{"id":"https://openalex.org/W2089547458","doi":"https://doi.org/10.4018/jhcr.2011100104","title":"Security Assurance Evaluation and IT Systems\u2019 Context of Use Security Criticality","display_name":"Security Assurance Evaluation and IT Systems\u2019 Context of Use Security Criticality","publication_year":2011,"publication_date":"2011-10-01","ids":{"openalex":"https://openalex.org/W2089547458","doi":"https://doi.org/10.4018/jhcr.2011100104","mag":"2089547458"},"language":"en","primary_location":{"id":"doi:10.4018/jhcr.2011100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jhcr.2011100104","pdf_url":null,"source":{"id":"https://openalex.org/S171045950","display_name":"International Journal of Handheld Computing Research","issn_l":"1947-9158","issn":["1947-9158","1947-9166"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Handheld Computing Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047548592","display_name":"Moussa Ouedraogo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Moussa Ouedraogo","raw_affiliation_strings":["Public Research Center Henri Tudor, Luxembourg","Public Research Center Henri Tudor, Luxembourg#TAB#"],"affiliations":[{"raw_affiliation_string":"Public Research Center Henri Tudor, Luxembourg","institution_ids":[]},{"raw_affiliation_string":"Public Research Center Henri Tudor, Luxembourg#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014613493","display_name":"Haralambos Mouratidis","orcid":"https://orcid.org/0000-0002-2599-0712"},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Haralambos Mouratidis","raw_affiliation_strings":["University of East London, England","University of East London, England#TAB#"],"affiliations":[{"raw_affiliation_string":"University of East London, England","institution_ids":["https://openalex.org/I157227730"]},{"raw_affiliation_string":"University of East London, England#TAB#","institution_ids":["https://openalex.org/I157227730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025583920","display_name":"\u00c9ric Dubois","orcid":"https://orcid.org/0000-0003-1253-5283"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eric Dubois","raw_affiliation_strings":["Public Research Center Henri Tudor, Luxembourg","Public Research Center Henri Tudor, Luxembourg#TAB#"],"affiliations":[{"raw_affiliation_string":"Public Research Center Henri Tudor, Luxembourg","institution_ids":[]},{"raw_affiliation_string":"Public Research Center Henri Tudor, Luxembourg#TAB#","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041439610","display_name":"Djamel Khadraoui","orcid":"https://orcid.org/0000-0003-1054-1612"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Djamel Khadraoui","raw_affiliation_strings":["Public Research Center Henri Tudor, Luxembourg","Public Research Center Henri Tudor, Luxembourg#TAB#"],"affiliations":[{"raw_affiliation_string":"Public Research Center Henri Tudor, Luxembourg","institution_ids":[]},{"raw_affiliation_string":"Public Research Center Henri Tudor, Luxembourg#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047548592"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16003509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"4","first_page":"59","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7961803078651428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7439460754394531},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6869062185287476},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6088089346885681},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6021884083747864},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5855046510696411},{"id":"https://openalex.org/keywords/criticality","display_name":"Criticality","score":0.577933669090271},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5461961627006531},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.4972687065601349},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4892744719982147},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.44724810123443604},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43986624479293823},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4268963932991028},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.42245718836784363},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.38697338104248047},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.2749025225639343}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7961803078651428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7439460754394531},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6869062185287476},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6088089346885681},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6021884083747864},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5855046510696411},{"id":"https://openalex.org/C125611927","wikidata":"https://www.wikidata.org/wiki/Q17008131","display_name":"Criticality","level":2,"score":0.577933669090271},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5461961627006531},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.4972687065601349},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4892744719982147},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.44724810123443604},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43986624479293823},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4268963932991028},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.42245718836784363},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.38697338104248047},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2749025225639343},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jhcr.2011100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jhcr.2011100104","pdf_url":null,"source":{"id":"https://openalex.org/S171045950","display_name":"International Journal of Handheld Computing Research","issn_l":"1947-9158","issn":["1947-9158","1947-9166"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Handheld Computing Research","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jhcr00:v:2:y:2011:i:4:p:59-81","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jhcr.2011100104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W26877571","https://openalex.org/W78372138","https://openalex.org/W140201237","https://openalex.org/W1556081287","https://openalex.org/W1586030051","https://openalex.org/W2029470589","https://openalex.org/W2032270375","https://openalex.org/W2042448840","https://openalex.org/W2105656578","https://openalex.org/W2145790759","https://openalex.org/W2147719461","https://openalex.org/W2151284363","https://openalex.org/W2153797486","https://openalex.org/W2156294488","https://openalex.org/W2158572645","https://openalex.org/W2614505876","https://openalex.org/W2618490554","https://openalex.org/W2628526097","https://openalex.org/W2751296996","https://openalex.org/W3021734875","https://openalex.org/W3200788958","https://openalex.org/W4248297765","https://openalex.org/W6682763149"],"related_works":["https://openalex.org/W2017116761","https://openalex.org/W3156070267","https://openalex.org/W2018644264","https://openalex.org/W4285411707","https://openalex.org/W4230385779","https://openalex.org/W1811024770","https://openalex.org/W2907868081","https://openalex.org/W2032098076","https://openalex.org/W2467594283","https://openalex.org/W2542633692"],"abstract_inverted_index":{"Today\u2019s":[0],"IT":[1,113,147],"systems":[2,53],"are":[3],"ubiquitous":[4],"and":[5,45,69,137],"take":[6,57],"the":[7,14,17,20,29,34,49,60,70,73,77,81,88,97,107,122,125,131,138,141,146,180],"form":[8],"of":[9,16,51,62,65,72,76,111,117,133,140,143,145,183],"small":[10],"portable":[11],"devices,":[12],"to":[13,31,38,154],"convenience":[15],"users.":[18],"However,":[19],"reliance":[21],"on":[22,130,159,179],"this":[23,118],"technology":[24],"is":[25,83,87,173],"increasing":[26,36],"faster":[27],"than":[28],"ability":[30],"deal":[32],"with":[33,175],"simultaneously":[35],"threats":[37],"information":[39],"security.":[40],"This":[41,171],"paper":[42,98],"proposes":[43,100],"metrics":[44],"a":[46,66,101,184],"methodology":[47],"for":[48,105],"evaluation":[50],"operational":[52],"security":[54,63,74,108,135,157],"assurance":[55,126],"that":[56,95,124],"into":[58],"account":[59],"measurement":[61],"correctness":[64,132],"safeguarding":[67],"measure":[68],"analysis":[71],"criticality":[75,109,139],"context":[78,142],"in":[79,121],"which":[80],"system":[82,89,148],"operating":[84],"(i.e.,":[85],"where":[86],"used":[90],"and/or":[91],"what":[92,160],"for?).":[93],"In":[94],"perspective,":[96],"also":[99],"novel":[102],"classification":[103],"scheme":[104],"elucidating":[106],"level":[110,127],"an":[112,176],"system.":[114],"The":[115],"advantage":[116],"approach":[119],"lies":[120],"fact":[123],"fluctuation":[128],"based":[129,178],"deployed":[134],"measures":[136],"use":[144],"or":[149,164],"device,":[150],"could":[151],"provide":[152],"guidance":[153],"users":[155],"without":[156],"background":[158],"activities":[161],"they":[162],"may":[163,165],"not":[166],"perform":[167],"under":[168],"certain":[169],"circumstances.":[170],"work":[172],"illustrated":[174],"application":[177],"case":[181],"study":[182],"Domain":[185],"Name":[186],"Server":[187],"(DNS).":[188]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
