Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal Article Swipe
In the dynamic landscape of contemporary cybersecurity, an arena perpetually shaped by rapid technological advancements and an ever-expanding threat landscape, the significance of staying abreast of the latest research and innovative ideas cannot be overstated. In this era of constant change and evolving challenges, ARIS2 - Advanced Research on Information Systems Security stands resolute as a beacon, guiding scholars, practitioners, and enthusiasts through the intricate maze of cyber defenses and digital fortifications.
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.56394/aris2.v3i1.24
- https://aris-journal.com/aris/index.php/journal/article/download/24/23
- OA Status
- diamond
- References
- 5
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4389461856
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4389461856Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.56394/aris2.v3i1.24Digital Object Identifier
- Title
-
Editorial of ARIS2 - Advanced Research on Information Systems Security, an International JournalWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-08-30Full publication date if available
- Authors
-
Nuno Mateus-CoelhoList of authors in order
- Landing page
-
https://doi.org/10.56394/aris2.v3i1.24Publisher landing page
- PDF URL
-
https://aris-journal.com/aris/index.php/journal/article/download/24/23Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://aris-journal.com/aris/index.php/journal/article/download/24/23Direct OA link when available
- Concepts
-
Political science, Engineering ethics, Computer security, Data science, Computer science, EngineeringTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
5Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4389461856 |
|---|---|
| doi | https://doi.org/10.56394/aris2.v3i1.24 |
| ids.doi | https://doi.org/10.56394/aris2.v3i1.24 |
| ids.openalex | https://openalex.org/W4389461856 |
| fwci | 0.0 |
| type | article |
| title | Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal |
| biblio.issue | 1 |
| biblio.volume | 3 |
| biblio.last_page | 3 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9952999949455261 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| topics[1].id | https://openalex.org/T12034 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9925000071525574 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Digital and Cyber Forensics |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.987500011920929 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C17744445 |
| concepts[0].level | 0 |
| concepts[0].score | 0.39986178278923035 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[0].display_name | Political science |
| concepts[1].id | https://openalex.org/C55587333 |
| concepts[1].level | 1 |
| concepts[1].score | 0.3910382390022278 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1133029 |
| concepts[1].display_name | Engineering ethics |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3511676788330078 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C2522767166 |
| concepts[3].level | 1 |
| concepts[3].score | 0.3492428958415985 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[3].display_name | Data science |
| concepts[4].id | https://openalex.org/C41008148 |
| concepts[4].level | 0 |
| concepts[4].score | 0.32796311378479004 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[4].display_name | Computer science |
| concepts[5].id | https://openalex.org/C127413603 |
| concepts[5].level | 0 |
| concepts[5].score | 0.2502392530441284 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[5].display_name | Engineering |
| keywords[0].id | https://openalex.org/keywords/political-science |
| keywords[0].score | 0.39986178278923035 |
| keywords[0].display_name | Political science |
| keywords[1].id | https://openalex.org/keywords/engineering-ethics |
| keywords[1].score | 0.3910382390022278 |
| keywords[1].display_name | Engineering ethics |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.3511676788330078 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/data-science |
| keywords[3].score | 0.3492428958415985 |
| keywords[3].display_name | Data science |
| keywords[4].id | https://openalex.org/keywords/computer-science |
| keywords[4].score | 0.32796311378479004 |
| keywords[4].display_name | Computer science |
| keywords[5].id | https://openalex.org/keywords/engineering |
| keywords[5].score | 0.2502392530441284 |
| keywords[5].display_name | Engineering |
| language | en |
| locations[0].id | doi:10.56394/aris2.v3i1.24 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4387281333 |
| locations[0].source.issn | 2795-4560, 2795-4609 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2795-4560 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | ARIS2 - Advanced Research on Information Systems Security |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].source.host_organization_lineage | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://aris-journal.com/aris/index.php/journal/article/download/24/23 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ARIS2 - Advanced Research on Information Systems Security |
| locations[0].landing_page_url | https://doi.org/10.56394/aris2.v3i1.24 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5042747325 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5517-9181 |
| authorships[0].author.display_name | Nuno Mateus-Coelho |
| authorships[0].countries | PT |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I88596544 |
| authorships[0].affiliations[0].raw_affiliation_string | LAPI2S & COPELABS - Lusófona University |
