{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:50:21Z","timestamp":1770817821661,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:00:00Z","timestamp":1663804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,22]]},"DOI":"10.1145\/3551504.3551516","type":"proceedings-article","created":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T16:08:31Z","timestamp":1666714111000},"page":"106-111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Holistic Approach to Cybersecurity in Academia"],"prefix":"10.1145","author":[{"given":"Arina","family":"Alexei","sequence":"first","affiliation":[{"name":"Technical University of Moldova, Moldova"}]},{"given":"Pavel","family":"Nistiriuc","sequence":"additional","affiliation":[{"name":"Technical University of Moldova, Moldova"}]},{"given":"Anatolie","family":"Alexei","sequence":"additional","affiliation":[{"name":"Technical University of Moldova, Moldova"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1259"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"128","article-title":"Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance","volume":"10","author":"Alexei Arina","year":"2021","unstructured":"Arina Alexei, and Anatolie Alexei. 2021. Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance. In International Journal of Scientific & Technology Research, vol. 10, no. 3, pp. 128\u2013133","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.52326\/jss.utm.2021.4(1).11"},{"issue":"3","key":"e_1_3_2_1_5_1","article-title":"Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance Learning","volume":"10","author":"Alexei Arina","year":"2021","unstructured":"Arina Alexei, and Anatolie Alexei. 2021. Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance Learning. In International Journal of Scientific & Technology Research, vol. 10, no. 3.","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_3_2_1_6_1","volume-title":"Koong","author":"Yunis Manal M.","year":"2015","unstructured":"Manal M. Yunis, and Kai S. Koong. 2015. Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework. In AMCIS."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.28"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"35","article-title":"Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova","volume":"6","author":"Alexei Arina","year":"2022","unstructured":"Arina Alexei. 2022. Design & development of a cyber security conceptual framework for higher education institutions in the Republic of Moldova. In Scientific and Practical Cyber Security Journal (SPCSJ), vol. 6, no. 1, pp. 35\u201352.","journal-title":"Scientific and Practical Cyber Security Journal (SPCSJ)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725323"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2021.1973526"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567261"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-02-2018-0028"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.32575\/ppb.2021.1.1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.24989\/ocg.v341.24"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30086-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JESTCH.2021.09.011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101709"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.susmat.2014.11.003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17722\/ijme.v3i1.122"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.07.003In"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00783-2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.06.001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44711-3_1"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Council of the European Union and European Parliament.","year":"2016","unstructured":"Council of the European Union and European Parliament. 2016. Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Retrieved February 28, 2021 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32016L1148)"},{"key":"e_1_3_2_1_26_1","volume-title":"Information Security Management","author":"IEC","year":"2013","unstructured":"ISO\/IEC 27001: Information Security Management. International Organization for Standardization,\u201d Geneva, Switzerland, 2013. Retrieved December 02, 2021 from https:\/\/www.iso.org\/isoiec-27001-information-security.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECDC.2013.6556730"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19228-9_9"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.35"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies6030065"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00062"}],"event":{"name":"CEEeGov '22: Central and Eastern European eDem and eGov Days","location":"Budapest Hungary","acronym":"CEEeGov '22"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551504.3551516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551504.3551516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:25Z","timestamp":1750186825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551504.3551516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,22]]},"references-count":33,"alternative-id":["10.1145\/3551504.3551516","10.1145\/3551504"],"URL":"https:\/\/doi.org\/10.1145\/3551504.3551516","relation":{},"subject":[],"published":{"date-parts":[[2022,9,22]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}