{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:30:46Z","timestamp":1726043446284},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030304423"},{"type":"electronic","value":"9783030304430"}],"license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-30443-0_24","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T06:13:03Z","timestamp":1567577583000},"page":"262-275","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security of Enterprise Information Resources in Cyberspace"],"prefix":"10.1007","author":[{"given":"Aldona","family":"Dere\u0144","sequence":"first","affiliation":[]},{"given":"Danuta","family":"Seretna-Sa\u0142amaj","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Skonieczny","sequence":"additional","affiliation":[]},{"given":"Zofia","family":"Kondracka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1057\/palgrave.crr.1550012","volume":"9","author":"ML Barnett","year":"2006","unstructured":"Barnett, M.L., Jermier, J.M., Lafferty, B.A.: Corporate reputation: the definitional landscape. Corp. Reput. Rev. 9(1), 26\u201338 (2006)","journal-title":"Corp. Reput. Rev."},{"key":"24_CR2","unstructured":"Cavelty-Dunn, M.: Cyber-Security and Threat Politics. US Efforts to Secure the Information Age, London (2008)"},{"issue":"2","key":"24_CR3","doi-asserted-by":"crossref","first-page":"103","DOI":"10.33119\/KSzPP.2016.2.5","volume":"10","author":"Z Chmielewski","year":"2016","unstructured":"Chmielewski, Z.: Polityka publiczna w zakresie ochrony cyberprzestrzeni w UE i pa\u0144stwach cz\u0142onkowskich. Studia z Polityki Publicznej 10(2), 103\u2013128 (2016)","journal-title":"Studia z Polityki Publicznej"},{"key":"24_CR4","unstructured":"Department of Defense Dictionary of Military and Associated Terms. https:\/\/fas.org\/irp\/doddir\/dod\/jp1_02.pdf . Accessed 1 Apr 2019"},{"key":"24_CR5","unstructured":"Dyer, J., Gregersen, H., Christensen, C.M.: DNA innowatora. ICAN Institute Warszawa (2012)"},{"key":"24_CR6","unstructured":"Gibson, W.: Neuromancer, Katowice, Wyd. Ksi\u0105\u017cnica (2009). (t\u0142um. P. Cholewa)"},{"key":"24_CR7","unstructured":"Gwo\u017adziewicz, S., Tomaszycki, K.: Prawne i spo\u0142eczne aspekty cyberbezpiecze\u0144stwa, Warszawa (2017). (Mi\u0119dzynarodowy Instytut Innowacji\u2009\u00ab\u2009Nauka \u2013 Edukacja \u2013 Rozw\u00f3j\u2009\u00bb\u2009w Warszawie 2017)"},{"key":"24_CR8","unstructured":"Kowalewski, J., Kowalewski, M.: Zagro\u017cenia informacji w cyberprzestrzeni, Cyberterroryzm, Oficyna Wydawnicza PW, Warszawa (2017)"},{"key":"24_CR9","unstructured":"Koziej, S.: Bezpiecze\u0144stwo: istota, podstawowe kategorie i historyczna ewolucja, Biuro Bezpiecze\u0144stwa Narodowego, Warszawa (2011)"},{"key":"24_CR10","unstructured":"Madej, M., Terlikowski, M.: Bezpiecze\u0144stwo teleinformatyczne pa\u0144stwa, Warszawa (2009)"},{"key":"24_CR11","unstructured":"Meyer B.: Informacja w procesie obs\u0142ugi ruchu turystycznego. Ekonomiczne Problemy Turystyki (7) (2006)"},{"key":"24_CR12","volume-title":"Elementy teorii system\u00f3w i cybernetyki","author":"S Mynarski","year":"1979","unstructured":"Mynarski, S.: Elementy teorii system\u00f3w i cybernetyki. PWE, Warszawa (1979)"},{"key":"24_CR13","unstructured":"Strategia Cyberbezpiecze\u0144stwa RP na lata 2017\u20132022 (Cybersecurity Strategy of the Republic of Poland for 2017\u20132022). https:\/\/www.gsmservice.pl\/19333,Strategia_Cyberbezpieczenstwa_RP_na_lata_2017__2022news.html . Accessed 11 May 2019"},{"key":"24_CR14","unstructured":"Tarkowski, A.: Internet jako technologia i wyobra\u017cenie. Co robimy z technologi\u0105, co technologia robi z nami? In: Marody, M., Nowak, A. (eds.) Spo\u0142eczna przestrze\u0144 Internetu. Wydawnictwo Szko\u0142y Wy\u017cszej Psychologii Spo\u0142ecznej \u201cAcademica\u201d, Warszawa (2006)"},{"key":"24_CR15","unstructured":"W\u00f3jcik, A.: System Zarz\u0105dzania Bezpiecze\u0144stwem Informacji zgodny z ISO\/IEC 27001 (cz. 1). https:\/\/www.zabezpieczenia.com.pl\/ochrona-informacji\/system-zarz%C4%85dzaniabezpiecze%C5%84stwem-informacji-zgodny-z-isoiec-27001-cz-1 . Accessed 14 May 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30443-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T03:08:27Z","timestamp":1610939307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30443-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"ISBN":["9783030304423","9783030304430"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30443-0_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Architecture and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wroc\u0142aw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isat.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}