{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:38Z","timestamp":1767337898965,"version":"3.44.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"vor","delay-in-days":350,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006505","name":"US Army Engineer Research and Development Center","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100006505","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,5]]},"abstract":"<jats:p>Improving data governance methodologies.<\/jats:p>","DOI":"10.1145\/3632290","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T08:57:32Z","timestamp":1713257852000},"page":"48-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience"],"prefix":"10.1145","volume":"67","author":[{"given":"Andrew","family":"Strelzoff","sequence":"first","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"given":"Benjamin D.","family":"Trump","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"given":"Christopher L.","family":"Cummings","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"given":"Madison","family":"Smith","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"given":"Stephanie E.","family":"Galaitsi","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"given":"Kelsey","family":"Stoddard","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]},{"given":"Jeff","family":"Keisler","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Boston, MA, USA"}]},{"given":"Moshe","family":"Vardi","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Nathaniel","family":"Bastian","sequence":"additional","affiliation":[{"name":"U.S. Army Cyber Institute, United States Military Academy, West Point, NY, USA"}]},{"given":"Alexander","family":"Kott","sequence":"additional","affiliation":[{"name":"Army Research Laboratory, Adelphi, MD, USA"}]},{"given":"Igor","family":"Linkov","sequence":"additional","affiliation":[{"name":"U.S. Army Engineer Research and Development Center, Vicksburg, MS, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_2_1_2_1","author":"Ansari M.","year":"2022","unstructured":"Ansari, M. et al. The impact and limitations of artificial intelligence in cybersecurity: A literature review. Intern. J. of Advanced Research in Computer and Communication Engineering (2022).","journal-title":"Intern. J. of Advanced Research in Computer and Communication Engineering ("},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/00187208211009995"},{"key":"e_1_2_1_4_1","unstructured":"Demarest C. Q&A: Army's Jennifer Swanson talks data mesh and digital fluency. C4isrnet.com (2023); https:\/\/bit.ly\/43ozIwH."},{"key":"e_1_2_1_5_1","volume-title":"Resilience and Hybrid Threats","author":"Galaitsi S.","year":"2019","unstructured":"Galaitsi, S. et al. The ethics of algorithm errors. In Resilience and Hybrid Threats. IOS Press (2019)."},{"key":"e_1_2_1_6_1","unstructured":"Gorman A. and Rowan H. Why Millions of Californians Eligible for Food Stamps Can't Get Them. npr.org (2018); https:\/\/bit.ly\/43jaeAF"},{"key":"e_1_2_1_7_1","unstructured":"ISOO Notice 2017-02. Clarification of Classification by Compilation; https:\/\/www.archives.gov\/isoo\/notices"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2020.101976"},{"key":"e_1_2_1_9_1","volume-title":"Fundamental concepts of cyber resilience: Introduction and overview. Cyber Resilience of Systems and Networks","author":"Linkov I.","year":"2019","unstructured":"Linkov, I. and Kott, A. Fundamental concepts of cyber resilience: Introduction and overview. Cyber Resilience of Systems and Networks (2019)."},{"volume-title":"Proceedings of the 29th Intern. Conf. on Information Systems Development, Valencia, Spain (2021)","author":"Machado I.","key":"e_1_2_1_10_1","unstructured":"Machado, I., Costa, C. and Santos, M. Data-driven information systems: The data mesh paradigm shift. In Proceedings of the 29th Intern. Conf. on Information Systems Development, Valencia, Spain (2021); https:\/\/bit.ly\/49RsbJ4"},{"key":"e_1_2_1_11_1","first-page":"196","author":"Machado I.","year":"2022","unstructured":"Machado, I., Costa, C., and Santos, M. Data mesh: Concepts and principles of a paradigm shift in data architectures. Procedia Computer Science 196, (2022).","journal-title":"Procedia Computer Science"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_2_1_13_1","unstructured":"House W. Fact Sheet: President Biden Issues Executive Order on Safe Secure and Trustworthy Artificial Intelligence (2023); https:\/\/bit.ly\/43iWXZd"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2018.1542648"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2021.101577"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632290","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:37:11Z","timestamp":1755974231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["10.1145\/3632290"],"URL":"https:\/\/doi.org\/10.1145\/3632290","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"2024-05-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}