Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2311.10165
Research into the ethics of cybersecurity is an established and growing topic of investigation, however the translation of this research into practice is lacking: there exists a small number of professional codes of ethics or codes of practice in cybersecurity, however these are very broad and do not offer much insight into the ethical dilemmas that can be faced while performing specific cybersecurity activities. In order to address this gap, we leverage ongoing work on the Cyber Security Body of Knowledge (CyBOK) to help elicit and document the responsibilities and ethics of the profession. Based on a literature review of the ethics of cybersecurity, we use CyBOK to frame the exploration of ethical challenges in the cybersecurity profession through a series of 15 interviews with cybersecurity experts. Our approach is qualitative and exploratory, aiming to answer the research question "What ethical challenges, insights, and solutions arise in different areas of cybersecurity?". Our findings indicate that there are broad ethical challenges across the whole of cybersecurity, but also that different areas of cybersecurity can face specific ethical considerations for which more detailed guidance can help professionals in those areas. In particular, our findings indicate that security decision-making is expected of all security professionals, but that this requires them to balance a complex mix of technical, objective and subjective points of view, and that resolving conflicts raises challenging ethical dilemmas. We conclude that more work is needed to explore, map, and integrate ethical considerations into cybersecurity practice; the urgent need to conduct further research into the ethics of cybersecurity AI; and highlight the importance of this work for individuals and professional bodies who seek to develop and mature the cybersecurity profession in a responsible manner.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2311.10165
- https://arxiv.org/pdf/2311.10165
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4388843187
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4388843187Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2311.10165Digital Object Identifier
- Title
-
Practical Cybersecurity Ethics: Mapping CyBOK to Ethical ConcernsWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-11-16Full publication date if available
- Authors
-
Ivan Fléchais, George ChalhoubList of authors in order
- Landing page
-
https://arxiv.org/abs/2311.10165Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2311.10165Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2311.10165Direct OA link when available
- Concepts
-
Engineering ethics, Leverage (statistics), Computer security, Ethical code, Work (physics), Political science, Ethical decision, Computer science, Public relations, Engineering, Mechanical engineering, Machine learningTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4388843187 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2311.10165 |
| ids.doi | https://doi.org/10.48550/arxiv.2311.10165 |
| ids.openalex | https://openalex.org/W4388843187 |
| fwci | |
| type | preprint |
| title | Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9991999864578247 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| topics[1].id | https://openalex.org/T12221 |
| topics[1].field.id | https://openalex.org/fields/33 |
| topics[1].field.display_name | Social Sciences |
| topics[1].score | 0.9977999925613403 |
| topics[1].domain.id | https://openalex.org/domains/2 |
| topics[1].domain.display_name | Social Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/3320 |
| topics[1].subfield.display_name | Political Science and International Relations |
| topics[1].display_name | Cybersecurity and Cyber Warfare Studies |
| topics[2].id | https://openalex.org/T10883 |
| topics[2].field.id | https://openalex.org/fields/33 |
| topics[2].field.display_name | Social Sciences |
| topics[2].score | 0.9702000021934509 |
| topics[2].domain.id | https://openalex.org/domains/2 |
| topics[2].domain.display_name | Social Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3311 |
| topics[2].subfield.display_name | Safety Research |
