{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:56Z","timestamp":1771661096833,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_55","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"818-832","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Effectiveness and Adoption of NIST Managerial Practices for Cyber Resilience in Italy"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Annarelli","sequence":"first","affiliation":[]},{"given":"Serena","family":"Clemente","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Nonino","sequence":"additional","affiliation":[]},{"given":"Giulia","family":"Palombi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","unstructured":"Bodeau, D., Graubart, R.: Cyber resiliency engineering framework. MTR 110237, MITRE Corporation (2011)"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Bednar, P. M., Welch, C.: Socio-technical perspectives on smart working: creating meaningful and sustainable systems. Inf. Syst. Front. 1\u201318 (2019)","DOI":"10.1007\/s10796-019-09921-1"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013)","DOI":"10.1016\/j.cose.2013.04.004"},{"issue":"18","key":"55_CR4","first-page":"10108","volume":"47","author":"I Linkov","year":"2013","unstructured":"Linkov, I., et al.: Measurable resilience for actionable policy. Environ. Sci. Technol. 47(18), 10108\u201310110 (2013)","journal-title":"Environ. Sci. Technol."},{"issue":"4","key":"55_CR5","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1111\/j.1539-6924.2009.01216.x","volume":"29","author":"YY Haimes","year":"2009","unstructured":"Haimes, Y.Y.: On the definition of resilience in systems. Risk Anal. Int. J. 29(4), 498\u2013501 (2009)","journal-title":"Risk Anal. Int. J."},{"issue":"9","key":"55_CR6","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MC.2013.448","volume":"47","author":"ZA Collier","year":"2014","unstructured":"Collier, Z.A., DiMase, D., Walters, S., Tehranipoor, M.M., Lambert, J.H., Linkov, I.: Cybersecurity standards: managing risk and creating resilience. Computer 47(9), 70\u201376 (2014)","journal-title":"Computer"},{"key":"55_CR7","unstructured":"National Institute of Standards and Technology NIST: Framework for Improving Critical Infrastructure Cybersecurity (2018)"},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"106829","DOI":"10.1016\/j.cie.2020.106829","volume":"149","author":"A Annarelli","year":"2020","unstructured":"Annarelli, A., Nonino, F., Palombi, G.: Understanding the management of cyber resilient systems. Comput. Indust. Eng. 149, 106829 (2020)","journal-title":"Comput. Indust. Eng."},{"issue":"1","key":"55_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1111\/j.1539-6924.1981.tb01350.x","volume":"1","author":"S Kaplan","year":"1981","unstructured":"Kaplan, S., Garrick, B.J.: On the quantitative definition of risk. Risk Anal. 1(1), 11\u201327 (1981)","journal-title":"Risk Anal."},{"key":"55_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cie.2014.04.019","volume":"74","author":"U Soni","year":"2014","unstructured":"Soni, U., Jain, V., Kumar, S.: Measuring supply chain resilience using a deterministic modeling approach. Comput. Ind. Eng. 74, 11\u201325 (2014)","journal-title":"Comput. Ind. Eng."},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"McCormac, A., Calic, D., Parsons, K., Butavicius, M., Pattinson, M., Lillie, M.: The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. (2018)","DOI":"10.1108\/ICS-03-2018-0032"},{"key":"55_CR12","unstructured":"Project Management Institute PMBOK: A guide To The Project Management Body of Knowledge (6th Edn.). Project Management Institute, Newtown Square, PA (2017)"},{"key":"55_CR13","doi-asserted-by":"crossref","unstructured":"Linkov, I., Trump, B.D.: The Science And Practice of Resilience. Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-04565-4"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Rogers, R., Apeh, E., Richardson, C.J.: Resilience of the Internet of Things (IoT) from an information assurance (IA) perspective. In: 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA), pp. 110\u2013115 (2016)","DOI":"10.1109\/SKIMA.2016.7916206"},{"key":"55_CR15","unstructured":"National Academies (US): Disaster resilience: A national imperative. National Academies Press (2012)"},{"issue":"4","key":"55_CR16","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10669-013-9485-y","volume":"33","author":"I Linkov","year":"2013","unstructured":"Linkov, I., Eisenberg, D.A., Plourde, K., Seager, T.P., Allen, J., Kott, A.: Resilience metrics for cyber systems. Environ. Syst. Decis. 33(4), 471\u2013476 (2013)","journal-title":"Environ. Syst. Decis."},{"key":"55_CR17","unstructured":"Yin, R.K.: Case Study Research: Design And Methods. Newbury Park, CA (2nd edn.) (1984). Sage: Applied Social Research Method Series"},{"key":"55_CR18","unstructured":"Schramm, W.: Notes on Case Studies of Instructional Media Projects (1971)"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Armenia, A., Angelini, A., Nonino, F., Palombi, G., Schlitzer, M.F.: A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs. Decision Support Systems. 147, 113580 (2021). https:\/\/doi.org\/10.1016\/j.dss.2021.113580","DOI":"10.1016\/j.dss.2021.113580"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:37Z","timestamp":1771658077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_55","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}