| authorships[0].institutions[0].id | https://openalex.org/I88596544 |
| authorships[0].institutions[0].ror | https://ror.org/05xxfer42 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I88596544 |
| authorships[0].institutions[0].country_code | PT |
| authorships[0].institutions[0].display_name | Universidade Lusófona |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Nuno Mateus-Coelho |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | LAPI2S & COPELABS - Lusófona University |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://aris-journal.com/aris/index.php/journal/article/download/24/23 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9952999949455261 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W2382290278, https://openalex.org/W2350741829, https://openalex.org/W2530322880, https://openalex.org/W1596801655, https://openalex.org/W2359140296 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.56394/aris2.v3i1.24 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4387281333 |
| best_oa_location.source.issn | 2795-4560, 2795-4609 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2795-4560 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | ARIS2 - Advanced Research on Information Systems Security |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.source.host_organization_lineage | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://aris-journal.com/aris/index.php/journal/article/download/24/23 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ARIS2 - Advanced Research on Information Systems Security |
| best_oa_location.landing_page_url | https://doi.org/10.56394/aris2.v3i1.24 |
| primary_location.id | doi:10.56394/aris2.v3i1.24 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4387281333 |
| primary_location.source.issn | 2795-4560, 2795-4609 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2795-4560 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | ARIS2 - Advanced Research on Information Systems Security |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.source.host_organization_lineage | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://aris-journal.com/aris/index.php/journal/article/download/24/23 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ARIS2 - Advanced Research on Information Systems Security |
| primary_location.landing_page_url | https://doi.org/10.56394/aris2.v3i1.24 |
| publication_date | 2023-08-30 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W4386524722, https://openalex.org/W4352978378, https://openalex.org/W4297792532, https://openalex.org/W4283379597, https://openalex.org/W3130161743 |
| referenced_works_count | 5 |
| abstract_inverted_index.- | 45 |
| abstract_inverted_index.a | 55 |
| abstract_inverted_index.In | 0, 35 |
| abstract_inverted_index.an | 7, 16 |
| abstract_inverted_index.as | 54 |
| abstract_inverted_index.be | 33 |
| abstract_inverted_index.by | 11 |
| abstract_inverted_index.of | 4, 22, 25, 38, 66 |
| abstract_inverted_index.on | 48 |
| abstract_inverted_index.and | 15, 29, 41, 60, 69 |
| abstract_inverted_index.era | 37 |
| abstract_inverted_index.the | 1, 20, 26, 63 |
| abstract_inverted_index.maze | 65 |
| abstract_inverted_index.this | 36 |
| abstract_inverted_index.ARIS2 | 44 |
| abstract_inverted_index.arena | 8 |
| abstract_inverted_index.cyber | 67 |
| abstract_inverted_index.ideas | 31 |
| abstract_inverted_index.rapid | 12 |
| abstract_inverted_index.cannot | 32 |
| abstract_inverted_index.change | 40 |
| abstract_inverted_index.latest | 27 |
| abstract_inverted_index.shaped | 10 |
| abstract_inverted_index.stands | 52 |
| abstract_inverted_index.threat | 18 |
| abstract_inverted_index.Systems | 50 |
| abstract_inverted_index.abreast | 24 |
| abstract_inverted_index.beacon, | 56 |
| abstract_inverted_index.digital | 70 |
| abstract_inverted_index.dynamic | 2 |
| abstract_inverted_index.guiding | 57 |
| abstract_inverted_index.staying | 23 |
| abstract_inverted_index.through | 62 |
| abstract_inverted_index.Advanced | 46 |
| abstract_inverted_index.Research | 47 |
| abstract_inverted_index.Security | 51 |
| abstract_inverted_index.constant | 39 |
| abstract_inverted_index.defenses | 68 |
| abstract_inverted_index.evolving | 42 |
| abstract_inverted_index.research | 28 |
| abstract_inverted_index.resolute | 53 |
| abstract_inverted_index.intricate | 64 |
| abstract_inverted_index.landscape | 3 |
| abstract_inverted_index.scholars, | 58 |
| abstract_inverted_index.innovative | 30 |
| abstract_inverted_index.landscape, | 19 |
| abstract_inverted_index.Information | 49 |
| abstract_inverted_index.challenges, | 43 |
| abstract_inverted_index.enthusiasts | 61 |
| abstract_inverted_index.overstated. | 34 |
| abstract_inverted_index.perpetually | 9 |
| abstract_inverted_index.advancements | 14 |
| abstract_inverted_index.contemporary | 5 |
| abstract_inverted_index.significance | 21 |
| abstract_inverted_index.technological | 13 |
| abstract_inverted_index.cybersecurity, | 6 |
| abstract_inverted_index.ever-expanding | 17 |
| abstract_inverted_index.practitioners, | 59 |
| abstract_inverted_index.fortifications. | 71 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5042747325 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 1 |
| corresponding_institution_ids | https://openalex.org/I88596544 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/11 |
| sustainable_development_goals[0].score | 0.75 |
| sustainable_development_goals[0].display_name | Sustainable cities and communities |
| citation_normalized_percentile.value | 0.30772073 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |