{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:11:08Z","timestamp":1774170668508,"version":"3.50.1"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030036379","type":"print"},{"value":"9783030036386","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_18","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T07:12:53Z","timestamp":1541056373000},"page":"291-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Cyber Hygiene: The Big Picture"],"prefix":"10.1007","author":[{"given":"Kaie","family":"Maennel","sequence":"first","affiliation":[]},{"given":"Sten","family":"M\u00e4ses","sequence":"additional","affiliation":[]},{"given":"Olaf","family":"Maennel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"18_CR1","unstructured":"NIST (2018). https:\/\/www.nist.gov\/video\/youve-been-phished"},{"key":"18_CR2","unstructured":"Essential Measures for a Healthy Network, ANSSI. https:\/\/www.ssi.gouv.fr\/en\/actualite\/40-essential-measures-for-a-healthy-network\/"},{"key":"18_CR3","unstructured":"Belgian Cyber Security Guide, ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium. https:\/\/www.b-ccentre.be\/wp-content\/uploads\/2014\/04\/B-CCENTRE-BCSG-EN.pdf"},{"key":"18_CR4","unstructured":"Cyber Essentials-Keeping UK Businesses Safe, CREST. http:\/\/www.cyberessentials.org\/index.html"},{"key":"18_CR5","unstructured":"Cyber hygiene. https:\/\/en.wikipedia.org\/wiki\/Cyber_hygiene"},{"key":"18_CR6","unstructured":"Cyber hygiene. https:\/\/www.collinsdictionary.com\/submission\/1930\/Cyber+hygiene"},{"key":"18_CR7","unstructured":"Glossary of Key Information Security Terms, NISTIR 7298, Revision 2, nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf"},{"key":"18_CR8","unstructured":"Guide Des Bonnes Pratiques De L\u2019informatique, CGPME \/ ANSSI. https:\/\/www.ssi.gouv.fr\/uploads\/2015\/03\/guide_cgpme_bonnes_pratiques.pdf"},{"key":"18_CR9","unstructured":"IATE: Term of the Week-Cyber Hygiene. http:\/\/termcoord.eu\/2017\/10\/iate-term-of-the-week-cyber-hygiene"},{"key":"18_CR10","unstructured":"Small Business Information Security: the fundamentals, NIST. http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2016\/NIST.IR.7621r1.pdf"},{"key":"18_CR11","unstructured":"Special Publication 800\u201353 - NIST Computer Security Resource Center. Version 5, August 2017. https:\/\/csrc.nist.gov\/publications\/drafts\/800-53\/sp800-53r5-draft.pdf"},{"key":"18_CR12","unstructured":"The CIS Critical Security Controls for Effective Cyber Defense. Version 6.1. http:\/\/www.cisecurity.org"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Systemic security management. IEEE Secur. Privacy 4(6), 74\u201377 (2006). https:\/\/doi.org\/FEC0FD8D-A181-4AFD-BEA7-AEADF75DEE82","DOI":"10.1109\/MSP.2006.167"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Information Supplement: Best Practices for Implementing a Security Awareness Program, Security Awareness Program Special Interest Group PCI Security Standards Council (2014). https:\/\/www.pcisecuritystandards.org\/documents\/PCIDSSV1.0BestPracticesforImplementingSecurityAwarenessProgram.pdf","DOI":"10.1016\/B978-0-12-419967-5.00001-6"},{"key":"18_CR15","unstructured":"Review of cyber hygiene practices. ENISA, Heraklion (2016). http:\/\/publications.europa.eu\/publication\/manifestation_identifier\/PUB_TP0217008ENN"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"US officially accuses Russia of DNC hack while election systems come under attack. Netw. Secur. 2016(10), 1\u20132 (2016). https:\/\/doi.org\/10.1016\/S1353-4858(16)30092-7","DOI":"10.1016\/S1353-4858(16)30092-7"},{"key":"18_CR17","unstructured":"Core Principles of Cyber Hygiene in a World of Cloud and Mobility, VMware, August 2017. https:\/\/www.vmware.com\/content\/dam\/digitalmarketing\/vmware\/en\/pdf\/products\/vmware-core-principles-cyber-hygiene-whitepaper.pdf"},{"key":"18_CR18","unstructured":"The good cyber hygiene bill (2017). https:\/\/www.congress.gov\/bill\/115th-congress\/house-bill\/3010\/text"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"The WannaCry ransomware attack. Strateg. Comments 23(4), vii\u2013ix (2017). https:\/\/doi.org\/10.1080\/13567888.2017.1335101","DOI":"10.1080\/13567888.2017.1335101"},{"key":"18_CR20","unstructured":"The week that was, 29 October 2017). https:\/\/www.thecyberwire.com\/issues\/issues2017\/October\/WTW_2017_10_29.html"},{"key":"18_CR21","unstructured":"Tripwire state of cyber hygiene report, August 2018. https:\/\/www.tripwire.com\/misc\/state-of-cyber-hygiene-report-register\/"},{"issue":"9","key":"18_CR22","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1080\/08870446.2011.613995","volume":"26","author":"Icek Ajzen","year":"2011","unstructured":"Ajzen, I.: The theory of planned behaviour: reactions and reflections (2011)","journal-title":"Psychology & Health"},{"issue":"2","key":"18_CR23","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MIC.2017.23","volume":"21","author":"Virgilio A.F. Almeida","year":"2017","unstructured":"Almeida, V.A.F., Doneda, D., de Souza Abreu, J.: Cyberwarfare and digital governance. IEEE Internet Comput. 21(2), 68\u201371 (2017). https:\/\/doi.org\/10.1109\/MIC.2017.23","journal-title":"IEEE Internet Computing"},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"Beris, O., Beautement, A., Sasse, M.A.: Employee rule breakers, excuse makers and security champions: mapping the risk perceptions and emotions that drive security behaviors. In: Proceedings of the 2015 New Security Paradigms Workshop NSPW 2015, pp. 73\u201384. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2841113.2841119","DOI":"10.1145\/2841113.2841119"},{"issue":"2","key":"18_CR25","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1361-3723(13)70020-4","volume":"2013","author":"Danny Bradbury","year":"2013","unstructured":"Bradbury, D.: Insuring against data breaches. Comput. Fraud Secur. 2013(2), 11\u201315 (2013). https:\/\/doi.org\/10.1016\/S1361-3723(13)70020-4","journal-title":"Computer Fraud & Security"},{"issue":"3","key":"18_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MTS.2009.934142","volume":"28","author":"L. Camp","year":"2009","unstructured":"Camp, L.J.: Mental models of privacy and security. IEEE Technol. Soc. Magaz. 28(3), 37\u201346 (2009). https:\/\/doi.org\/10.1109\/MTS.2009.934142","journal-title":"IEEE Technology and Society Magazine"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Chaudhry, J.A., Rittenhouse, R.G.: Phishing: classification and countermeasures. In: 2015 7th International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB), pp. 28\u201331. IEEE (2015)","DOI":"10.1109\/MulGraB.2015.17"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.eng.2018.02.006","volume":"4","author":"Jackie Craig","year":"2018","unstructured":"Craig, J.: Cybersecurity research-essential to a successful digital future. Engineering 4(1), 9\u201310 (2018). https:\/\/doi.org\/10.1016\/j.eng.2018.02.006","journal-title":"Engineering"},{"issue":"8","key":"18_CR29","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1136\/jech.2007.062380","volume":"61","author":"V. A Curtis","year":"2007","unstructured":"Curtis, V.A.: Dirt, disgust and disease: a natural history of hygiene. J. Epidemiol. Commun. Health 61(8), 660\u2013664 (2007). https:\/\/doi.org\/10.1136\/jech.2007.062380","journal-title":"Journal of Epidemiology & Community Health"},{"key":"18_CR30","unstructured":"Dobbins, J., et al.: Choices for America in a Turbulent World: Strategic Rethink. Rand Corporation (2015)"},{"key":"18_CR31","unstructured":"Dodge, R., Toregas, C., Hoffman, L.J.: Cybersecurity workforce development directions. In: HAISA, pp. 1\u201312 (2012)"},{"issue":"2","key":"18_CR32","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1080\/13569775.2016.1153284","volume":"22","author":"R. Guy Emerson","year":"2016","unstructured":"Emerson, R.G.: Limits to a cyber-threat. Contemp. Politics 22(2), 178\u2013196 (2016). https:\/\/doi.org\/10.1080\/13569775.2016.1153284","journal-title":"Contemporary Politics"},{"key":"18_CR33","doi-asserted-by":"publisher","unstructured":"Fabiano, N.: Internet of things and blockchain: legal issues and privacy. the challenge for a privacy standard. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 727\u2013734, June 2017. https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.112","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.112"},{"key":"18_CR34","doi-asserted-by":"publisher","unstructured":"Fabiano, N.: The internet of things ecosystem: the blockchain and privacy issues. the challenge for a global privacy standard. In: 2017 International Conference on Internet of Things for the Global Community (IoTGC), pp. 1\u20137, July 2017. https:\/\/doi.org\/10.1109\/IoTGC.2017.8008970","DOI":"10.1109\/IoTGC.2017.8008970"},{"issue":"4","key":"18_CR35","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1080\/00396338.2012.709391","volume":"54","author":"JP Farwell","year":"2012","unstructured":"Farwell, J.P., Rohozinski, R.: The new reality of cyber war. Survival 54(4), 107\u2013120 (2012)","journal-title":"Survival"},{"issue":"2","key":"18_CR36","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","volume":"30","author":"DL Floyd","year":"2000","unstructured":"Floyd, D.L., Prentice-Dunn, S., Rogers, R.W.: A meta-analysis of research on protection motivation theory. J. Appl. Soc. Psychol. 30(2), 407\u2013429 (2000)","journal-title":"J. Appl. Soc. Psychol."},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, p. 40. ACM (2009)","DOI":"10.1145\/1541948.1541999"},{"key":"18_CR38","unstructured":"Gardiner, K., Harrington, J.M.: Occupational Hygiene. Wiley, Hoboken (2008)"},{"issue":"2","key":"18_CR39","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1080\/09636412.2015.1038188","volume":"24","author":"Erik Gartzke","year":"2015","unstructured":"Gartzke, E., Lindsay, J.R.: Weaving tangled webs: offense, defense, and deception in cyberspace. Secur. Stud. 24(2), 316\u2013348 (2015). https:\/\/doi.org\/10.1080\/09636412.2015.1038188","journal-title":"Security Studies"},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.cose.2012.10.003","volume":"32","author":"KH Guo","year":"2013","unstructured":"Guo, K.H.: Security-related behavior in using information systems in the workplace: a review and synthesis. Comput. Secur. 32, 242\u2013251 (2013)","journal-title":"Comput. Secur."},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"H\u00e4nsch, N., Benenson, Z.: Specifying it security awareness. In: 2014 25th International Workshop on Database and Expert Systems Applications (DEXA), pp. 326\u2013330. IEEE (2014)","DOI":"10.1109\/DEXA.2014.71"},{"key":"18_CR42","doi-asserted-by":"crossref","unstructured":"Kelley, D.: Investigation of attitudes towards security behaviors. McNair Res. J. SJSU 14(1), 10 (2018)","DOI":"10.31979\/mrj.2018.1410"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Kerfoot, T.: Cybersecurity: towards a strategy for securing critical infrastructure from cyberattacks (2012)","DOI":"10.2139\/ssrn.2285587"},{"issue":"10","key":"18_CR44","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2811290","volume":"58","author":"K Kirkpatrick","year":"2015","unstructured":"Kirkpatrick, K.: Cyber policies on the rise. Commun. ACM 58(10), 21\u201323 (2015)","journal-title":"Commun. ACM"},{"key":"18_CR45","unstructured":"Magnuson, S.: New cyber hygiene campaign seeks to curtail attacks. Nat. Defense 98(726) (2014)"},{"key":"18_CR46","doi-asserted-by":"publisher","unstructured":"Mahfuth, A., Yussof, S., Baker, A.A., Ali, N.: A systematic literature review: information security culture. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1\u20136, July 2017. https:\/\/doi.org\/10.1109\/ICRIIS.2017.8002442","DOI":"10.1109\/ICRIIS.2017.8002442"},{"issue":"6","key":"18_CR47","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1361-3723(15)30048-8","volume":"2016","author":"S Mansfield-Devine","year":"2016","unstructured":"Mansfield-Devine, S.: The death of defence in depth. Comput. Fraud Secur. 2016(6), 16\u201320 (2016). https:\/\/doi.org\/10.1016\/S1361-3723(15)30048-8","journal-title":"Comput. Fraud Secur."},{"issue":"9","key":"18_CR48","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1361-3723(17)30100-8","volume":"2017","author":"S Mansfield-Devine","year":"2017","unstructured":"Mansfield-Devine, S.: Meeting the needs of GDPR with encryption. Comput. Fraud Secur. 2017(9), 16\u201320 (2017). https:\/\/doi.org\/10.1016\/S1361-3723(17)30100-8","journal-title":"Comput. Fraud Secur."},{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"Maybury, M.T.: Toward principles of cyberspace security. In: Cybersecurity Policies and Strategies for Cyberwarfare Prevention, pp. 1\u201312 (2015)","DOI":"10.4018\/978-1-4666-8456-0.ch001"},{"issue":"2","key":"18_CR50","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(18)30023-7","volume":"2018","author":"John Mears","year":"2018","unstructured":"Mears, J.: The rise and rise of id as a service. Biometric Technol. Today 2018(2), 5\u20138 (2018). https:\/\/doi.org\/10.1016\/S0969-4765(18)30023-7","journal-title":"Biometric Technology Today"},{"issue":"8","key":"18_CR51","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S1361-3723(17)30073-8","volume":"2017","author":"A Mouradian","year":"2017","unstructured":"Mouradian, A.: Employees are lax on cyber fundamentals. Comput. Fraud Secur. 2017(8), 17\u201318 (2017)","journal-title":"Comput. Fraud Secur."},{"issue":"2","key":"18_CR52","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1093\/jcsl\/krs017","volume":"17","author":"ME O\u2019Connell","year":"2012","unstructured":"O\u2019Connell, M.E.: Cyber security without cyber war. J. Conflict Secur. Law 17(2), 187\u2013209 (2012). https:\/\/doi.org\/10.1093\/jcsl\/krs017","journal-title":"J. Conflict Secur. Law"},{"key":"18_CR53","doi-asserted-by":"crossref","unstructured":"Oravec, J.A.: Emerging \u201ccyber hygiene\u201d practices for the internet of things (iot): professional issues in consulting clients and educating users on IOT privacy and security. In: 2017 IEEE International Professional Communication Conference (ProComm), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/IPCC.2017.8013965"},{"key":"18_CR54","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.techsoc.2017.09.004","volume":"51","author":"JA Oravec","year":"2017","unstructured":"Oravec, J.A.: Kill switches, remote deletion, and intelligent agents: framing everyday household cybersecurity in the internet of things. Technol. Soc. 51, 189\u2013198 (2017). https:\/\/doi.org\/10.1016\/j.techsoc.2017.09.004","journal-title":"Technol. Soc."},{"issue":"5","key":"18_CR55","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.cose.2012.04.004","volume":"31","author":"K Padayachee","year":"2012","unstructured":"Padayachee, K.: Taxonomy of compliant information security behavior. Comput. Secur. 31(5), 673\u2013680 (2012)","journal-title":"Comput. Secur."},{"key":"18_CR56","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014)","journal-title":"Comput. Secur."},{"issue":"4","key":"18_CR57","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1515\/jhsem-2014-0035","volume":"11","author":"SL Pfleeger","year":"2014","unstructured":"Pfleeger, S.L., Sasse, M.A., Furnham, A.: From weakest link to security hero: transforming staff security behavior. J. Homeland Secur. Emerg. Manage. 11(4), 489\u2013510 (2014)","journal-title":"J. Homeland Secur. Emerg. Manage."},{"issue":"1","key":"18_CR58","first-page":"8","volume":"39","author":"R Sanders","year":"2016","unstructured":"Sanders, R.: Embedding cyber-security into your company\u2019s DNA. People Strategy 39(1), 8\u20139 (2016)","journal-title":"People Strategy"},{"key":"18_CR59","doi-asserted-by":"crossref","unstructured":"Savold, R., Dagher, N., Frazier, P., McCallam, D.: Architecting cyber defense: a survey of the leading cyber reference architectures and frameworks. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 127\u2013138. IEEE (2017)","DOI":"10.1109\/CSCloud.2017.37"},{"issue":"9","key":"18_CR60","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1002\/pfi.4140430905","volume":"43","author":"P. G. Schrader","year":"2004","unstructured":"Schrader, P.G., Lawless, K.A.: The knowledge, attitudes, & behaviors approach how to evaluate performance and learning in complex environments. Perform. Improv. 43(9), 8\u201315 (2004). https:\/\/doi.org\/10.1002\/pfi.4140430905","journal-title":"Performance Improvement"},{"issue":"5","key":"18_CR61","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.bushor.2016.03.015","volume":"59","author":"Scott J. Shackelford","year":"2016","unstructured":"Shackelford, S.J.: Business and cyber peace: we need you! Bus. Horiz. 59(5), 539\u2013548 (2016). https:\/\/doi.org\/10.1016\/j.bushor.2016.03.015 . THE BUSINESS OF PEACE","journal-title":"Business Horizons"},{"issue":"4","key":"18_CR62","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/s10669-013-9474-1","volume":"33","author":"Ben Sheppard","year":"2013","unstructured":"Sheppard, B., Crannell, M., Moulton, J.: Cyber first aid: proactive risk management and decision-making. Environ. Syst. Decis. 33(4), 530\u2013535 (2013). https:\/\/doi.org\/10.1007\/s10669-013-9474-1","journal-title":"Environment Systems and Decisions"},{"key":"18_CR63","unstructured":"Singer, P.W.: The \u2019Ocean\u2019s 11\u2019 of cyber strikes. Armed Forces J. (2012)"},{"issue":"2","key":"18_CR64","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"JM Stanton","year":"2005","unstructured":"Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124\u2013133 (2005)","journal-title":"Comput. Secur."},{"issue":"4","key":"18_CR65","first-page":"455","volume":"1","author":"CP Wang","year":"2007","unstructured":"Wang, C.P., Snyder, D., Monds, K.: A conceptual framework for curbing the epidemic of information malice: e-hygiene model with a human-factor approach. Int. J. Inf. Comput. Secur. 1(4), 455\u2013465 (2007)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"18_CR66","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/B978-0-12-809316-0.00005-1","volume-title":"Advanced Persistent Security","author":"Ira Winkler","year":"2017","unstructured":"Winkler, I., Gomes, A.T.: Chapter 5 - how to hack computers. In: Winkler, I., Gomes, A.T. (eds.) Advanced Persistent Security, pp. 41\u201346. Syngress (2017). https:\/\/doi.org\/10.1016\/B978-0-12-809316-0.00005-1"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:48:22Z","timestamp":1662338902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}