{"id":"https://openalex.org/W1994628740","doi":"https://doi.org/10.4018/jte.2011040105","title":"Socio-Technical Influences of Cyber Espionage","display_name":"Socio-Technical Influences of Cyber Espionage","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W1994628740","doi":"https://doi.org/10.4018/jte.2011040105","mag":"1994628740"},"language":"en","primary_location":{"id":"doi:10.4018/jte.2011040105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jte.2011040105","pdf_url":null,"source":{"id":"https://openalex.org/S54269052","display_name":"International Journal of Technoethics","issn_l":"1947-3451","issn":["1947-3451","1947-346X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Technoethics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001009594","display_name":"Xue Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Xue Lin","raw_affiliation_strings":["University of Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055324184","display_name":"Rocci Luppicini","orcid":"https://orcid.org/0000-0003-1962-2697"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rocci Luppicini","raw_affiliation_strings":["University of Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Canada","institution_ids":["https://openalex.org/I153718931"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001009594"],"corresponding_institution_ids":["https://openalex.org/I153718931"],"apc_list":null,"apc_paid":null,"fwci":0.7487,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.81935417,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":"2","first_page":"65","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.960099995136261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.957099974155426,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/espionage","display_name":"Espionage","score":0.917607843875885},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.6460808515548706},{"id":"https://openalex.org/keywords/counterintelligence","display_name":"Counterintelligence","score":0.6030740141868591},{"id":"https://openalex.org/keywords/industrial-espionage","display_name":"Industrial espionage","score":0.548682689666748},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5468827486038208},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5391042828559875},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.5204989314079285},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.49445438385009766},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4884185194969177},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.389595091342926},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.30203109979629517}],"concepts":[{"id":"https://openalex.org/C558872910","wikidata":"https://www.wikidata.org/wiki/Q165950","display_name":"Espionage","level":2,"score":0.917607843875885},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.6460808515548706},{"id":"https://openalex.org/C173127888","wikidata":"https://www.wikidata.org/wiki/Q501700","display_name":"Counterintelligence","level":2,"score":0.6030740141868591},{"id":"https://openalex.org/C99712631","wikidata":"https://www.wikidata.org/wiki/Q1160650","display_name":"Industrial espionage","level":2,"score":0.548682689666748},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5468827486038208},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5391042828559875},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.5204989314079285},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.49445438385009766},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4884185194969177},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.389595091342926},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.30203109979629517},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jte.2011040105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jte.2011040105","pdf_url":null,"source":{"id":"https://openalex.org/S54269052","display_name":"International Journal of Technoethics","issn_l":"1947-3451","issn":["1947-3451","1947-346X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Technoethics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jt0000:v:2:y:2011:i:2:p:65-77","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jte.2011040105","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W129287422","https://openalex.org/W162128149","https://openalex.org/W1420162645","https://openalex.org/W1497959974","https://openalex.org/W1547183878","https://openalex.org/W1561010465","https://openalex.org/W1569268909","https://openalex.org/W1586910812","https://openalex.org/W2003342521","https://openalex.org/W2008934558","https://openalex.org/W2019661534","https://openalex.org/W2031130362","https://openalex.org/W2098589680","https://openalex.org/W2153646932","https://openalex.org/W2314887345","https://openalex.org/W2481227862","https://openalex.org/W2489701140","https://openalex.org/W2490457784","https://openalex.org/W2504993487","https://openalex.org/W2544711925","https://openalex.org/W2765068257","https://openalex.org/W2913371917","https://openalex.org/W2994173442","https://openalex.org/W3022472111","https://openalex.org/W3099005193","https://openalex.org/W4230009126","https://openalex.org/W4238653782","https://openalex.org/W4241956145","https://openalex.org/W4392996531"],"related_works":["https://openalex.org/W4386241123","https://openalex.org/W3049379152","https://openalex.org/W1969390830","https://openalex.org/W2476792499","https://openalex.org/W4386243844","https://openalex.org/W2795682744","https://openalex.org/W3209489214","https://openalex.org/W34491042","https://openalex.org/W2318646144","https://openalex.org/W4230268072"],"abstract_inverted_index":{"Technoethical":[0],"inquiry":[1],"deals":[2],"with":[3],"a":[4,31,96],"variety":[5],"of":[6,15,24,69,92,99,113,122,128,135,141,145,148],"social,":[7],"legal,":[8],"cultural,":[9],"economic,":[10,41],"political,":[11,40],"and":[12,27,42,49,56,79,115],"ethical":[13],"implications":[14],"new":[16],"technological":[17],"applications":[18],"which":[19,36],"can":[20],"threaten":[21],"important":[22,39],"aspects":[23,91],"contemporary":[25],"life":[26],"society.":[28],"GhostNet":[29,70,77,129],"is":[30],"large-scale":[32],"cyber":[33,83,93],"espionage":[34,94],"network":[35],"has":[37],"infiltrated":[38],"media":[43],"institutions":[44],"including":[45],"embassies,":[46],"foreign":[47],"ministries":[48],"other":[50],"government":[51],"offices":[52],"in":[53,132],"103":[54],"countries":[55],"infected":[57],"at":[58],"least":[59],"1,295":[60],"computers.":[61],"The":[62,85],"following":[63],"case":[64,97],"study":[65,98],"explores":[66],"the":[67,89,107,126,133,139,143],"influences":[68],"on":[71,82,102,118],"affected":[72,119],"organizations":[73],"by":[74],"critically":[75],"reviewing":[76],"documentation":[78],"relevant":[80],"literature":[81],"espionage.":[84],"research":[86,108],"delves":[87],"into":[88],"socio-technical":[90,111,146],"through":[95],"GhostNet.":[100],"Drawing":[101],"Actor":[103],"Network":[104],"Theory":[105],"(ANT),":[106],"examined":[109],"key":[110],"relations":[112,147],"Ghostnet":[114],"their":[116],"influence":[117],"organizations.":[120,151],"Implications":[121],"these":[123],"findings":[124],"for":[125],"phenomenon":[127],"are":[130],"discussed":[131],"hope":[134],"raising":[136],"awareness":[137],"about":[138],"importance":[140],"understanding":[142],"dynamics":[144],"cyber-espionage":[149],"within":[150]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
