{"id":"https://openalex.org/W2145369986","doi":"https://doi.org/10.1109/nca.2003.1201151","title":"Privacy issues in an insecure world","display_name":"Privacy issues in an insecure world","publication_year":2003,"publication_date":"2003-08-27","ids":{"openalex":"https://openalex.org/W2145369986","doi":"https://doi.org/10.1109/nca.2003.1201151","mag":"2145369986"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/nca.2003.1201151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053504300","display_name":"W. Timothy Strayer","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":true,"raw_author_name":"W.T. Strayer","raw_affiliation_strings":["BBN Technol., Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"BBN Technol., Cambridge, MA, USA","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5053504300"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":59},"biblio":{"volume":null,"issue":null,"first_page":"167","last_page":"167"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9116,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9116,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.5576686}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7442757},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6203701},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6083989},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.5576686},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44284028},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43983358},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4345541},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/nca.2003.1201151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.71,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4312902938","https://openalex.org/W4225340788","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W3024522029","https://openalex.org/W2940702331","https://openalex.org/W2767547659","https://openalex.org/W2584827882","https://openalex.org/W2528109871","https://openalex.org/W1990049675"],"abstract_inverted_index":{"We":[0],"all":[1],"have":[2,19,53,104],"a":[3,66,112,118,145],"notion":[4,33],"of":[5,13,34,136,173],"privacy":[6,35],"and":[7,23,73,79,92,109,114,131,167],"understand":[8],"that":[9,56,133,160,168,182],"we":[10,103,183],"trade":[11],"some":[12],"it":[14,50],"away":[15],"in":[16,44,169],"order":[17],"to":[18,52,64,95,98,147],"normal":[20],"social":[21],"interactions":[22],"communal":[24],"security.":[25,191],"Networked":[26],"computer":[27,190],"systems":[28,55,179],"are":[29,60,184],"no":[30],"different.":[31],"The":[32],"is":[36,127,144],"running":[37],"squarely":[38],"against":[39],"the":[40,101,123,171],"need":[41],"for":[42,76],"security":[43,125,138],"an":[45],"increasingly":[46,116,175],"networked":[47],"world.":[48],"Is":[49],"possible":[51],"secure":[54,65],"honor":[57],"privacy?":[58],"There":[59],"two":[61],"basic":[62],"ways":[63],"network:":[67],"prevent":[68],"bad":[69,77],"things":[70,78],"from":[71],"happening,":[72],"watch":[74],"closely":[75],"prosecute":[80],"those":[81],"who":[82],"commit":[83],"them.":[84],"Since":[85],"our":[86],"current":[87],"preventative":[88],"measures":[89],"like":[90],"authentication":[91],"authorization":[93],"seem":[94],"be":[96],"failing":[97],"adequately":[99],"protect":[100],"network,":[102],"turned":[105],"more":[106],"toward":[107],"auditing":[108],"monitoring-first":[110],"as":[111,117,150,152],"complement,":[113],"now":[115],"substitute-for":[119],"prevention.":[120],"I":[121,158],"discuss":[122],"impact":[124],"concerns":[126],"having":[128],"on":[129,176],"privacy,":[130],"suggest":[132],"today's":[134],"trend":[135,172],"solving":[137],"by":[139],"detecting":[140],"intrusions":[141],"through":[142],"monitoring":[143,161],"reaction":[146],"institutional":[148],"paranoia":[149],"well":[151],"woefully":[153],"inadequate":[154],"software":[155],"development":[156],"processes.":[157],"argue":[159],"alone":[162],"can't":[163],"provide":[164],"sufficient":[165],"protection,":[166],"fact":[170],"relying":[174],"intrusion":[177],"detection":[178],"tells":[180],"us":[181],"really":[185],"losing":[186],"ground-not":[187],"gaining-on":[188],"providing":[189]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2145369986","counts_by_year":[],"updated_date":"2024-12-10T20:38:18.214037","created_date":"2016-06-24"}