{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:28:37Z","timestamp":1743118117437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_25","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"263-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Data Quality Assessment Model and Its Application to Cybersecurity Data Sources"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5610-0153","authenticated-orcid":false,"given":"Noem\u00ed","family":"DeCastro-Garc\u00eda","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"25_CR1","unstructured":"ISO 25000 software product quality. \nhttps:\/\/iso25000.com\/index.php\/en\/iso-25000-standards\n\n. Accessed 29 Apr 2020"},{"key":"25_CR2","unstructured":"ISO\/IEC 25012 quality of data product. \nhttps:\/\/iso25000.com\/index.php\/en\/iso-25000-standards\/iso-25012\n\n. Accessed 29 Apr 2020"},{"key":"25_CR3","unstructured":"Riasc data quality assessment tool. \nhttps:\/\/github.com\/amunc\/DataQuality\n\n. Accessed 29 Apr 2020"},{"key":"25_CR4","unstructured":"ISO\/IEC 25012 - software product quality requirements and evaluation (square) \u2013 data quality model, International Organization for Standardization (2008)"},{"key":"25_CR5","unstructured":"Askham, N., Cook, D., Doyle, M., Fereday, H., Gibson, M., Landbeck, U., et al.: The six primary dimension for data quality assessment-defining data quality dimensions. Technical report, DAMA UK (2013)"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5334\/dsj-2015-002","volume":"14","author":"L Cai","year":"2015","unstructured":"Cai, L., Zhu, Y.: The challenges of data quality and data quality assessment in the big data era. Data Sci. J. 14, 1\u201310 (2015)","journal-title":"Data Sci. J."},{"key":"25_CR7","unstructured":"Liu, L., Chi, L.: Evolutional data quality: a theory-specific view. In: ICIQ (2002)"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.future.2015.11.024","volume":"63","author":"J Merino","year":"2016","unstructured":"Merino, J., Caballero, I., Rivas, B., Serrano, M., Piattini, M.: A data quality in use model for big data. Fut. Generation Comput. Syst. 63, 123\u2013130 (2016)","journal-title":"Fut. Generation Comput. Syst."},{"key":"25_CR9","first-page":"211","volume":"45","author":"LL Pipino","year":"2002","unstructured":"Pipino, L.L., Lee, Y.W., Wang, R.Y.: Data quality assessment. ACM Digital Library 45, 211\u2013218 (2002)","journal-title":"ACM Digital Library"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Piprani, B., Ernst, D.: A model for data quality assessment. In: OTM Workshops (2008)","DOI":"10.1007\/978-3-540-88875-8_99"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/253769.253804","volume":"40","author":"D Strong","year":"2002","unstructured":"Strong, D., Lee, Y., Wang, R.: Data quality in context. Commun. ACM 40, 103\u2013110 (2002)","journal-title":"Commun. ACM"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:12:08Z","timestamp":1599477128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}