{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:33:35Z","timestamp":1769060015539,"version":"3.49.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:p>The increasing digitalization of heritage domain has introduced new risks, making it a target for cyber threats such as ransomware and digital manipulation. This article explores the vulnerabilities of digital heritage domain and the urgent need for cybersecurity and resilience in the heritage sector. It introduces the concept of cyber humanities, a novel transdisciplinary discipline that sees digital heritage as a cultural cyber critical ecosystem (C3E), that should exhibit trust, resilience, and sustainability properties. By bridging the gap between the humanities and technologies, cyber humanities aims to develop innovative skills and competencies to protect digital cultural assets from cyber threats, ensuring their long-term preservation and accessibility.<\/jats:p>","DOI":"10.1145\/3735659","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:34:21Z","timestamp":1763750061000},"page":"112-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Humanities for Heritage Security"],"prefix":"10.1145","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7878-8710","authenticated-orcid":false,"given":"Emanuele","family":"Bellini","sequence":"first","affiliation":[{"name":"University of Roma Tre, Rome, Lazio, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,11,25]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.3917\/tdm.018.0170"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3649218"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJKL.2014.069536"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3137572"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Bellini E. and Marrone S. Towards a novel conceptualization of cyber resilience. In Proceedings of the 2020 IEEE World Congress on Services (SERVICES)\u00a0(2020) 189\u2013196; DOI:10.1109\/SERVICES48979.2020.00048","DOI":"10.1109\/SERVICES48979.2020.00048"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24244"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.10.001"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.5751\/ES-01252-100129"},{"key":"e_1_3_1_10_2","first-page":"25","volume-title":"Constructing cultural and natural heritage","author":"Davallon J.","year":"2010","unstructured":"Davallon, J. Constructing cultural and natural heritage.\u00a0Documenta Universitaria, Chapter The Game of Heritagization\u00a0(2010), 25\u201348; https:\/\/tinyurl.com\/28wslwxu"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-017-0259-1"},{"key":"e_1_3_1_12_2","unstructured":"Freeland C.\u00a0Internet Archive and the Wayback Machine under DDoS cyber-attack.\u00a0Internet Archive\u00a0(2024); https:\/\/tinyurl.com\/267x7jvh"},{"key":"e_1_3_1_13_2","first-page":"347","volume-title":"Epilogue: Resilience Engineering Concepts and Precepts","author":"Hollnagel E.","year":"2006","unstructured":"Hollnagel, E. and Woods, D. Epilogue: Resilience Engineering Concepts and Precepts. Ashgate\u00a0(2006), 347\u2013358."},{"key":"e_1_3_1_14_2","unstructured":"ISO 14721:2012. Space data and information transfer systems\u2014Open archival information systems (OAIS)\u2014Reference model\u00a0(2012); https:\/\/tinyurl.com\/2xzyhptt"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Kahn R. and Wilensky R. A framework for distributed digital object services. Intern. J. on Digital Libraries (2006) 115\u2013123; DOI:10.1007\/s00799-005-0128-x","DOI":"10.1007\/s00799-005-0128-x"},{"key":"e_1_3_1_16_2","unstructured":"Laprie J. From dependability to resilience. In Proceedings of the IEEE Conf. Dependable Systems and Networks\u00a0(2008)."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549073"},{"key":"e_1_3_1_18_2","first-page":"4","volume-title":"Trust and Power","author":"Luhmann N.","year":"1979","unstructured":"Luhmann, N. Trust: A mechanism for the reduction of social complexity. In Trust and Power, N. Luhmann (Ed.). Wiley\u00a0(1979), 4\u2013103."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v3i1.42"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.3917\/tdm.018.0170"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Nguyen C.D. Digital cultural heritage in the crossfire of conflict: cyber threats and cybersecurity perspectives. Insights: The UKSG J. (May 2024); DOI:10.1629\/uksg.647","DOI":"10.1629\/uksg.647"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2012.01885.x"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Paskin N. Digital object identifiers for scientific data. Data Science J. (Jan. 2006); DOI:10.2481\/dsj.4.12","DOI":"10.2481\/dsj.4.12"},{"key":"e_1_3_1_24_2","unstructured":"Sotirov A. et al. MD5 considered harmful today: Creating a rogue CA certificate. (2008); https:\/\/tinyurl.com\/2awnwx8e"},{"key":"e_1_3_1_25_2","unstructured":"SUCHO Project;\u00a0https:\/\/www.sucho.org\/"},{"key":"e_1_3_1_26_2","unstructured":"UNESCO. Transdisciplinarity: Stimulating synergies integrating knowledge. In Proceedings of the Intern. Symp. on Transdisciplinarity\u00a0(1998); https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000114694"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3388890"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1038\/464984a"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-018-9708-3"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3735659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T19:56:22Z","timestamp":1764100582000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3735659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":28,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10.1145\/3735659"],"URL":"https:\/\/doi.org\/10.1145\/3735659","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,25]]},"assertion":[{"value":"2025-02-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}