{"id":"https://openalex.org/W4297813713","doi":"https://doi.org/10.3390/a15090316","title":"Sustainable Risk Identification Using Formal Ontologies","display_name":"Sustainable Risk Identification Using Formal Ontologies","publication_year":2022,"publication_date":"2022-09-02","ids":{"openalex":"https://openalex.org/W4297813713","doi":"https://doi.org/10.3390/a15090316"},"language":"en","primary_location":{"id":"doi:10.3390/a15090316","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a15090316","pdf_url":"https://www.mdpi.com/1999-4893/15/9/316/pdf?version=1662518455","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/15/9/316/pdf?version=1662518455","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059251260","display_name":"Avi Shaked","orcid":"https://orcid.org/0000-0001-7976-1942"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Avi Shaked","raw_affiliation_strings":["Department of Computer Science, University of Oxford, Oxford OX1 3QD, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, Oxford OX1 3QD, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059227880","display_name":"Oded Margalit","orcid":"https://orcid.org/0000-0002-2026-2601"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Oded Margalit","raw_affiliation_strings":["Department of Computer Science, Ben Gurion University of the Negev, Be\u2019er Sheva 84105, Israel","Department of Computer Science, Ben Gurion University of the Negev, Be'er Sheva 84105, Israel"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ben Gurion University of the Negev, Be\u2019er Sheva 84105, Israel","institution_ids":["https://openalex.org/I124227911"]},{"raw_affiliation_string":"Department of Computer Science, Ben Gurion University of the Negev, Be'er Sheva 84105, Israel","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059227880"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.4252,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91059673,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":"15","issue":"9","first_page":"316","last_page":"316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9632999897003174,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9613000154495239,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.777145504951477},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7546319961547852},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.7155583500862122},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6478767395019531},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.6327973008155823},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.5914471745491028},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.46383652091026306},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.427803099155426},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.42701634764671326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3964806795120239},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32382452487945557},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19771221280097961}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.777145504951477},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7546319961547852},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.7155583500862122},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6478767395019531},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.6327973008155823},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.5914471745491028},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.46383652091026306},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.427803099155426},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.42701634764671326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3964806795120239},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32382452487945557},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19771221280097961},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/a15090316","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a15090316","pdf_url":"https://www.mdpi.com/1999-4893/15/9/316/pdf?version=1662518455","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:db79050b1f7e4802a9b43adf382fecf6","is_oa":true,"landing_page_url":"https://doaj.org/article/db79050b1f7e4802a9b43adf382fecf6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 15, Iss 9, p 316 (2022)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-4893/15/9/316/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/a15090316","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms; Volume 15; Issue 9; Pages: 316","raw_type":"Text"},{"id":"pmh:oai:ora.ox.ac.uk:uuid:c8a32b55-817c-4f35-b2ad-1ac46db697ce","is_oa":true,"landing_page_url":"https://ora.ox.ac.uk/objects/uuid:c8a32b55-817c-4f35-b2ad-1ac46db697ce","pdf_url":null,"source":{"id":"https://openalex.org/S4306402636","display_name":"Oxford University Research Archive (ORA) (University of Oxford)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40120149","host_organization_name":"University of Oxford","host_organization_lineage":["https://openalex.org/I40120149"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symplectic Elements","raw_type":"Journal article"}],"best_oa_location":{"id":"doi:10.3390/a15090316","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a15090316","pdf_url":"https://www.mdpi.com/1999-4893/15/9/316/pdf?version=1662518455","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Life in Land","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/15"},{"display_name":"Responsible consumption and production","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4297813713.pdf","grobid_xml":"https://content.openalex.org/works/W4297813713.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W969005242","https://openalex.org/W2037483980","https://openalex.org/W2099945435","https://openalex.org/W2100063638","https://openalex.org/W2103103282","https://openalex.org/W2104079596","https://openalex.org/W2133109597","https://openalex.org/W2152216561","https://openalex.org/W2159435067","https://openalex.org/W2550780206","https://openalex.org/W2564361013","https://openalex.org/W2748690817","https://openalex.org/W2780884793","https://openalex.org/W2887645765","https://openalex.org/W2891787071","https://openalex.org/W2898488946","https://openalex.org/W2982424998","https://openalex.org/W3006161904","https://openalex.org/W3022088706","https://openalex.org/W3090907514","https://openalex.org/W3094320230","https://openalex.org/W3114503382","https://openalex.org/W4200335017","https://openalex.org/W4211108110","https://openalex.org/W4244464507","https://openalex.org/W4281709785","https://openalex.org/W4284681173","https://openalex.org/W4285018249","https://openalex.org/W6625491834","https://openalex.org/W6659779861"],"related_works":["https://openalex.org/W2003333417","https://openalex.org/W2378862226","https://openalex.org/W118236634","https://openalex.org/W3041075136","https://openalex.org/W2285205992","https://openalex.org/W3006961029","https://openalex.org/W2480445825","https://openalex.org/W2153011985","https://openalex.org/W2483482908","https://openalex.org/W1941743136"],"abstract_inverted_index":{"The":[0,138],"cyber":[1,81],"threat":[2,126],"landscape":[3],"is":[4,40,141],"highly":[5],"dynamic,":[6],"posing":[7],"a":[8,75,115,128,170],"significant":[9],"risk":[10,62,82,175],"to":[11,31,78,104,123,157,166],"the":[12,35,46,65,121,125,152],"operations":[13],"of":[14,48,68,120,143,154],"systems":[15,52],"and":[16,27,33,98,109,132,145],"organisations.":[17],"An":[18],"organisation":[19],"should,":[20],"therefore,":[21,150],"continuously":[22],"monitor":[23],"for":[24,174],"new":[25,160],"threats":[26,108],"properly":[28],"contextualise":[29],"them":[30],"identify":[32,133,159],"manage":[34],"resulting":[36],"risks.":[37,161],"Risk":[38],"identification":[39,63],"typically":[41],"performed":[42],"manually,":[43],"relying":[44],"on":[45,101],"integration":[47],"information":[49,90],"from":[50,91,127],"various":[51,92],"as":[53,55,169],"well":[54],"subject":[56],"matter":[57],"expert":[58],"knowledge.":[59],"This":[60,72,85],"manual":[61],"hinders":[64],"systematic":[66],"consideration":[67],"new,":[69],"emerging":[70],"threats.":[71],"paper":[73],"describes":[74],"novel":[76],"method":[77,88,122],"promote":[79],"automated":[80],"identification:":[83],"OnToRisk.":[84],"artificial":[86],"intelligence":[87],"integrates":[89],"sources":[93],"using":[94,155],"formal":[95],"ontology":[96],"definitions,":[97],"then":[99],"relies":[100],"these":[102],"definitions":[103],"robustly":[105],"frame":[106,124],"cybersecurity":[107],"provide":[110],"risk-related":[111],"insights.":[112],"We":[113],"describe":[114],"successful":[116],"case":[117,139],"study":[118,140],"implementation":[119],"newly":[129],"disclosed":[130],"vulnerability":[131],"its":[134],"induced":[135],"organisational":[136],"risk.":[137],"representative":[142],"common":[144],"widespread":[146],"real-life":[147],"challenges,":[148],"and,":[149],"showcases":[151],"feasibility":[153],"OnToRisk":[156,168],"sustainably":[158],"Further":[162],"applications":[163],"may":[164],"contribute":[165],"establishing":[167],"comprehensive,":[171],"disciplined":[172],"mechanism":[173],"identification.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-10-01T00:00:00"}
