Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W1524012182', 'doi': None, 'title': 'Viewing Cybersecurity as a Public Good: The Role of Governments, Businesses, and Individuals', 'display_name': 'Viewing Cybersecurity as a Public Good: The Role of Governments, Businesses, and Individuals', 'publication_year': 2013, 'publication_date': '2013-01-01', 'ids': {'openalex': 'https://openalex.org/W1524012182', 'mag': '1524012182'}, 'language': 'en', 'primary_location': {'is_oa': False, 'landing_page_url': 'https://www.alliedacademies.org/pdfs/proceedings30/ALERI%20Proceedings%20Spring%202012.pdf', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S2765000423', 'display_name': 'Journal of Legal Ethical and Regulatory Issues', 'issn_l': '1544-0036', 'issn': ['1544-0036', '1544-0044'], 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': 'https://openalex.org/P4366064736', 'host_organization_name': 'Allied Business Academies', 'host_organization_lineage': ['https://openalex.org/P4366064736'], 'host_organization_lineage_names': ['Allied Business Academies'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': [], 'open_access': {'is_oa': False, 'oa_status': 'closed', 'oa_url': None, 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5010714200', 'display_name': 'Arben Asllani', 'orcid': 'https://orcid.org/0000-0001-5425-6763'}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Arben Asllani', 'raw_affiliation_strings': ['Allied Academies'], 'affiliations': [{'raw_affiliation_string': 'Allied Academies', 'institution_ids': []}]}, {'author_position': 'middle', 'author': {'id': 'https://openalex.org/A5107516505', 'display_name': 'Charles S. White', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Charles Stephen White', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5045323278', 'display_name': 'Lawrence P. Ettkin', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Lawrence Ettkin', 'raw_affiliation_strings': [], 'affiliations': []}], 'institution_assertions': [], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': 2.602, 'has_fulltext': False, 'cited_by_count': 21, 'citation_normalized_percentile': {'value': 0.965182, 'is_in_top_1_percent': False, 'is_in_top_10_percent': True}, 'cited_by_percentile_year': {'min': 90, 'max': 91}, 'biblio': {'volume': '16', 'issue': '1', 'first_page': '7', 'last_page': None}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T12221', 'display_name': 'Cybersecurity and Cyber Warfare Studies', 'score': 0.9004, 'subfield': {'id': 'https://openalex.org/subfields/3320', 'display_name': 'Political Science and International Relations'}, 'field': {'id': 'https://openalex.org/fields/33', 'display_name': 'Social Sciences'}, 'domain': {'id': 'https://openalex.org/domains/2', 'display_name': 'Social Sciences'}}, 'topics': [{'id': 'https://openalex.org/T12221', 'display_name': 'Cybersecurity and Cyber Warfare Studies', 'score': 0.9004, 'subfield': {'id': 'https://openalex.org/subfields/3320', 'display_name': 'Political Science and International Relations'}, 'field': {'id': 'https://openalex.org/fields/33', 'display_name': 'Social Sciences'}, 'domain': {'id': 'https://openalex.org/domains/2', 'display_name': 'Social Sciences'}}], 'keywords': [], 'concepts': [{'id': 'https://openalex.org/C46934059', 'wikidata': 'https://www.wikidata.org/wiki/Q61515', 'display_name': 'Outsourcing', 'level': 2, 'score': 0.6023355}, {'id': 'https://openalex.org/C2781241145', 'wikidata': 'https://www.wikidata.org/wiki/Q204606', 'display_name': 'Cyberspace', 'level': 3, 'score': 0.56930226}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.54319036}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.5415168}, {'id': 'https://openalex.org/C2778137410', 'wikidata': 'https://www.wikidata.org/wiki/Q2732820', 'display_name': 'Government (linguistics)', 'level': 2, 'score': 0.51631683}, {'id': 'https://openalex.org/C121017731', 'wikidata': 'https://www.wikidata.org/wiki/Q11661', 'display_name': 'Information technology', 'level': 2, 'score': 0.41677788}, {'id': 'https://openalex.org/C39549134', 'wikidata': 'https://www.wikidata.org/wiki/Q133080', 'display_name': 'Public relations', 'level': 1, 'score': 0.36985502}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.22942579}, {'id': 'https://openalex.org/C162853370', 'wikidata': 'https://www.wikidata.org/wiki/Q39809', 'display_name': 'Marketing', 'level': 1, 'score': 0.19886047}, {'id': 'https://openalex.org/C110875604', 'wikidata': 'https://www.wikidata.org/wiki/Q75', 'display_name': 'The Internet', 'level': 2, 'score': 0.18033364}, {'id': 'https://openalex.org/C41895202', 'wikidata': 'https://www.wikidata.org/wiki/Q8162', 'display_name': 'Linguistics', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C138885662', 'wikidata': 'https://www.wikidata.org/wiki/Q5891', 'display_name': 'Philosophy', 'level': 0, 'score': 0.0}, {'id': 'https://openalex.org/C136764020', 'wikidata': 'https://www.wikidata.org/wiki/Q466', 'display_name': 'World Wide Web', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C17744445', 'wikidata': 'https://www.wikidata.org/wiki/Q36442', 'display_name': 'Political science', 'level': 0, 'score': 0.0}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': False, 'landing_page_url': 'https://www.alliedacademies.org/pdfs/proceedings30/ALERI%20Proceedings%20Spring%202012.pdf', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S2765000423', 'display_name': 'Journal of Legal Ethical and Regulatory Issues', 'issn_l': '1544-0036', 'issn': ['1544-0036', '1544-0044'], 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': 'https://openalex.org/P4366064736', 'host_organization_name': 'Allied Business Academies', 'host_organization_lineage': ['https://openalex.org/P4366064736'], 'host_organization_lineage_names': ['Allied Business Academies'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}], 'best_oa_location': None, 'sustainable_development_goals': [{'display_name': 'Peace, justice, and strong institutions', 'id': 'https://metadata.un.org/sdg/16', 'score': 0.51}], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 0, 'referenced_works': [], 'related_works': ['https://openalex.org/W333656244', 'https://openalex.org/W3162455595', 'https://openalex.org/W3149123745', 'https://openalex.org/W3122314332', 'https://openalex.org/W3112543613', 'https://openalex.org/W3112040056', 'https://openalex.org/W3013037659', 'https://openalex.org/W3004607966', 'https://openalex.org/W2957574369', 'https://openalex.org/W2804514557', 'https://openalex.org/W2747806789', 'https://openalex.org/W270718693', 'https://openalex.org/W2616007170', 'https://openalex.org/W2502680019', 'https://openalex.org/W2479312471', 'https://openalex.org/W2243743798', 'https://openalex.org/W2188103622', 'https://openalex.org/W2076818149', 'https://openalex.org/W2042627001', 'https://openalex.org/W1774204707'], 'abstract_inverted_index': {'ABSTRACTThis': [0], 'paper': [1, 45, 82], 'explores': [2], 'the': [3, 29, 44, 76, 91, 117, 132, 145, 148, 193, 262, 313, 319, 399, 411, 429, 521, 524, 586], 'role': [4, 92], 'of': [5, 22, 31, 78, 87, 93, 104, 123, 134, 147, 201, 257, 346, 355, 365, 374, 388, 413, 416, 431, 585], 'government': [6, 94], 'for': [7, 450, 478], 'establishing': [8], 'an': [9, 352, 361, 499], 'appropriate': [10, 500], 'legal,': [11], 'social,': [12], 'and': [13, 28, 62, 66, 98, 106, 111, 127, 136, 160, 179, 185, 209, 221, 230, 235, 244, 264, 272, 276, 312, 378, 383, 410, 443, 460, 482, 508, 569, 577, 599], 'ethical': [14], 'framework': [15, 526], 'to': [16, 54, 75, 95, 99, 162, 182, 189, 224, 232, 280, 288, 340, 371, 484, 503, 544, 582, 604], 'enhance': [17, 96, 489], 'cyber': [18, 23, 101, 510], 'security.': [19, 80], 'Previous': [20], 'doctrines': [21], 'security': [24, 271, 281, 349], 'are': [25, 155, 322, 369, 390], 'briefly': [26], 'analyzed,': [27], 'concept': [30], 'cybersecurity': [32, 57, 70, 97, 320, 336, 422, 473, 493, 507], 'as': [33, 253, 338, 351, 548], 'a': [34, 85, 198, 292, 405, 440, 516, 559, 563, 567, 579, 594, 601], 'public': [35, 42, 51, 55], 'good': [36, 69], 'is': [37, 140, 197, 310, 315, 360, 529], 'explored.': [38], 'To': [39], 'better': [40], 'understand': [41], 'cybersecurity,': [43], 'compares': [46], 'it': [47], 'with': [48, 84, 246, 428, 505], 'safety,': [49, 56], 'another': [50], 'good.': [52], 'Similar': [53], 'requires': [58], 'that': [59, 72, 89, 299, 488], 'federal,': [60], 'state,': [61], 'local': [63], 'government,': [64], 'organizations,': [65], 'individuals': [67, 112, 277], 'implement': [68], 'controls': [71], 'result': [73], 'in': [74, 305, 325, 426, 486, 527], 'protection': [77], 'national': [79], 'The': [81], 'concludes': [83], 'set': [86], 'examples': [88], 'illustrate': [90], 'mitigate': [100, 509], 'insecurities.INTRODUCTIONThe': [102], 'use': [103, 218, 578], 'computers': [105, 220], 'information': [107, 173, 213, 258, 420], 'technology': [108, 433], 'by': [109, 469, 532, 562], 'organizations': [110, 135, 154, 275, 300, 334, 409, 442], 'has': [113, 267, 273], 'grown': [114, 425], 'drastically': [115], 'over': [116, 270], 'last': [118], 'few': [119], 'decades.': [120], 'Recent': [121], 'trends': [122], 'globalization,': [124], 'outsourcing,': [125], 'offshoring,': [126], 'cloud': [128], 'computing,': [129], 'have': [130, 206, 348, 404, 424, 446], 'changed': [131], 'structure': [133], 'their': [137, 158, 164, 175, 186, 219, 227, 233, 242, 247, 341, 356], 'cyberspace.': [138], 'Information': [139], 'no': [141], 'longer': [142], 'confined': [143], 'within': [144], 'walls': [146], 'organization': [149], '(UMUC,': [150], '201': [151, 497], '1).': [152], "Today's": [153], 'constantly': [156], 'allowing': [157], 'customers': [159], 'suppliers': [161, 180], 'access': [163, 226, 550, 554, 558, 566], 'supply': [165, 202], 'chain': [166, 203], 'management': [167, 337], 'systems.': [168, 367], 'Customers': [169], 'can': [170, 403], 'retrieve': [171], 'product': [172], 'from': [174, 466], 'Electronic': [176], 'Commerce': [177], 'systems,': [178, 421], 'need': [181], 'schedule': [183], 'data': [184], 'own': [187], 'employees': [188], 'log': [190], 'on': [191, 212, 408, 419], 'into': [192, 398], "organizations'": [194], 'intranet.': [195], 'Trust': [196], 'key': [199], 'element': [200], 'operations.': [204], 'Individuals': [205], 'become': [207], 'more': [208, 210, 278, 316, 571], 'dependent': [211], 'technology.': [214], 'As': [215, 439], 'employees,': [216], 'they': [217, 402], 'mobile': [222], 'devices': [223], 'remotely': [225], 'organizational': [228, 263], 'networks': [229], 'connect': [231], 'friends': [234], 'families': [236], 'through': [237, 249], 'social': [238], 'networks.': [239], 'Professionals': [240], 'expand': [241], 'connections': [243], 'communicate': [245], 'colleagues': [248], 'professional': [250], 'networks,': [251], 'such': [252], 'Linkedln.The': [254], 'global': [255], 'reach': [256], 'systems': [259], 'at': [260], 'both': [261], 'individual': [265], 'level': [266], 'raised': [268], 'concerns': [269, 423], 'made': [274], 'vulnerable': [279], 'threats.': [282], 'Organizations': [283], 'must': [284, 456, 463], 'pay': [285], 'special': [286], 'attention': [287], 