{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:10:57Z","timestamp":1743027057493,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819914715"},{"type":"electronic","value":"9789819914722"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-1472-2_4","type":"book-chapter","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T03:37:55Z","timestamp":1687491475000},"page":"35-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity Imminent Threats with Solutions in Higher Education"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1785-8586","authenticated-orcid":false,"given":"Mahendra Kumar","family":"Gourisaria","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6768-9920","authenticated-orcid":false,"given":"Abtsega Tesfaye","family":"Chufare","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3756-864X","authenticated-orcid":false,"given":"Debajyoty","family":"Banik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Adams, A., Blanford, A.: Security and online learning: to protect and prohibit. In: Usability Evaluation of Online Learning Programs, pp. 331\u2013359. IGI Global, Hershey, PA, USA (2003)","DOI":"10.4018\/978-1-59140-105-6.ch018"},{"key":"4_CR2","unstructured":"Kaspersky: Digital education: The cyber risks of the online classroom (2020)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12046-020-01427-w","volume":"45","author":"D Banik","year":"2020","unstructured":"Banik, D., Ekbal, A., Bhattacharyya, P.: Statistical machine translation based on weighted syntax\u2013semantics. S\u0101dhan\u0101 45(1), 1\u201312 (2020)","journal-title":"S\u0101dhan\u0101"},{"key":"4_CR4","unstructured":"Mello, S.: Data Breaches in higher education institutions. In: Honors Theses and Capstones. University of New Hampshire, Durham, NH, USA (2018)"},{"issue":"10","key":"4_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.14569\/IJACSA.2017.081017","volume":"8","author":"A Elgelany","year":"2017","unstructured":"Elgelany, A., Gaoud, W.: Cloud computing: empirical studies in higher education a literature review. Int. J. Adv. Comput. Sci. Appl. 8(10), 121\u2013127 (2017). https:\/\/doi.org\/10.14569\/IJACSA.2017.081017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"4_CR6","unstructured":"ISO\/IEC 27002:2013 Information technology\u2014Security techniques\u2014Code of practice for information security controls. Standard; International Organization for Standardization, Geneva, Switzerland (2014)"},{"issue":"9","key":"4_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02504","volume":"5","author":"D Banik","year":"2019","unstructured":"Banik, D., Ekbal, A., Bhattacharyya, P., Bhattacharyya, S., Platos, J.: Statistical- based system combination approach to gain advantages over different machine translation systems. Heliyon 5(9), e02504 (2019)","journal-title":"Heliyon"},{"key":"4_CR8","unstructured":"Pardeshi, V.H.: Cloud Computing for Higher Education Institutes"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1007\/s10772-020-09676-0","volume":"24","author":"D Banik","year":"2021","unstructured":"Banik, D.: Phrase table re-adjustment for statistical machine translation. Int. J. Speech Technol. 24(4), 903\u2013911 (2021)","journal-title":"Int. J. Speech Technol."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Ahmed, A.E.A., Badawy, M., Hefny, H.: Exploring and measuring the key performance indicators in higher education institutions. Int. J. Intell. Comput. Inf. Sci. 18, 37\u201347 (2018) (Google Scholar)","DOI":"10.21608\/ijicis.2018.15914"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Wangen, G.: Quantifying and analyzing information security risk from incident data; graphical models for security, pp. 129\u2013154. In: Albanese, M., Horne, R., Probst, C.W. (eds.) Springer, Cham, Switzerland, London, UK (2019)","DOI":"10.1007\/978-3-030-36537-0_7"},{"key":"4_CR12","unstructured":"Whitman, M.: Management of Information Security. Cengage Learning, Inc., Boston, MA, USA (2018). ISBN 9780357691205 (Google Scholar)"},{"key":"4_CR13","unstructured":"Banik, D., Ekbal, A., Bhattacharyya, P.: Wuplebleu: the wordnet-based evaluation metric for machine translation. In: 15th International Conference on Natural Language Processing, p. 104 (2018)"},{"key":"4_CR14","unstructured":"Ulven, J.: High level information security risk in higher education. Master\u2019s thesis, Norwegian University of Science and Technology, Trondheim, Norway (2020) (Google Scholar)"},{"key":"4_CR15","first-page":"657","volume":"41","author":"K Beaudin","year":"2015","unstructured":"Beaudin, K.: College and university data breaches: regulating higher education cybersecurity under state and federal law. J. Coll. Univ. Law 41, 657\u2013693 (2015)","journal-title":"J. Coll. Univ. Law"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Banik, D.: (2022) Pooled hybrid-spectral for hyperspectral image classification. In: Multimedia Tools and Applications, pp. 1\u201313","DOI":"10.1007\/s11042-022-13721-2"},{"key":"4_CR17","unstructured":".ISO\/IEC 27002:2013 Information technology\u2014Security techniques\u2014Information security risk management; standard. International Organization for Standardization, Geneva, Switzerland (2018)"},{"key":"4_CR18","unstructured":"ISO\/IEC 27002:2013 Information Technology\u2014Security techniques\u2014Code of practice for information security controls. Standard; International Organization for Standardization"},{"key":"4_CR19","unstructured":"Wangen, G., Halstensen, C., Snekkenes, E.: A framework for estimating security risk assessment method completeness"},{"key":"4_CR20","unstructured":"Internet World Stats: Internet penetration in Asia December 31, 2013. In: Jones, H.B., Heinrichs, R.L. (eds.) (2012) Do business students practice smartphone security? J Comput Inf Syst 22\u201330. 14. Kshetri, N. (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Trends in Intelligence Enabled Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-1472-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T03:40:39Z","timestamp":1687491639000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-1472-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819914715","9789819914722"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-1472-2_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DoSIER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doctoral Symposium on Intelligence Enabled Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cooch Behar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dosier2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dosier.drsiddhartha.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}