| topics[2].display_name | Ethics and Social Impacts of AI |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C55587333 |
| concepts[0].level | 1 |
| concepts[0].score | 0.5366328358650208 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1133029 |
| concepts[0].display_name | Engineering ethics |
| concepts[1].id | https://openalex.org/C153083717 |
| concepts[1].level | 2 |
| concepts[1].score | 0.4854789078235626 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q6535263 |
| concepts[1].display_name | Leverage (statistics) |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.4695333242416382 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C128268270 |
| concepts[3].level | 2 |
| concepts[3].score | 0.46869516372680664 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2264133 |
| concepts[3].display_name | Ethical code |
| concepts[4].id | https://openalex.org/C18762648 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4560960531234741 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q42213 |
| concepts[4].display_name | Work (physics) |
| concepts[5].id | https://openalex.org/C17744445 |
| concepts[5].level | 0 |
| concepts[5].score | 0.44072195887565613 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[5].display_name | Political science |
| concepts[6].id | https://openalex.org/C2776768071 |
| concepts[6].level | 2 |
| concepts[6].score | 0.43659716844558716 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q5403402 |
| concepts[6].display_name | Ethical decision |
| concepts[7].id | https://openalex.org/C41008148 |
| concepts[7].level | 0 |
| concepts[7].score | 0.3834038972854614 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[7].display_name | Computer science |
| concepts[8].id | https://openalex.org/C39549134 |
| concepts[8].level | 1 |
| concepts[8].score | 0.3650054335594177 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q133080 |
| concepts[8].display_name | Public relations |
| concepts[9].id | https://openalex.org/C127413603 |
| concepts[9].level | 0 |
| concepts[9].score | 0.17829769849777222 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[9].display_name | Engineering |
| concepts[10].id | https://openalex.org/C78519656 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q101333 |
| concepts[10].display_name | Mechanical engineering |
| concepts[11].id | https://openalex.org/C119857082 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[11].display_name | Machine learning |
| keywords[0].id | https://openalex.org/keywords/engineering-ethics |
| keywords[0].score | 0.5366328358650208 |
| keywords[0].display_name | Engineering ethics |
| keywords[1].id | https://openalex.org/keywords/leverage |
| keywords[1].score | 0.4854789078235626 |
| keywords[1].display_name | Leverage (statistics) |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.4695333242416382 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/ethical-code |
| keywords[3].score | 0.46869516372680664 |
| keywords[3].display_name | Ethical code |
| keywords[4].id | https://openalex.org/keywords/work |
| keywords[4].score | 0.4560960531234741 |
| keywords[4].display_name | Work (physics) |
| keywords[5].id | https://openalex.org/keywords/political-science |
| keywords[5].score | 0.44072195887565613 |
| keywords[5].display_name | Political science |
| keywords[6].id | https://openalex.org/keywords/ethical-decision |
| keywords[6].score | 0.43659716844558716 |
| keywords[6].display_name | Ethical decision |
| keywords[7].id | https://openalex.org/keywords/computer-science |
| keywords[7].score | 0.3834038972854614 |
| keywords[7].display_name | Computer science |
| keywords[8].id | https://openalex.org/keywords/public-relations |
| keywords[8].score | 0.3650054335594177 |
| keywords[8].display_name | Public relations |
| keywords[9].id | https://openalex.org/keywords/engineering |
| keywords[9].score | 0.17829769849777222 |
| keywords[9].display_name | Engineering |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2311.10165 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2311.10165 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2311.10165 |
| locations[1].id | doi:10.48550/arxiv.2311.10165 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2311.10165 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5061337880 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-3620-0843 |
