Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2593385889', 'doi': None, 'title': 'United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar', 'display_name': 'United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar', 'publication_year': 2010, 'publication_date': '2010-12-01', 'ids': {'openalex': 'https://openalex.org/W2593385889', 'mag': '2593385889'}, 'language': 'en', 'primary_location': {'is_oa': False, 'landing_page_url': 'https://scholarspace.manoa.hawaii.edu/bitstream/10125/101601/1/de%20Laura_Davey_r.pdf', 'pdf_url': None, 'source': None, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}, 'type': 'dissertation', 'type_crossref': 'dissertation', 'indexed_in': [], 'open_access': {'is_oa': False, 'oa_status': 'closed', 'oa_url': None, 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5079352062', 'display_name': 'de Laura', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'de Laura', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5091870692', 'display_name': 'Alistair Davey', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'A Davey', 'raw_affiliation_strings': [], 'affiliations': []}], 'institution_assertions': [], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': None, 'has_fulltext': False, 'cited_by_count': 0, 'citation_normalized_percentile': {'value': 0.0, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 0, 'max': 64}, 'biblio': {'volume': None, 'issue': None, 'first_page': None, 'last_page': None}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T12221', 'display_name': 'Cybersecurity and Cyber Warfare Studies', 'score': 0.9955, 'subfield': {'id': 'https://openalex.org/subfields/3320', 'display_name': 'Political Science and International Relations'}, 'field': {'id': 'https://openalex.org/fields/33', 'display_name': 'Social Sciences'}, 'domain': {'id': 'https://openalex.org/domains/2', 'display_name': 'Social Sciences'}}, 'topics': [{'id': 'https://openalex.org/T12221', 'display_name': 'Cybersecurity and Cyber Warfare Studies', 'score': 0.9955, 'subfield': {'id': 'https://openalex.org/subfields/3320', 'display_name': 'Political Science and International Relations'}, 'field': {'id': 'https://openalex.org/fields/33', 'display_name': 'Social Sciences'}, 'domain': {'id': 'https://openalex.org/domains/2', 'display_name': 'Social Sciences'}}, {'id': 'https://openalex.org/T10734', 'display_name': 'Information and Cyber Security', 'score': 0.9841, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10400', 'display_name': 'Network Security and Intrusion Detection', 'score': 0.9098, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/hacker', 'display_name': 'Hacker', 'score': 0.9447789}, {'id': 'https://openalex.org/keywords/cyberwarfare', 'display_name': 'Cyberwarfare', 'score': 0.940608}, {'id': 'https://openalex.org/keywords/cyber-attack', 'display_name': 'Cyber-attack', 'score': 0.461131}, {'id': 'https://openalex.org/keywords/cyber-threats', 'display_name': 'Cyber threats', 'score': 0.41911432}], 'concepts': [{'id': 'https://openalex.org/C86844869', 'wikidata': 'https://www.wikidata.org/wiki/Q2798820', 'display_name': 'Hacker', 'level': 2, 'score': 0.9447789}, {'id': 'https://openalex.org/C171769113', 'wikidata': 'https://www.wikidata.org/wiki/Q849340', 'display_name': 'Cyberwarfare', 'level': 2, 'score': 0.940608}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.8077679}, {'id': 'https://openalex.org/C2778137410', 'wikidata': 'https://www.wikidata.org/wiki/Q2732820', 'display_name': 'Government (linguistics)', 'level': 2, 'score': 0.5724102}, {'id': 'https://openalex.org/C201307755', 'wikidata': 'https://www.wikidata.org/wiki/Q4071928', 'display_name': 'Cyber-attack', 'level': 2, 'score': 0.461131}, {'id': 'https://openalex.org/C541664917', 'wikidata': 'https://www.wikidata.org/wiki/Q14001', 'display_name': 'Malware', 'level': 2, 'score': 0.4245632}, {'id': 'https://openalex.org/C3018725008', 'wikidata': 'https://www.wikidata.org/wiki/Q4071928', 'display_name': 'Cyber threats', 'level': 2, 'score': 0.41911432}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.34632385}, {'id': 'https://openalex.org/C108827166', 'wikidata': 'https://www.wikidata.org/wiki/Q175975', 'display_name': 'Internet privacy', 'level': 1, 'score': 0.33933935}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.3281675}, {'id': 'https://openalex.org/C127413603', 'wikidata': 'https://www.wikidata.org/wiki/Q11023', 'display_name': 'Engineering', 'level': 0, 'score': 0.32017788}, {'id': 'https://openalex.org/C138885662', 'wikidata': 'https://www.wikidata.org/wiki/Q5891', 'display_name': 'Philosophy', 'level': 0, 'score': 0.0}, {'id': 'https://openalex.org/C41895202', 'wikidata': 'https://www.wikidata.org/wiki/Q8162', 'display_name': 'Linguistics', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': False, 'landing_page_url': 'https://scholarspace.manoa.hawaii.edu/bitstream/10125/101601/1/de%20Laura_Davey_r.pdf', 'pdf_url': None, 'source': None, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}], 'best_oa_location': None, 'sustainable_development_goals': [{'score': 0.48, 'display_name': 'Industry, innovation and infrastructure', 'id': 'https://metadata.un.org/sdg/9'}], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 0, 'referenced_works': [], 'related_works': ['https://openalex.org/W329497399', 'https://openalex.org/W3196644950', 'https://openalex.org/W3094383046', 'https://openalex.org/W2996654293', 'https://openalex.org/W2982518082', 'https://openalex.org/W2934907976', 'https://openalex.org/W2900281092', 'https://openalex.org/W2805937672', 'https://openalex.org/W2801852837', 'https://openalex.org/W2770815270', 'https://openalex.org/W2737598741', 'https://openalex.org/W2735131031', 'https://openalex.org/W2611285004', 'https://openalex.org/W2606061175', 'https://openalex.org/W2596431709', 'https://openalex.org/W2591886243', 'https://openalex.org/W2587311938', 'https://openalex.org/W2567281033', 'https://openalex.org/W1983392219', 'https://openalex.org/W1559549946'], 'abstract_inverted_index': None, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2593385889', 'counts_by_year': [], 'updated_date': '2024-12-12T07:41:06.958495', 'created_date': '2017-03-16'}