{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T23:34:03Z","timestamp":1770680043626,"version":"3.49.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030008468","type":"print"},{"value":"9783030008475","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00847-5_11","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T08:11:26Z","timestamp":1537863086000},"page":"121-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["The Common Ontology of Value and Risk"],"prefix":"10.1007","author":[{"given":"Tiago Prince","family":"Sales","sequence":"first","affiliation":[]},{"given":"Fernanda","family":"Bai\u00e3o","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Guizzardi","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Paulo A.","family":"Almeida","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Guarino","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"11_CR1","unstructured":"Anderson, B., Guarino, N., Johannesson, P., Livieri, B.: Towards an ontology of value ascription. In: 9th International Conference on Formal Ontology in Information Systems (FOIS), vol. 283, p. 331. IOS Press (2016)"},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s00766-010-0112-x","volume":"16","author":"Y Asnar","year":"2011","unstructured":"Asnar, Y., Giorgini, P., Mylopoulos, J.: Goal-driven risk assessment in requirements engineering. Requir. Eng. 16(2), 101\u2013116 (2011)","journal-title":"Requir. Eng."},{"issue":"6","key":"11_CR3","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/j.ress.2010.01.011","volume":"95","author":"T Aven","year":"2010","unstructured":"Aven, T.: On how to define, understand and describe risk. Reliab. Eng. Syst. Saf. 95(6), 623\u2013631 (2010)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"11_CR4","volume-title":"Misconceptions of Risk","author":"T Aven","year":"2011","unstructured":"Aven, T.: Misconceptions of Risk. Wiley, New York (2011)"},{"issue":"8","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1016\/j.ssci.2011.04.015","volume":"49","author":"T Aven","year":"2011","unstructured":"Aven, T., Renn, O., Rosa, E.A.: On the ontological status of the concept of risk. Saf. Sci. 49(8), 1074\u20131079 (2011)","journal-title":"Saf. Sci."},{"key":"11_CR6","unstructured":"Band, I., et al.: Modeling enterprise risk management and security with the ArchiMate language - W172 (2017)"},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/13669877.2010.515313","volume":"14","author":"\u00c5 Boholm","year":"2011","unstructured":"Boholm, \u00c5., Corvellec, H.: A relational theory of risk. J. Risk Res. 14(2), 175\u2013190 (2011)","journal-title":"J. Risk Res."},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.datak.2017.03.002","volume":"109","author":"VA Carvalho","year":"2017","unstructured":"Carvalho, V.A., Almeida, J.P.A., Fonseca, C.M., Guizzardi, G.: Multi-level ontology-based conceptual modeling. Data Knowl. Eng. 109, 3\u201324 (2017)","journal-title":"Data Knowl. Eng."},{"key":"11_CR9","unstructured":"Committee of Sponsoring Organizations of the Treadway Commission (COSO): Enterprise Risk Management - Integrated Framework (2004)"},{"issue":"6","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11229-013-0311-3","volume":"191","author":"J Diekemper","year":"2014","unstructured":"Diekemper, J.: The existence of the past. Synthese 191(6), 1085\u20131104 (2014)","journal-title":"Synthese"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s00766-003-0169-x","volume":"8","author":"J Gordijn","year":"2003","unstructured":"Gordijn, J., Akkermans, J.M.: Value-based requirements engineering: exploring innovative e-commerce ideas. Requir. Eng. 8(2), 114\u2013134 (2003)","journal-title":"Requir. Eng."},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-69904-2_36","volume-title":"Conceptual Modeling","author":"N Guarino","year":"2017","unstructured":"Guarino, N.: On the semantics of ongoing and future occurrence identifiers. In: Mayr, H.C., Guizzardi, G., Ma, H., Pastor, O. (eds.) ER 2017. LNCS, vol. 10650, pp. 477\u2013490. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69904-2_36"},{"key":"11_CR13","unstructured":"Guizzardi, G.: Ontological foundations for structural conceptual models (2005)"},{"key":"11_CR14","unstructured":"Guizzardi, G., Almeida, J.P.A., Guarino, N., de Carvalho, V.A.: Towards an ontological analysis of powertypes. In: 1st Joint Ontology Workshops (JOWO) (2015)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Guizzardi, G., Fonseca, C.M., Benevides, A.B., Almeida, J.P.A., Porello, D., Sales, T.P.: Endurant types in ontology-driven conceptual modeling: Towards OntoUML 2.0. In: 37th International Conference on Conceptual Modeling (ER) (2018)","DOI":"10.1007\/978-3-030-00847-5_12"},{"key":"11_CR16","unstructured":"Institute of Risk Management (IRM): A Risk Management Standard (2002)"},{"key":"11_CR17","unstructured":"ISO: Risk Management - Vocabulary, ISO Guide 73:2009 (2009)"},{"key":"11_CR18","unstructured":"ISO: Risk Management - Guidelines, ISO 31000:2018 (2018)"},{"key":"11_CR19","unstructured":"Kambil, A., Ginsberg, A., Bloch, M.: Re-inventing value propositions. In: Information Systems Working Papers Series (1996)"},{"issue":"1","key":"11_CR20","first-page":"57","volume":"6","author":"G Kjellmer","year":"2007","unstructured":"Kjellmer, G.: On the awkward polysemy of the verb \u2018risk\u2019. Nord. J. Engl. Stud. 6(1), 57\u201370 (2007)","journal-title":"Nord. J. Engl. Stud."},{"key":"11_CR21","unstructured":"Lanning, M.J., Michaels, E.G.: A business is a value delivery system (1988)"},{"key":"11_CR22","volume-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"MS Lund","year":"2010","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer Science & Business Media, Heidelberg (2010)"},{"key":"11_CR23","volume-title":"Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers","author":"A Osterwalder","year":"2010","unstructured":"Osterwalder, A., Pigneur, Y.: Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers. Wiley, Hoboken (2010)"},{"key":"11_CR24","volume-title":"Value Proposition Design: How to Create Products and Services Customers Want","author":"A Osterwalder","year":"2014","unstructured":"Osterwalder, A., Pigneur, Y., Bernarda, G., Smith, A.: Value Proposition Design: How to Create Products and Services Customers Want. Wiley, Hoboken (2014)"},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/136698798377321","volume":"1","author":"O Renn","year":"1998","unstructured":"Renn, O.: Three decades of risk research: accomplishments and new challenges. J. Risk Res. 1(1), 49\u201371 (1998)","journal-title":"J. Risk Res."},{"key":"11_CR26","volume-title":"The Nature of Human Values","author":"M Rokeach","year":"1973","unstructured":"Rokeach, M.: The Nature of Human Values. Free Press, New York (1973)"},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/136698798377303","volume":"1","author":"EA Rosa","year":"1998","unstructured":"Rosa, E.A.: Metatheoretical foundations for post-normal risk. J. Risk Res. 1, 15\u201344 (1998)","journal-title":"J. Risk Res."},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-30464-7_10","volume-title":"Conceptual Modeling \u2013 ER 2004","author":"M Rosemann","year":"2004","unstructured":"Rosemann, M., Green, P., Indulska, M.: A reference methodology for conducting ontological analyses. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol. 3288, pp. 110\u2013121. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30464-7_10"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Sales, T.P., Guarino, N., Guizzardi, G., Mylopoulos, J.: An ontological analysis of value propositions. In: 21st IEEE International Enterprise Distributed Object Computing Conference (EDOC), pp. 184\u2013193 (2017)","DOI":"10.1109\/EDOC.2017.32"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-319-12206-9_28","volume-title":"Conceptual Modeling","author":"A Siena","year":"2014","unstructured":"Siena, A., Morandini, M., Susi, A.: Modelling risks in open source software component selection. In: Yu, E., Dobbie, G., Jarke, M., Purao, S. (eds.) ER 2014. LNCS, vol. 8824, pp. 335\u2013348. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12206-9_28"},{"issue":"3","key":"11_CR31","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.emj.2008.04.003","volume":"26","author":"SL Vargo","year":"2008","unstructured":"Vargo, S.L., Maglio, P.P., Akaka, M.A.: On value and value co-creation: a service systems and service logic perspective. Eur. Manag. J. 26(3), 145\u2013152 (2008)","journal-title":"Eur. Manag. J."},{"issue":"4","key":"11_CR32","doi-asserted-by":"publisher","first-page":"577","DOI":"10.2307\/251231","volume":"33","author":"CA Williams","year":"1966","unstructured":"Williams, C.A.: Attitudes toward speculative risks as an indicator of attitudes toward pure risks. J. Risk Insur. 33(4), 577\u2013586 (1966)","journal-title":"J. Risk Insur."}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00847-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:38:18Z","timestamp":1571935098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00847-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030008468","9783030008475"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00847-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.nwpu-bioinformatics.com\/ER2018\/index.php#content","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}