{"id":"https://openalex.org/W1981886860","doi":"https://doi.org/10.4018/ijcwt.2013070102","title":"Consequences of Diminishing Trust in Cyberspace","display_name":"Consequences of Diminishing Trust in Cyberspace","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W1981886860","doi":"https://doi.org/10.4018/ijcwt.2013070102","mag":"1981886860"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013070102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070102","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048167872","display_name":"Dipankar Dasgupta","orcid":"https://orcid.org/0000-0002-3097-061X"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dipankar Dasgupta","raw_affiliation_strings":["Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084979723","display_name":"Denise Ferebee","orcid":"https://orcid.org/0000-0003-4791-4638"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Denise M. Ferebee","raw_affiliation_strings":["Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"Center for Information Assurance (CAE-R), Department of Computer Science, University of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048167872"],"corresponding_institution_ids":["https://openalex.org/I94658018"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19344743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"3","first_page":"19","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.910099983215332,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.910099983215332,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8677595853805542},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.657593846321106},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.5401261448860168},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5343329906463623},{"id":"https://openalex.org/keywords/globalization","display_name":"Globalization","score":0.4695492386817932},{"id":"https://openalex.org/keywords/misinformation","display_name":"Misinformation","score":0.4332212209701538},{"id":"https://openalex.org/keywords/openness-to-experience","display_name":"Openness to experience","score":0.4263521432876587},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.42271196842193604},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4090087115764618},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3245541453361511},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2696939706802368},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.17511239647865295},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1432988941669464},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11661383509635925}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8677595853805542},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.657593846321106},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.5401261448860168},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5343329906463623},{"id":"https://openalex.org/C2119116","wikidata":"https://www.wikidata.org/wiki/Q7181","display_name":"Globalization","level":2,"score":0.4695492386817932},{"id":"https://openalex.org/C2776990098","wikidata":"https://www.wikidata.org/wiki/Q13579947","display_name":"Misinformation","level":2,"score":0.4332212209701538},{"id":"https://openalex.org/C84976871","wikidata":"https://www.wikidata.org/wiki/Q2015673","display_name":"Openness to experience","level":2,"score":0.4263521432876587},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.42271196842193604},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4090087115764618},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3245541453361511},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2696939706802368},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.17511239647865295},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1432988941669464},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11661383509635925},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.4018/ijcwt.2013070102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070102","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.372.342","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ais.cs.memphis.edu/files/papers/Dasgupta-iciw2013-paper_Final.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.372.4553","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.4553","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ais.cs.memphis.edu/files/papers/DasguptaTechicalReport-12-02.pdf","raw_type":"text"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:3:p:19-31","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013070102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1461362454","https://openalex.org/W1745290066","https://openalex.org/W1983113779","https://openalex.org/W2007337050","https://openalex.org/W2015086338","https://openalex.org/W2089465436","https://openalex.org/W2121315148","https://openalex.org/W6628726179","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3197131596","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W3167675181","https://openalex.org/W2360897455","https://openalex.org/W2377660959","https://openalex.org/W4251169878","https://openalex.org/W4205914924","https://openalex.org/W2131575257"],"abstract_inverted_index":{"The":[0],"cyberspace":[1,55],"has":[2,56],"become":[3],"an":[4],"integral":[5],"part":[6],"of":[7,21,73,89,123,127,139,189],"modern":[8],"day":[9],"life\u2014social,":[10],"economic,":[11],"political,":[12,58],"religious,":[13],"medical":[14],"and":[15,27,43,53,70,105,110,130,142,164,180],"other":[16],"aspects.":[17],"Without":[18],"the":[19,22,34,71,77,86,115,120,137,140,143,154,169],"availability":[20],"Internet,":[23],"many":[24],"businesses,":[25],"governments":[26],"society":[28],"would":[29],"not":[30],"function":[31],"properly.":[32],"Presently,":[33],"Internet":[35,155],"brings":[36],"people":[37,74],"together":[38],"to":[39,47],"share":[40],"their":[41,45],"ideas,":[42],"allow":[44],"voices":[46],"be":[48,157,173,185],"heard.":[49],"In":[50,112],"its":[51],"inception":[52],"ideally,":[54],"no":[57,147],"geographical":[59],"or":[60],"social":[61],"boundaries;":[62],"as":[63],"a":[64,81,106],"result":[65],"it":[66],"facilitates":[67],"in":[68,134],"globalization":[69],"uniting":[72],"all":[75],"over":[76],"world":[78,96],"by":[79,176],"providing":[80],"means":[82],"for":[83,108],"communication.":[84],"While":[85],"potential":[87],"benefits":[88],"this":[90,94,113,151],"interconnectivity":[91],"are":[92],"unlimited,":[93],"virtual":[95],"is":[97],"also":[98],"becoming":[99],"hackers'":[100],"playground,":[101],"nation-states'":[102],"battle":[103],"ground,":[104],"vehicle":[107],"propaganda":[109],"misinformation.":[111],"article,":[114],"authors":[116],"argue":[117],"that":[118],"with":[119],"growing":[121],"threat":[122],"coordinated":[124],"attacks,":[125],"creation":[126],"complex":[128],"malware":[129],"gradually":[131],"diminished":[132],"trust":[133],"freely-available":[135],"information,":[136],"openness":[138],"web":[141],"global":[144],"connectivity":[145],"will":[146,156,160,172,183],"longer":[148],"exist.":[149],"If":[150],"trend":[152],"continues,":[153],"partitioned,":[158],"users":[159],"rely":[161],"on":[162],"information":[163,170],"news":[165],"through":[166],"membership-based":[167],"services,":[168],"flow":[171],"highly":[174],"regulated":[175],"governments,":[177],"online":[178],"businesses":[179],"critical":[181],"knowledge":[182],"only":[184],"shared":[186],"among":[187],"alliance":[188],"friendly":[190],"nations.":[191]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
