{"id":"https://openalex.org/W2047276775","doi":"https://doi.org/10.1108/09685220110366740","title":"Information systems security in the Greek public sector","display_name":"Information systems security in the Greek public sector","publication_year":2001,"publication_date":"2001-03-01","ids":{"openalex":"https://openalex.org/W2047276775","doi":"https://doi.org/10.1108/09685220110366740","mag":"2047276775"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220110366740","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://www.spinellis.gr/pubs/jrnl/2000-IMCS-pubsec/html/ispa.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057548905","display_name":"Euripidis Loukis","orcid":"https://orcid.org/0000-0002-5932-4128"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"funder","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Euripidis Loukis","raw_affiliation_strings":["University of the Aegean, Karlovasi, Greece#TAB#"],"affiliations":[{"raw_affiliation_string":"University of the Aegean, Karlovasi, Greece#TAB#","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021948425","display_name":"Diomidis Spinellis","orcid":"https://orcid.org/0000-0003-4231-1897"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"funder","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Diomidis Spinellis","raw_affiliation_strings":["University of the Aegean, Karlovasi, Greece#TAB#"],"affiliations":[{"raw_affiliation_string":"University of the Aegean, Karlovasi, Greece#TAB#","institution_ids":["https://openalex.org/I98805295"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":16,"citation_normalized_percentile":{"value":0.912796,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"9","issue":"1","first_page":"21","last_page":"31"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10213","display_name":"Public Policy and Administration Research","score":0.9734,"subfield":{"id":"https://openalex.org/subfields/3321","display_name":"Public Administration"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.6536746},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5249272}],"concepts":[{"id":"https://openalex.org/C147859227","wikidata":"https://www.wikidata.org/wiki/Q294217","display_name":"Public sector","level":2,"score":0.7177659},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.6536746},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.63934386},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6120341},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.5845915},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5249272},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.49961138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45316377},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42422727},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.39861447},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.36693197},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.27796635},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.21768376},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13026953},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11047807},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.108691365},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.08535147},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220110366740","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.6488","pdf_url":"http://www.spinellis.gr/pubs/jrnl/2000-IMCS-pubsec/html/ispa.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.6488","pdf_url":"http://www.spinellis.gr/pubs/jrnl/2000-IMCS-pubsec/html/ispa.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1551683767","https://openalex.org/W1585579662","https://openalex.org/W1838112905","https://openalex.org/W1972419539","https://openalex.org/W1987071008","https://openalex.org/W2033269650","https://openalex.org/W2060958165","https://openalex.org/W2076121152"],"related_works":["https://openalex.org/W4390655704","https://openalex.org/W2793054839","https://openalex.org/W2777401565","https://openalex.org/W2741061559","https://openalex.org/W2517937949","https://openalex.org/W2508914475","https://openalex.org/W2183721768","https://openalex.org/W2149739119","https://openalex.org/W1988974780","https://openalex.org/W1974991139"],"abstract_inverted_index":{"The":[0,112],"security":[1,80,103,132],"aspects":[2,45],"of":[3,17,29,39,46,58,64,77,104,114,121,129],"public":[4,32,69],"sector":[5,33,70],"information":[6,47,78,106,130],"systems":[7,13,48,131],"are":[8,14],"important":[9,44],"as":[10],"the":[11,52,56,65,102,119,122],"respective":[12],"often":[15,134],"part":[16],"critical":[18],"infrastructures":[19],"or":[20,24],"deal":[21],"with":[22],"personal":[23],"sensitive":[25],"data.":[26],"A":[27],"set":[28],"53":[30],"Greek":[31,68],"organizations":[34,71],"were":[35],"investigated":[36],"by":[37],"means":[38],"a":[40,74,90,95],"structured":[41],"questionnaire":[42],"concerning":[43],"security.":[49],"We":[50],"present":[51],"relevant":[53],"theoretical":[54],"background,":[55],"methodology":[57],"our":[59],"research,":[60],"and":[61,98,117],"an":[62],"analysis":[63],"obtained":[66],"results.":[67],"have":[72,93],"only":[73,89],"basic":[75],"level":[76],"system":[79],"awareness.":[81],"Most":[82],"care":[83],"about":[84],"digital":[85],"data":[86],"confidentiality;":[87],"however,":[88],"small":[91],"percentage":[92],"developed":[94],"systematic,":[96],"complete,":[97],"integrated":[99],"approach":[100],"towards":[101],"their":[105],"system,":[107],"including":[108],"internal":[109],"audit":[110],"procedures.":[111],"importance":[113,120],"proper":[115],"training":[116],"generally":[118],"human":[123],"factor":[124],"for":[125],"achieving":[126],"high":[127],"levels":[128],"is":[133],"underestimated.":[135]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2047276775","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-02-17T06:11:46.478974","created_date":"2016-06-24"}