| authorships[0].author.display_name | Ivan Fléchais |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Flechais, Ivan |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5061560936 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-2082-2610 |
| authorships[1].author.display_name | George Chalhoub |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Chalhoub, George |
| authorships[1].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2311.10165 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9991999864578247 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W2787993192, https://openalex.org/W2083831779, https://openalex.org/W2441746271, https://openalex.org/W2064004571, https://openalex.org/W2060556091, https://openalex.org/W593760947, https://openalex.org/W1992262246, https://openalex.org/W1544538465, https://openalex.org/W2159029525, https://openalex.org/W2005908568 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2311.10165 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2311.10165 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2311.10165 |
| primary_location.id | pmh:oai:arXiv.org:2311.10165 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2311.10165 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2311.10165 |
| publication_date | 2023-11-16 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 26, 96, 119, 209, 280 |
| abstract_inverted_index.15 | 122 |
| abstract_inverted_index.In | 64, 188 |
| abstract_inverted_index.We | 228 |
| abstract_inverted_index.an | 7 |
| abstract_inverted_index.be | 57 |
| abstract_inverted_index.do | 46 |
| abstract_inverted_index.in | 38, 114, 146, 185, 279 |
| abstract_inverted_index.is | 6, 22, 129, 196, 233 |
| abstract_inverted_index.of | 4, 12, 17, 29, 32, 36, 79, 91, 99, 102, 111, 121, 149, 163, 170, 198, 212, 218, 255, 262 |
| abstract_inverted_index.on | 74, 95 |
| abstract_inverted_index.or | 34 |
| abstract_inverted_index.to | 66, 82, 107, 134, 207, 235, 248, 272 |
| abstract_inverted_index.we | 70, 104 |
| abstract_inverted_index.AI; | 257 |
| abstract_inverted_index.Our | 127, 151 |
| abstract_inverted_index.all | 199 |
| abstract_inverted_index.and | 9, 45, 85, 89, 131, 143, 215, 220, 238, 258, 267, 274 |
| abstract_inverted_index.are | 42, 156 |
| abstract_inverted_index.but | 165, 202 |
| abstract_inverted_index.can | 56, 172, 182 |
| abstract_inverted_index.for | 177, 265 |
| abstract_inverted_index.mix | 211 |
| abstract_inverted_index.not | 47 |
| abstract_inverted_index.our | 190 |
| abstract_inverted_index.the | 2, 15, 52, 75, 87, 92, 100, 109, 115, 136, 161, 245, 253, 260, 276 |
| abstract_inverted_index.use | 105 |
| abstract_inverted_index.who | 270 |
| abstract_inverted_index.Body | 78 |
| abstract_inverted_index.also | 166 |
| abstract_inverted_index.face | 173 |
| abstract_inverted_index.gap, | 69 |
| abstract_inverted_index.help | 83, 183 |
| abstract_inverted_index.into | 1, 20, 51, 242, 252 |
| abstract_inverted_index.map, | 237 |
| abstract_inverted_index.more | 179, 231 |
| abstract_inverted_index.much | 49 |
| abstract_inverted_index.need | 247 |
| abstract_inverted_index.seek | 271 |
| abstract_inverted_index.that | 55, 154, 167, 193, 203, 221, 230 |
| abstract_inverted_index.them | 206 |
| abstract_inverted_index.this | 18, 68, 204, 263 |
| abstract_inverted_index.very | 43 |
| abstract_inverted_index.with | 124 |
| abstract_inverted_index.work | 73, 232, 264 |
| abstract_inverted_index."What | 139 |
| abstract_inverted_index.Based | 94 |
| abstract_inverted_index.CyBOK | 106 |
| abstract_inverted_index.Cyber | 76 |
| abstract_inverted_index.areas | 148, 169 |
| abstract_inverted_index.arise | 145 |
| abstract_inverted_index.broad | 44, 157 |
| abstract_inverted_index.codes | 31, 35 |
| abstract_inverted_index.faced | 58 |
| abstract_inverted_index.frame | 108 |
| abstract_inverted_index.offer | 48 |
| abstract_inverted_index.order | 65 |
| abstract_inverted_index.small | 27 |
| abstract_inverted_index.there | 24, 155 |
| abstract_inverted_index.these | 41 |
| abstract_inverted_index.those | 186 |
| abstract_inverted_index.topic | 11 |
| abstract_inverted_index.view, | 219 |
| abstract_inverted_index.which | 178 |
| abstract_inverted_index.while | 59 |
