{"id":"https://openalex.org/W4403410783","doi":"https://doi.org/10.4018/ijcini.357271","title":"Hierarchical Holographic Modeling of Network Ideology Risks","display_name":"Hierarchical Holographic Modeling of Network Ideology Risks","publication_year":2024,"publication_date":"2024-10-15","ids":{"openalex":"https://openalex.org/W4403410783","doi":"https://doi.org/10.4018/ijcini.357271"},"language":"en","primary_location":{"id":"doi:10.4018/ijcini.357271","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijcini.357271","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=357271&isxn=9798369324714","source":{"id":"https://openalex.org/S157664362","display_name":"International Journal of Cognitive Informatics and Natural Intelligence","issn_l":"1557-3958","issn":["1557-3958","1557-3966"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cognitive Informatics and Natural Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=357271&isxn=9798369324714","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110376916","display_name":"Qian Chen","orcid":"https://orcid.org/0000-0002-4648-1642"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Chen","raw_affiliation_strings":["Fuzhou University of International Studies and Trade, China"],"affiliations":[{"raw_affiliation_string":"Fuzhou University of International Studies and Trade, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5110376916"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15822083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"1","first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.9659000039100647,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.9659000039100647,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.9394000172615051,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8156436681747437},{"id":"https://openalex.org/keywords/ideology","display_name":"Ideology","score":0.778107225894928},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6948729753494263},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5497803688049316},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5320993661880493},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5303362607955933},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.5247530937194824},{"id":"https://openalex.org/keywords/social-network-analysis","display_name":"Social network analysis","score":0.4685799777507782},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4284970462322235},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.4156869053840637},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4054480493068695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3578813076019287},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.1372596025466919},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.11605480313301086},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10578775405883789},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09369984269142151},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08905583620071411}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8156436681747437},{"id":"https://openalex.org/C158071213","wikidata":"https://www.wikidata.org/wiki/Q7257","display_name":"Ideology","level":3,"score":0.778107225894928},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6948729753494263},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5497803688049316},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5320993661880493},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5303362607955933},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.5247530937194824},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.4685799777507782},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4284970462322235},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.4156869053840637},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4054480493068695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3578813076019287},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.1372596025466919},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.11605480313301086},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10578775405883789},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09369984269142151},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08905583620071411},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijcini.357271","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijcini.357271","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=357271&isxn=9798369324714","source":{"id":"https://openalex.org/S157664362","display_name":"International Journal of Cognitive Informatics and Natural Intelligence","issn_l":"1557-3958","issn":["1557-3958","1557-3966"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cognitive Informatics and Natural Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4018/ijcini.357271","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijcini.357271","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=357271&isxn=9798369324714","source":{"id":"https://openalex.org/S157664362","display_name":"International Journal of Cognitive Informatics and Natural Intelligence","issn_l":"1557-3958","issn":["1557-3958","1557-3966"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cognitive Informatics and Natural Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403410783.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W2980838704","https://openalex.org/W3004602423","https://openalex.org/W3082092060","https://openalex.org/W3092403679","https://openalex.org/W3104482763","https://openalex.org/W3108852469","https://openalex.org/W3154058168","https://openalex.org/W4281251962","https://openalex.org/W4293251107","https://openalex.org/W4306746941","https://openalex.org/W4307645860","https://openalex.org/W4308408563","https://openalex.org/W4313575091","https://openalex.org/W4317772064","https://openalex.org/W4318205583","https://openalex.org/W4320732619","https://openalex.org/W4323286961","https://openalex.org/W4362611851","https://openalex.org/W4367842212","https://openalex.org/W4377981900","https://openalex.org/W4377984328","https://openalex.org/W4384997845","https://openalex.org/W4387956680","https://openalex.org/W4388204014","https://openalex.org/W4390684548"],"related_works":["https://openalex.org/W2952662149","https://openalex.org/W2793616590","https://openalex.org/W2183090405","https://openalex.org/W2075666982","https://openalex.org/W2065835655","https://openalex.org/W3160699245","https://openalex.org/W2782955270","https://openalex.org/W2349928170","https://openalex.org/W1594712698","https://openalex.org/W2499535628"],"abstract_inverted_index":{"The":[0,94],"rapid":[1],"evolution":[2],"of":[3,10,17,75,96],"computer":[4,18],"network":[5,32,64,69,87,122,129],"technology":[6],"and":[7,53,102,118],"the":[8,15,36,73,76,80,97,112,133],"proliferation":[9],"social":[11,70,88],"information":[12],"have":[13],"elevated":[14],"role":[16],"networks":[19],"in":[20,132],"various":[21],"domains.":[22],"However,":[23],"this":[24,46],"progress":[25],"has":[26],"also":[27],"introduced":[28],"new":[29],"risks":[30,131],"to":[31,108],"ideology":[33,65,130],"security":[34],"within":[35,121],"big":[37,77,134],"data":[38,78,135],"environment.":[39,136],"Using":[40],"a":[41,57],"hierarchical":[42],"holographic":[43],"modeling":[44],"method,":[45],"study":[47,81,113],"identifies":[48],"three":[49],"key":[50],"risks\u2014subject-related,":[51],"information-related,":[52],"environmental":[54],"risks\u2014and":[55],"constructs":[56],"comprehensive":[58],"three-level":[59],"index":[60],"framework":[61],"for":[62,86,127],"evaluating":[63],"risks.":[66],"By":[67],"integrating":[68],"governance":[71],"with":[72],"complexities":[74],"era,":[79],"proposes":[82],"an":[83],"optimized":[84],"pathway":[85],"governance,":[89],"enriching":[90],"traditional":[91],"research":[92],"approaches.":[93],"introduction":[95],"LR-NSRPM":[98],"method":[99],"reduces":[100],"CPU":[101],"RAM":[103],"utilization":[104],"by":[105],"21.65%":[106],"compared":[107],"existing":[109],"methodologies.":[110],"Additionally,":[111],"outlines":[114],"observable":[115],"risk":[116],"indicators":[117],"high-risk":[119],"elements":[120],"ideology,":[123],"providing":[124],"valuable":[125],"insights":[126],"managing":[128]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