'cybersecurity.': [289, 452], 'For': [290], 'example,': [291], 'recent': [293], 'study': [294], 'about': [295], 'software': [296], 'vendors': [297], 'indicated': [298], 'lose': [301], 'around': [302], '0.6': [303], 'percent': [304], 'stock': [306], 'price': [307], 'when': [308, 318], 'vulnerability': [309], 'reported,': [311], 'impact': [314, 407], 'severe': [317], 'flaws': [321], 'not': [323], 'addressed': [324], 'advance': [326], '(Telang': [327], '&': [328, 436, 495, 535], 'Wattal,': [329], '2007).': [330], 'However,': [331], 'while': [332], 'most': [333], 'consider': [335], 'critical': [339], 'operations,': [342], 'fewer': [343], 'than': [344, 491, 572], '25%': [345], 'them': [347, 465], 'measures': [350], 'integrated': [353], 'part': [354], 'operations': [357], '(Bosen,': [358], '2006).There': [359], 'even': [362], 'darker': [363], 'side': [364], 'computer': [366, 432, 444, 551, 560, 568, 580, 595, 597], 'They': [368], 'used': [370, 561], 'program': [372, 581], 'weapons': [373], 'mass': [375], 'destruction,': [376], 'biologic': [377], 'chemical': [379], 'weapons,': [380], 'military': [381], 'applications,': [382], 'financial': [384, 556], 'applications': [385, 396], 'where': [386], 'trillions': [387], 'dollars': [389], 'transferred': [391], 'every': [392], 'day.': [393], 'If': [394], 'these': [395], 'fall': [397], 'wrong': [400], 'hands,': [401], 'devastating': [406], 'lives': [412], 'individuals.': [414], 'Because': [415], 'this': [417], 'dependence': [418], 'parallel': [427], 'development': [430], 'itself': [434], '(Bosworth': [435], 'Jacobson,': [437], '2009).': [438], 'result,': [441], 'professionals': [445], 'developed': [447], 'new': [448], 'technologies': [449], 'improving': [451], 'But': [453], 'technological': [454], 'solutions': [455], 'be': [457, 545], 'deployed': [458], 'carefully': [459], 'best': [461], 'practices': [462], 'protect': [464], 'being': [467], 'circumvented': [468], 'attackers.': [470], 'In': [471], 'addition,': [472], 'policy': [474], 'should': [475], 'create': [476, 576], 'incentives': [477], 'system': [479], 'developers,': [480], 'operators,': [481], 'users': [483], 'act': [485], 'ways': [487], 'rather': [490], 'weaken': [492], '(Mulligany': [494], 'Schneider,': [496], '1).Preparing': [498], 'legal': [501, 518, 525], 'environment': [502], 'deal': [504], 'enhanced': [506], 'insecurities': [511], 'requires,': [512], 'among': [513], 'other': [514], 'things,': [515], 'comprehensive': [517], 'framework.': [519], 'At': [520], 'federal': [522, 546, 564], 'level,': [523], 'cybercrime': [528], 'currently': [530], 'provided': [531], 'US': [533], 'Code': [534], '1030': [536], 'section': [537], '1030(a),': [538], 'which': [539], 'includes': [540], 'seven': [541], 'actions': [542], 'considered': [543], 'offenses,': [547], 'follows:': [549], 'without': [552], 'authorization;': [553], 'digital': [555], 'records;': [557], 'agency;': [565], 'benefit': [570, 605], '$5000': [573], 'per': [574], 'year;': [575], 'do': [583], 'any': [584], 'above;': [587], 'cause': [588], 'physical': [589], 'or': [590, 596], 'medical': [591], 'damage': [592], 'via': [593], 'program;': [598], 'transmit': [600], 'virus': [602], 'intending': [603], 'financially': [606], '(Brenner,': [607], '2006).': [608], '…': [609]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W1524012182', 'counts_by_year': [{'year': 2024, 'cited_by_count': 2}, {'year': 2023, 'cited_by_count': 3}, {'year': 2022, 'cited_by_count': 3}, {'year': 2021, 'cited_by_count': 1}, {'year': 2019, 'cited_by_count': 2}, {'year': 2018, 'cited_by_count': 3}, {'year': 2017, 'cited_by_count': 5}, {'year': 2016, 'cited_by_count': 2}], 'updated_date': '2024-12-14T17:38:53.000607', 'created_date': '2016-06-24'}