{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:16:40Z","timestamp":1754162200211,"version":"3.41.2"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030814687"},{"type":"electronic","value":"9783030814694"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81469-4_14","type":"book-chapter","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T01:02:43Z","timestamp":1627606963000},"page":"170-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyber-Security in Digital Metering Value Chain for Mountain Landslide Warning"],"prefix":"10.1007","author":[{"given":"Mari","family":"Aarland","sequence":"first","affiliation":[]},{"given":"Jaziar","family":"Radianti","sequence":"additional","affiliation":[]},{"given":"Terje","family":"Gj\u00f8s\u00e6ter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,31]]},"reference":[{"key":"14_CR1","unstructured":"European Commission: Evaluation of council directive 2008\/114 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. European Commission, Brussel (2008)"},{"key":"14_CR2","volume-title":"Comparing Cyber Security","author":"L Gjesvik","year":"2019","unstructured":"Gjesvik, L.: Comparing Cyber Security. Norwegian Insitute of International Affairs, Oslo (2019)"},{"key":"14_CR3","unstructured":"Proactima: Kartlegging av bruk av tingenes internett (IoT\/IIoT) i norsk kraftforsyning, Nr.2\/2020, Norges vassdrag- og energidirektorat, Oslo (2020)"},{"key":"14_CR4","unstructured":"NVE: Om NVE, December 2020. https:\/\/www.nve.no\/om-nve\/?ref=mainmenu"},{"key":"14_CR5","unstructured":"DSB: Risikostyring i digitale verdikjeder, Direktoratet for samfunnssikkerhet og beredskap, T\u00f8nsberg, (2020)"},{"key":"14_CR6","unstructured":"NVE: \u00c5knes, January 2020. https:\/\/www.nve.no\/flaum-og-skred\/fjellskredovervaking\/kontinuerligovervakede-fjellpartier\/aknes\/"},{"key":"14_CR7","unstructured":"NVE: Fjellskred - overv\u00e5king og beredskap, Nr. 5\/2017, Norges vassdrag- og energidirektorat, Oslo, (2017)"},{"key":"14_CR8","unstructured":"NOU 2015:13: Digital s\u00e5rbarhet - sikkert samfunn, Regjeringen, Oslo (2015)"},{"key":"14_CR9","series-title":"Autonomic Systems","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-7643-8899-7_11","volume-title":"Economic models and algorithms for distributed systems","author":"AB Mohammed","year":"2009","unstructured":"Mohammed, A.B., Altmann, J., Hwang, J.: Cloud computing value chains: understanding businesses and value creation in the cloud. In: Neumann, D., Baker, M., Altmann, J., Rana, O. (eds.) Economic models and algorithms for distributed systems. AS, pp. 187\u2013208. Birkh\u00e4user Basel, Basel (2009). https:\/\/doi.org\/10.1007\/978-3-7643-8899-7_11"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1504\/IJVCM.2017.082685","volume":"8","author":"TM Simatupang","year":"2017","unstructured":"Simatupang, T.M., Pioonrungroj, P., William, S.: The emergence of value chain thinking. Int. J. Value Chain Manage. 8(1), 40\u201357 (2017)","journal-title":"Int. J. Value Chain Manage."},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-74430-6_4","volume-title":"Grid Economics and Business Models","author":"K Stanoevska-Slabeva","year":"2007","unstructured":"Stanoevska-Slabeva, K., Talamanca, C.F., Thanos, G.A., Zsigri, C.: Development of a generic value chain for the grid industry. In: Veit, D.J., Altmann, J. (eds.) GECON 2007. LNCS, vol. 4685, pp. 44\u201357. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74430-6_4"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Giannakis, M., Spanaki, K., Dubey, R.: A cloud-based supply chain management system: effects on supply chain responsiveness. J. Enterp. Inf. Manage. (2019)","DOI":"10.1108\/JEIM-05-2018-0106"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.compind.2018.02.010","volume":"97","author":"G B\u00fcy\u00fck\u00f6zkan","year":"2018","unstructured":"B\u00fcy\u00fck\u00f6zkan, G., G\u00f6\u00e7er, F.: Digital supply chain: literature review and a proposed framework for future research. Comput. Ind. 97, 157\u2013177 (2018)","journal-title":"Comput. Ind."},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/16258312.2020.1816361","volume":"21","author":"B Ageron","year":"2020","unstructured":"Ageron, B., Bentahar, O., Gunasekaran, A.: Digital supply chain: challenges and future directions. Supply Chain Forum Int. J. 21(3), 133\u2013138 (2020)","journal-title":"Supply Chain Forum Int. J."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.segan.2017.08.001","volume":"15","author":"M Pau","year":"2018","unstructured":"Pau, M., et al.: A cloud-based smart metering infrastructure for distribution grid services and automation. Sustain. Energy Grids Netw. 15, 14\u201325 (2018)","journal-title":"Sustain. Energy Grids Netw."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Mylrea, M., Gourisetti, S. N. G.: Blockchain for supply chain cybersecurity, optimization and compliance. In: Resilience Week (RWS), pp. 70\u201376 (2018)","DOI":"10.1109\/RWEEK.2018.8473517"},{"key":"14_CR17","unstructured":"NSM: Risiko 2020, Nasjonal sikkerhetsmyndighet, Oslo (2020)"},{"key":"14_CR18","unstructured":"NorSIS: Nordmenn og digital sikkerhetskultur, Norsk senter for informasjonssikring, Gj\u00f8vik (2019)"},{"key":"14_CR19","unstructured":"Romsenter, N.: Vurdering av s\u00e5rbarhet ved bruk av globale satellittnavigasjonssystemer i kritisk infrastruktur, Norsk Romsenter, Oslo (2013)"},{"key":"14_CR20","unstructured":"NOU 2006:6: N\u00e5r sikkerheten er viktigst, Regjeringen, Oslo (2006)"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1126\/science.3563507","volume":"236","author":"P Slovic","year":"2014","unstructured":"Slovic, P.: The perception of risk. Science 236, 280\u2013285 (2014)","journal-title":"Science"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Josephson, J.R., Bharathan, V.: An abductive framework for level one information fusion. In: Information Fusion, Italy (2006)","DOI":"10.1109\/ICIF.2006.301701"},{"key":"14_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8562-0","volume-title":"Abduction, Reason and Science: Processes of Discovery and Explanation","author":"L Magnani","year":"2001","unstructured":"Magnani, L.: Abduction, Reason and Science: Processes of Discovery and Explanation. Springer, New York (2001). https:\/\/doi.org\/10.1007\/978-1-4419-8562-0"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81469-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T22:03:00Z","timestamp":1753826580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81469-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030814687","9783030814694"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81469-4_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"31 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sofia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bulgaria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itdrr.unwe.bg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}