| abstract_inverted_index.whole | 162 |
| abstract_inverted_index.across | 160 |
| abstract_inverted_index.aiming | 133 |
| abstract_inverted_index.answer | 135 |
| abstract_inverted_index.areas. | 187 |
| abstract_inverted_index.bodies | 269 |
| abstract_inverted_index.elicit | 84 |
| abstract_inverted_index.ethics | 3, 33, 90, 101, 254 |
| abstract_inverted_index.exists | 25 |
| abstract_inverted_index.mature | 275 |
| abstract_inverted_index.needed | 234 |
| abstract_inverted_index.number | 28 |
| abstract_inverted_index.points | 217 |
| abstract_inverted_index.raises | 224 |
| abstract_inverted_index.review | 98 |
| abstract_inverted_index.series | 120 |
| abstract_inverted_index.urgent | 246 |
| abstract_inverted_index.(CyBOK) | 81 |
| abstract_inverted_index.address | 67 |
| abstract_inverted_index.balance | 208 |
| abstract_inverted_index.complex | 210 |
| abstract_inverted_index.conduct | 249 |
| abstract_inverted_index.develop | 273 |
| abstract_inverted_index.ethical | 53, 112, 140, 158, 175, 226, 240 |
| abstract_inverted_index.further | 250 |
| abstract_inverted_index.growing | 10 |
| abstract_inverted_index.however | 14, 40 |
| abstract_inverted_index.insight | 50 |
| abstract_inverted_index.manner. | 282 |
| abstract_inverted_index.ongoing | 72 |
| abstract_inverted_index.through | 118 |
| abstract_inverted_index.Research | 0 |
| abstract_inverted_index.Security | 77 |
| abstract_inverted_index.approach | 128 |
| abstract_inverted_index.conclude | 229 |
| abstract_inverted_index.detailed | 180 |
| abstract_inverted_index.dilemmas | 54 |
| abstract_inverted_index.document | 86 |
| abstract_inverted_index.expected | 197 |
| abstract_inverted_index.experts. | 126 |
| abstract_inverted_index.explore, | 236 |
| abstract_inverted_index.findings | 152, 191 |
| abstract_inverted_index.guidance | 181 |
| abstract_inverted_index.indicate | 153, 192 |
| abstract_inverted_index.lacking: | 23 |
| abstract_inverted_index.leverage | 71 |
| abstract_inverted_index.practice | 21, 37 |
| abstract_inverted_index.question | 138 |
| abstract_inverted_index.requires | 205 |
| abstract_inverted_index.research | 19, 137, 251 |
| abstract_inverted_index.security | 194, 200 |
| abstract_inverted_index.specific | 61, 174 |
| abstract_inverted_index.Knowledge | 80 |
| abstract_inverted_index.conflicts | 223 |
| abstract_inverted_index.different | 147, 168 |
| abstract_inverted_index.dilemmas. | 227 |
| abstract_inverted_index.highlight | 259 |
| abstract_inverted_index.insights, | 142 |
| abstract_inverted_index.integrate | 239 |
| abstract_inverted_index.objective | 214 |
| abstract_inverted_index.practice; | 244 |
| abstract_inverted_index.resolving | 222 |
| abstract_inverted_index.solutions | 144 |
| abstract_inverted_index.challenges | 113, 159 |
| abstract_inverted_index.importance | 261 |
| abstract_inverted_index.interviews | 123 |
| abstract_inverted_index.literature | 97 |
| abstract_inverted_index.performing | 60 |
| abstract_inverted_index.profession | 117, 278 |
| abstract_inverted_index.subjective | 216 |
| abstract_inverted_index.technical, | 213 |
| abstract_inverted_index.activities. | 63 |
| abstract_inverted_index.challenges, | 141 |
| abstract_inverted_index.challenging | 225 |
| abstract_inverted_index.established | 8 |
| abstract_inverted_index.exploration | 110 |
| abstract_inverted_index.individuals | 266 |
| abstract_inverted_index.particular, | 189 |
| abstract_inverted_index.profession. | 93 |
| abstract_inverted_index.qualitative | 130 |
| abstract_inverted_index.responsible | 281 |
| abstract_inverted_index.translation | 16 |
| abstract_inverted_index.exploratory, | 132 |
| abstract_inverted_index.professional | 30, 268 |
| abstract_inverted_index.cybersecurity | 5, 62, 116, 125, 171, 243, 256, 277 |
| abstract_inverted_index.professionals | 184 |
| abstract_inverted_index.considerations | 176, 241 |
| abstract_inverted_index.cybersecurity, | 39, 103, 164 |
| abstract_inverted_index.investigation, | 13 |
| abstract_inverted_index.professionals, | 201 |
| abstract_inverted_index.decision-making | 195 |
| abstract_inverted_index.cybersecurity?". | 150 |
| abstract_inverted_index.responsibilities | 88 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7900000214576721 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile |