{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:43:02Z","timestamp":1742960582269,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_29","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"306-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The Order of the Factors DOES Alter the Product: Cyber Resilience Policies\u2019 Implementation Order"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2514-0312","authenticated-orcid":false,"given":"Juan Francisco","family":"Carias","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2992-3429","authenticated-orcid":false,"given":"Marcos R. S.","family":"Borges","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1721-0624","authenticated-orcid":false,"given":"Leire","family":"Labaka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9958-9799","authenticated-orcid":false,"given":"Saioa","family":"Arrizabalaga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9307-9787","authenticated-orcid":false,"given":"Josune","family":"Hernantes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"29_CR1","unstructured":"Allianz Global Corporate & Speciality: Allianz Risk Barometer: Top Business Risks for 2019, Munich, Germany (2019)"},{"key":"29_CR2","unstructured":"Bissel, K., Ponemon, L.: Ninth Annual Cost of Cybercrime Study Unlocking the Value of Improved Cybersecurity Protection (2019)"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSP.2014.102","volume":"12","author":"B Schneier","year":"2014","unstructured":"Schneier, B.: The future of incident response. IEEE Secur. Priv. 12, 96\u201397 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"29_CR4","unstructured":"Deutscher, S.A., Bohmayr, W., Asen, A.: Building a Cyberresilient Organization, Boston, MA, USA (2017)"},{"key":"29_CR5","doi-asserted-by":"publisher","unstructured":"Goldman, H., McQuaid, R., Picciotto, J.: Cyber resilience for mission assurance. In: 2011 International Conference on Technologies for Homeland Security, HST 2011, pp. 236\u2013241 (2011). \nhttps:\/\/doi.org\/10.1109\/THS.2011.6107877","DOI":"10.1109\/THS.2011.6107877"},{"key":"29_CR6","doi-asserted-by":"publisher","unstructured":"Bj\u00f6rk, F., Henkel, M., Stirna, J., Zdravkovic, J.: Cyber Resilience \u2013 Fundamentals for a Definition. Advances in Intelligent Systems and Computing, vol. 353, pp. III\u2013IV (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-16486-1","DOI":"10.1007\/978-3-319-16486-1"},{"key":"29_CR7","unstructured":"World Economic Forum: The Global Risks Report 2018, Geneva, Switzerland, 13th edn. (2018)"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"138","DOI":"10.3390\/s19010138","volume":"19","author":"J Car\u00edas","year":"2019","unstructured":"Car\u00edas, J., Labaka, L., Sarriegi, J., Hernantes, J.: Defining a cyber resilience investment strategy in an industrial Internet of Things context. Sensors 19, 138 (2019). \nhttps:\/\/doi.org\/10.3390\/s19010138","journal-title":"Sensors"},{"key":"29_CR9","unstructured":"Center for Internet Security (CIS): CIS Controls V 7.1, NY, USA (2019)"},{"key":"29_CR10","unstructured":"Carnegie Mellon University (2016) Cyber Resilience Review (CRR). Department of Home Security. \nhttps:\/\/www.us-cert.gov\/ccubedvp\/assessments\n\n. Accessed 6 Feb 2018"},{"key":"29_CR11","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, pp 1:1\u20131:15 (2008)"},{"key":"29_CR12","unstructured":"Millaire, P., Sathe, A., Thielen, P.: What All Cyber Criminals Know: Small & Midsize Businesses With Little or No Cybersecurity Are Ideal Targets, NJ, USA (2017)"},{"key":"29_CR13","unstructured":"Huelsman, T., Peasley, S.: Cyber risk in advanced manufacturing, VA, USA (2016)"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.chb.2015.01.039","volume":"48","author":"N Ben-Asher","year":"2015","unstructured":"Ben-Asher, N., Gonzalez, C.: Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 48, 51\u201361 (2015). \nhttps:\/\/doi.org\/10.1016\/j.chb.2015.01.039","journal-title":"Comput. Hum. Behav."},{"key":"29_CR15","unstructured":"NIST: Framework for Improving Critical Infrastructure Cybersecurity v 1.1, Gaithersburg, MD, USA (2018)"},{"key":"29_CR16","unstructured":"MITRE: Cyber Resiliency Metrics, VA, USA (2012)"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A Hevner","year":"2004","unstructured":"Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28, 75 (2004). \nhttps:\/\/doi.org\/10.2307\/25148625","journal-title":"MIS Q."},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24, 45\u201377 (2007)","journal-title":"J. Manag. Inf. Syst."},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Caralli, R.A., Stevens, J.F., Young, L.R., Wilson, W.R.: Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process, PA, USA (2007)","DOI":"10.21236\/ADA470450"},{"key":"29_CR20","unstructured":"International Organization for Standarization (ISO): Information technology \u2014 Security techniques \u2014 Code of practice for information security management Technologies (ISO 27002:2005), Geneva, Switzerland (2005)"},{"key":"29_CR21","unstructured":"Caralli, R.A., Allen, J.H., White, D.W., et al.: CERT Resilience Management Model, Version 1 2, Pittsburgh, PA (2016)"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:13:05Z","timestamp":1599477185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}