{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:33:35Z","timestamp":1725471215580},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457626"},{"type":"electronic","value":"9783540457633"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11875567_5","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:25:27Z","timestamp":1158931527000},"page":"57-70","source":"Crossref","is-referenced-by-count":3,"title":["Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry"],"prefix":"10.1007","author":[{"given":"Felicjan","family":"Rydzak","sequence":"first","affiliation":[]},{"given":"Lars S.","family":"Breistrand","sequence":"additional","affiliation":[]},{"given":"Finn Olav","family":"Sveen","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Jose J.","family":"Gonzalez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Johnsen, S.O., Line, M.B., Askildsen, A.: Towards more secure virtual organizations by implementing a common scheme for incident response management. In: Eight International Conference on Probabilistic Safety Assesment and Management (PSAM8), New Orleans (2006)"},{"key":"5_CR2","first-page":"85","volume-title":"Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues","author":"H.F. Lipson","year":"2002","unstructured":"Lipson, H.F.: Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, p. 85. CERT Coordination Center, Pittsburgh (2002)"},{"issue":"1","key":"5_CR3","first-page":"29","volume":"101","author":"J.J. Gonzalez","year":"2005","unstructured":"Gonzalez, J.J., et al.: Helping Prevent Information Security Risks in the Transition to Integrated Operations. Telektronikk\u00a0101(1), 29\u201337 (2005)","journal-title":"Telektronikk"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Rich, E., Gonzalez, J.J.: Maintaining Security and Safety in High-threat E-operations Transitions. In: Hawaii International Conference on System Sciences, Hawaii (2006)","DOI":"10.1109\/HICSS.2006.258"},{"issue":"4","key":"5_CR5","doi-asserted-by":"crossref","first-page":"64","DOI":"10.2307\/41166101","volume":"43","author":"N.P. Repenning","year":"2001","unstructured":"Repenning, N.P., Sterman, J.D.: Nobody ever gets credit for fixing problems that never happened. California Management Review\u00a043(4), 64\u201388 (2001)","journal-title":"California Management Review"},{"key":"5_CR6","volume-title":"Business Dynamics: Systems Thinking and Modeling for a Complex World","author":"J.D. Sterman","year":"2000","unstructured":"Sterman, J.D.: Business Dynamics: Systems Thinking and Modeling for a Complex World. McGraw-Hill\/Irwin, Boston (2000)"},{"issue":"6","key":"5_CR7","first-page":"65","volume":"8","author":"R.A. Heifetz","year":"2002","unstructured":"Heifetz, R.A., Linsky, M.: Managing Yourself: A Survival Guide for Leaders. Harvard Business Review\u00a08(6), 65\u201374 (2002)","journal-title":"Harvard Business Review"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.es.04.110173.000245","volume":"4","author":"C.S. Holling","year":"1973","unstructured":"Holling, C.S.: Resilience and Stability of Ecological Systems. Annual Review of Ecology and Systematics\u00a04, 1\u201323 (1973)","journal-title":"Annual Review of Ecology and Systematics"},{"key":"5_CR9","volume-title":"Barriers and bridges to renewal of ecosystems and institutions","author":"L.H. Gunderson","year":"1995","unstructured":"Gunderson, L.H., Holling, C.S., Light, S.S.: Barriers and bridges to renewal of ecosystems and institutions. Columbia University Press, New York (1995)"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/s10021-001-0045-9","volume":"4","author":"S.R. Carpenter","year":"2001","unstructured":"Carpenter, S.R., et al.: From Metaphor to Measurement: Resilience of What to What? Ecosystems\u00a04, 765\u2013781 (2001)","journal-title":"Ecosystems"},{"key":"5_CR11","volume-title":"Reengineering the Corporation","author":"M. Hammer","year":"1993","unstructured":"Hammer, M., Champy, J.: Reengineering the Corporation. Harper Business, New York (1993)"},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1002\/ltl.58","volume":"31","author":"P. Stoltz","year":"2004","unstructured":"Stoltz, P.: Building resilience for uncertain times. Leader to Leader\u00a031(4), 16\u201317 (2004)","journal-title":"Leader to Leader"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11875567_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:25:01Z","timestamp":1619508301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11875567_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457626","9783540457633"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11875567_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}