{"id":"https://openalex.org/W2004239030","doi":"https://doi.org/10.1109/issa.2013.6641046","title":"Visualization of a data leak","display_name":"Visualization of a data leak","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2004239030","doi":"https://doi.org/10.1109/issa.2013.6641046","mag":"2004239030"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2013.6641046","pdf_url":null,"source":{"id":"https://openalex.org/S4306418902","display_name":"Information Security for South Africa","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109397103","display_name":"Ignatius Swart","orcid":null},"institutions":[{"id":"https://openalex.org/I203238179","display_name":"Rhodes University","ror":"https://ror.org/016sewp10","country_code":"ZA","type":"education","lineage":["https://openalex.org/I203238179"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"I.P. Swart","raw_affiliation_strings":["Univ. of Rhodes, Grahamstown, South Africa"],"affiliations":[{"raw_affiliation_string":"Univ. of Rhodes, Grahamstown, South Africa","institution_ids":["https://openalex.org/I203238179"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058516861","display_name":"Marthie Grobler","orcid":"https://orcid.org/0000-0001-6933-0145"},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"M.M. Grobler","raw_affiliation_strings":["Council for Sci. & Ind. Res., Univ. of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"Council for Sci. & Ind. Res., Univ. of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054384302","display_name":"Barry Irwin","orcid":"https://orcid.org/0000-0002-2727-2124"},"institutions":[{"id":"https://openalex.org/I203238179","display_name":"Rhodes University","ror":"https://ror.org/016sewp10","country_code":"ZA","type":"education","lineage":["https://openalex.org/I203238179"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"B. Irwin","raw_affiliation_strings":["Univ. of Rhodes, Grahamstown, South Africa"],"affiliations":[{"raw_affiliation_string":"Univ. of Rhodes, Grahamstown, South Africa","institution_ids":["https://openalex.org/I203238179"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.58,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.472964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":80},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.64686096},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.49760893},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.43467593}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.718206},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.6765736},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.64686096},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.5538861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5099443},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.49760893},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46248016},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.45643014},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4385452},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.43670464},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.43467593},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.41364044},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.4102082},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.36071026},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34595758},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23792922},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1894452},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.18341973},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17958745},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/issa.2013.6641046","pdf_url":null,"source":{"id":"https://openalex.org/S4306418902","display_name":"Information Security for South Africa","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.78,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":6,"referenced_works":["https://openalex.org/W1536432326","https://openalex.org/W1994933536","https://openalex.org/W2076251662","https://openalex.org/W2092649680","https://openalex.org/W2162147429","https://openalex.org/W2171920515"],"related_works":["https://openalex.org/W4317641462","https://openalex.org/W3180283334","https://openalex.org/W3125933069","https://openalex.org/W2754397897","https://openalex.org/W2150351189","https://openalex.org/W2143991159","https://openalex.org/W2100727725","https://openalex.org/W2067228051","https://openalex.org/W2047512429","https://openalex.org/W1497873417"],"abstract_inverted_index":{"The":[0,59,78,106,123],"potential":[1],"impact":[2,76],"that":[3],"data":[4,87,124],"leakage":[5],"can":[6,23],"have":[7],"on":[8,12,19],"a":[9,13,41,55,65,73],"country,":[10],"both":[11],"national":[14],"level":[15],"as":[16,18,135],"well":[17],"an":[20],"individual":[21],"level,":[22],"be":[24],"wide":[25,75],"reaching":[26],"and":[27,51,94,116,141,146],"potentially":[28],"catastrophic.":[29],"In":[30],"January":[31],"2013,":[32],"several":[33],"South":[34,91,120],"African":[35,92,121],"companies":[36,61,104],"became":[37],"the":[38,46,52,71,86,90,97,100,103,127,138,147],"target":[39],"of":[40,48,54,67,80,99,108,118,144,149,153],"hack":[42],"attack,":[43],"resulting":[44],"in":[45,112],"breach":[47,93],"security":[49],"measures":[50],"leaking":[53],"claimed":[56],"700000":[57],"records.":[58],"affected":[60],"are":[62],"spread":[63],"across":[64],"number":[66],"domains,":[68],"thus":[69],"making":[70],"leak":[72],"very":[74],"area.":[77],"aim":[79],"this":[81,109],"paper":[82],"is":[83,129],"to":[84,95,115],"analyze":[85],"released":[88],"from":[89],"visualize":[96],"extent":[98],"loss":[101],"by":[102,137],"affected.":[105],"value":[107],"work":[110],"lies":[111],"its":[113],"connection":[114],"interpretation":[117],"related":[119],"legislation.":[122],"extracted":[125],"during":[126],"analysis":[128],"primarily":[130],"personally":[131],"identifiable":[132],"information,":[133],"such":[134],"defined":[136],"Electronic":[139],"Communications":[140],"Transactions":[142],"Act":[143],"2002":[145],"Protection":[148],"Personal":[150],"Information":[151],"Bill":[152],"2009.":[154]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2004239030","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-01-21T04:18:34.368616","created_date":"2016-06-24"}