{"id":"https://openalex.org/W2051019094","doi":"https://doi.org/10.4018/ijcwt.2013100103","title":"Preparing for Cyber Threats with Information Security Policies","display_name":"Preparing for Cyber Threats with Information Security Policies","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2051019094","doi":"https://doi.org/10.4018/ijcwt.2013100103","mag":"2051019094"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013100103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100103","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075288894","display_name":"Ilona Ilvonen","orcid":"https://orcid.org/0000-0002-2418-9077"},"institutions":[{"id":"https://openalex.org/I4210133110","display_name":"Tampere University","ror":null,"country_code":"FI","type":null,"lineage":["https://openalex.org/I4210133110"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Ilona Ilvonen","raw_affiliation_strings":["Tampere University of Technology, Tampere, Finland","Tampere University of Technology , Tampere, Finland"],"affiliations":[{"raw_affiliation_string":"Tampere University of Technology, Tampere, Finland","institution_ids":["https://openalex.org/I4210133110"]},{"raw_affiliation_string":"Tampere University of Technology , Tampere, Finland","institution_ids":["https://openalex.org/I4210133110"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110036984","display_name":"Pasi Virtanen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133110","display_name":"Tampere University","ror":null,"country_code":"FI","type":null,"lineage":["https://openalex.org/I4210133110"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Pasi Virtanen","raw_affiliation_strings":["Tampere University of Technology, Tampere, Finland","Tampere University of Technology , Tampere, Finland"],"affiliations":[{"raw_affiliation_string":"Tampere University of Technology, Tampere, Finland","institution_ids":["https://openalex.org/I4210133110"]},{"raw_affiliation_string":"Tampere University of Technology , Tampere, Finland","institution_ids":["https://openalex.org/I4210133110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075288894"],"corresponding_institution_ids":["https://openalex.org/I4210133110"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17596602,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"4","first_page":"22","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.7750537395477295},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6633727550506592},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5659756660461426},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5314701199531555},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5008349418640137},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4886761009693146},{"id":"https://openalex.org/keywords/collateral-damage","display_name":"Collateral damage","score":0.4514937102794647},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.42863741517066956},{"id":"https://openalex.org/keywords/outcome","display_name":"Outcome (game theory)","score":0.4277034401893616},{"id":"https://openalex.org/keywords/collateral","display_name":"Collateral","score":0.41057485342025757},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4063348174095154},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.27201229333877563},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.25820982456207275},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.16759270429611206},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.07326588034629822}],"concepts":[{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.7750537395477295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6633727550506592},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5659756660461426},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5314701199531555},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5008349418640137},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4886761009693146},{"id":"https://openalex.org/C2993632694","wikidata":"https://www.wikidata.org/wiki/Q45939","display_name":"Collateral damage","level":2,"score":0.4514937102794647},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.42863741517066956},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.4277034401893616},{"id":"https://openalex.org/C2777910564","wikidata":"https://www.wikidata.org/wiki/Q694563","display_name":"Collateral","level":2,"score":0.41057485342025757},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4063348174095154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.27201229333877563},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.25820982456207275},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.16759270429611206},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.07326588034629822},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2013100103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100103","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:4:p:22-31","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013100103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W21699267","https://openalex.org/W22493313","https://openalex.org/W1499142516","https://openalex.org/W1602619638","https://openalex.org/W1667620227","https://openalex.org/W1969641949","https://openalex.org/W1970423488","https://openalex.org/W1976978659","https://openalex.org/W1977534227","https://openalex.org/W2000667443","https://openalex.org/W2010902645","https://openalex.org/W2022080912","https://openalex.org/W2024648650","https://openalex.org/W2049188895","https://openalex.org/W2065078170","https://openalex.org/W2067585075","https://openalex.org/W2080940090","https://openalex.org/W2114296561","https://openalex.org/W2131280967","https://openalex.org/W2142318891","https://openalex.org/W2142515455","https://openalex.org/W2163511876","https://openalex.org/W2166531541","https://openalex.org/W2168869093","https://openalex.org/W2185139265","https://openalex.org/W2242304307","https://openalex.org/W2630576153","https://openalex.org/W3111136919","https://openalex.org/W3123661920","https://openalex.org/W4232737250","https://openalex.org/W6681048717"],"related_works":["https://openalex.org/W267668425","https://openalex.org/W4285653978","https://openalex.org/W1973219869","https://openalex.org/W3128439003","https://openalex.org/W2237308493","https://openalex.org/W1501131365","https://openalex.org/W4382404268","https://openalex.org/W2291250162","https://openalex.org/W369775872","https://openalex.org/W2036108086"],"abstract_inverted_index":{"Contemporary":[0],"organisations":[1,13,50],"in":[2,25,106,117,145],"any":[3],"industry":[4],"are":[5,14,23,28,59],"increasingly":[6],"dependent":[7],"on":[8,45,62],"information":[9,131,140],"systems.":[10],"Today":[11],"most":[12],"online":[15],"all":[16],"the":[17,34,46,52,69,92,98,102,113,123,126,136,139,148],"time,":[18],"and":[19,41,85,134],"their":[20,42],"internal":[21],"systems":[22],"used":[24],"environments":[26],"that":[27,72,125],"already":[29],"or":[30,100],"easily":[31],"connected":[32],"to":[33,73,97,130],"internet.":[35],"The":[36,57,120],"paper":[37,121],"analyses":[38],"cyber":[39,81,127],"threats":[40,128],"potential":[43],"effect":[44],"operations":[47],"of":[48,54,68,138],"different":[49],"with":[51],"use":[53],"scenario":[55],"analysis.":[56],"scenarios":[58],"built":[60],"based":[61],"a":[63,80],"literature":[64],"review.":[65],"One":[66],"outcome":[67],"analysis":[70],"is":[71,77,88,94,104,108,115],"an":[74],"organisation":[75,99],"it":[76,87],"irrelevant":[78],"where":[79],"threat":[82,93,103,114],"originates":[83],"from":[84],"who":[86],"targeted":[89,96],"for.":[90],"If":[91],"specifically":[95],"if":[101],"collateral":[105],"nature":[107],"not":[109],"important;":[110],"preparing":[111,146],"for":[112,147],"important":[116],"both":[118],"cases.":[119],"discusses":[122],"pressures":[124],"pose":[129],"security":[132,141],"policies,":[133],"what":[135],"role":[137],"policy":[142],"could":[143],"be":[144],"threats.":[149]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
