837","wikidata":"https://www.wikidata.org/wiki/Q175096","display_name":"SWOT analysis","level":2,"score":0.5130049586296082},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.5025591850280762},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4506705403327942},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.4205591678619385},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4139677882194519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3473498821258545},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.20499593019485474},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08966049551963806},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-2008-16305","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2008-16305","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1525451939","https://openalex.org/W1553979608","https://openalex.org/W1981730056","https://openalex.org/W1986019440","https://openalex.org/W2039615995","https://openalex.org/W2084044852","https://openalex.org/W2091494072","https://openalex.org/W2103768768","https://openalex.org/W2111303254","https://openalex.org/W2118308679","https://openalex.org/W2145780580","https://openalex.org/W2617342586"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W4362572734","https://openalex.org/W197818113","https://openalex.org/W4301435551","https://openalex.org/W2914307994","https://openalex.org/W2039232745","https://openalex.org/W2064450578","https://openalex.org/W4206514855"],"abstract_inverted_index":{"Computer":[0,48],"Crime":[1,49],"Surveys":[2],"are":[3,21,90],"important":[4],"inputs":[5],"to":[6,67,105,154,186],"management":[7],"and":[8,26,34,50,54,57,70,98],"authorities,":[9],"providing":[10],"information":[11],"on":[12,32,42],"the":[13,35,46,60,77,145,148,157,162,181,190],"national":[14,138],"IT":[15,33,73],"security":[16,94],"status.":[17],"Such":[18],"measurement":[19,194],"instruments":[20],"increasingly":[22],"valuable":[23],"as":[24,140,192],"more":[25,27],"enterprises":[28,113,125,142],"become":[29],"critically":[30],"dependent":[31],"Internet.":[36],"The":[37,62,84],"article":[38],"presents":[39],"a":[40,127,137,177,193],"selecti":[41],"of":[43,59,72,115,129,147,151,164,172,180,189],"findings":[44,85],"from":[45],"Norwegian":[47],"Security":[51],"Survey":[52],"2006":[53,158,182],"discusses":[55],"strengths":[56],"weaknesses":[58],"survey.":[61],"survey":[63,159,183,191],"reveals":[64],"that":[65,88,111,161],"next":[66],"malware":[68],"infection":[69],"theft":[71],"equipment,":[74],"hacking":[75],"is":[76,133,169,184],"most":[78],"commonly":[79],"reported":[80,165],"computer":[81,166],"crime":[82,167],"incident.":[83],"also":[86,134],"document":[87],"there":[89],"large":[91,97],"differences":[92],"in":[93,126,136],"practices":[95],"between":[96],"small":[99,124,141],"enterprises,":[100],"even":[101],"when":[102],"it":[103],"comes":[104],"measures":[106],"one":[107],"would":[108,117],"have":[109,118],"thought":[110],"all":[112],"independent":[114],"size":[116],"implemented.":[119],"This":[120,132],"practice":[121],"may":[122],"put":[123],"position":[128],"high":[130],"risk.":[131],"worrying":[135],"context":[139],"make":[143],"up":[144],"majority":[146],"total":[149],"number":[150,163],"enterprises.":[152],"Similar":[153],"previous":[155],"surveys,":[156],"shows":[160],"incidents":[168],"low":[170],"because":[171],"weak":[173],"detection":[174],"mechanisms.":[175],"Finally,":[176],"SWOT":[178],"analysis":[179],"conducted":[185],"review":[187],"improvements":[188],"tool.":[195]},"counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
