{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:02Z","timestamp":1767339302609,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031048258"},{"type":"electronic","value":"9783031048265"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04826-5_19","type":"book-chapter","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T04:05:42Z","timestamp":1652155542000},"page":"192-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Managing Uncertainty and Complexity: Emerging Challenges in Cyber Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6883-3461","authenticated-orcid":false,"given":"Jeimy J.","family":"Cano M.","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"key":"19_CR1","unstructured":"Interpol. National cybercrime strategy guidebook. https:\/\/www.interpol.int\/en\/content\/download\/16455\/file\/National%20Cybercrime%20Strategy%20Guidebook.pdf. Accessed 15 Nov 2021"},{"key":"19_CR2","doi-asserted-by":"publisher","unstructured":"Cano, J.: La \u201cfalsa sensaci\u00f3n de seguridad\u201d. El reto de incomodar las certezas de los est\u00e1ndares y tratar de \u201cdomesticar\u201d los inciertos. Rev. Sistemas. Asoc. Colomb. Ingen. Sistem. 159, 82\u201395 (2021). https:\/\/doi.org\/10.29236\/sistemas.n159a6","DOI":"10.29236\/sistemas.n159a6"},{"key":"19_CR3","unstructured":"Rosa, E., Renn, O., McCright, A.: The risk society revisited. In: Social Theory and Governance. Temple University Press, Philadelphia (2014)"},{"key":"19_CR4","unstructured":"Espejo, R., Reyes, A.: Sistemas organizacionales. El Manejo de la Complejidad con el Modelo del Sistema Viable. Universidad de los Andes-Universidad de Ibagu\u00e9, Bogot\u00e1 (2016)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Perrow, C.: Normal accidents. In: Living with High-Risk Technologies. Princeton University Press, Princeton (1999)","DOI":"10.1515\/9781400828494"},{"issue":"1","key":"19_CR6","first-page":"476","volume":"43","author":"M Sokovic","year":"2010","unstructured":"Sokovic, M., Pavletic, D., Kern Pipan, K.: Quality improvement methodologies \u2013 PDCA cycle, RADAR matrix, DMAIC and DFSS. J. Achiev. Mater. Manuf. Eng. 43(1), 476\u2013483 (2010)","journal-title":"J. Achiev. Mater. Manuf. Eng."},{"key":"19_CR7","unstructured":"Briggs, B., Buchholz, S., Sharma, S.K.: Macro technology forces. A second look at the pillars of the past, current, and future innovation. Deloitte Insights (2020). https:\/\/www2.deloitte.com\/us\/en\/insights\/focus\/tech-trends\/2020\/macro-technology-trends.html. Accessed 15 Nov 2021"},{"key":"19_CR8","unstructured":"Sieber, S., Zamora, J.: The Cyber security Challenge in a High Digital Density World. European Business Review. November (2018). https:\/\/www.europeanbusinessreview.com\/the-cybersecurity-challenge-in-a-high-digital-density-world\/. Accessed 15 Nov 2021"},{"key":"19_CR9","unstructured":"KPMG. Vientos de cambio. La gesti\u00f3n de riesgos en el mundo digital (2019). https:\/\/www.tendencias.kpmg.es\/wp-content\/uploads\/2019\/04\/Informe_Riesgos_Abril2019.pdf. Accessed 15 Nov 2021"},{"key":"19_CR10","unstructured":"Cano, J.: The AREM window: a strategy to anticipate risk and threats to enterprise cyber security. ISACA J. 5 (2017). https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2017\/volume-5\/the-arem-window-a-strategy-to-anticipate-risk-and-threats-to-enterprise-cyber-security. Accessed 15 Nov 2021"},{"key":"19_CR11","unstructured":"Menon, G., Kyung, E.: When More Information Leads to More Uncertainty. Harvard Business Review (2020). https:\/\/hbr.org\/2020\/06\/when-more-information-leads-to-more-uncertainty. Accessed 15 Nov 2021"},{"key":"19_CR12","unstructured":"Watzlawick, P., Krieg, P. (comps.): El ojo del observador. Contribuciones al Constructivismo. Homenaje a Heinz Von Foerster. Gedisa, Barcelona (1995)"},{"key":"19_CR13","unstructured":"Ashby, W.R.: Introduction to cybernetics. In: Second Impression. Chapman & Hall, London (1957). http:\/\/pcp.vub.ac.be\/books\/IntroCyb.pdf. Accessed 15 Nov 2021"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Meyer, R., Kunreuther, H.: The ostrich paradox. In: Why We Underprapare for Disasters. Wharton Digital Press, Philadelphia (2017)","DOI":"10.2307\/j.ctv2hdrfz6"},{"key":"19_CR15","doi-asserted-by":"publisher","unstructured":"Schoemaker, P.J.H.: Scenario Planning. In: Augier, M., Teece, D. (eds.) The Palgrave Encyclopedia of Strategic Management. Palgrave Macmillan, London (2016). https:\/\/doi.org\/10.1057\/978-1-349-94848-2_652-1","DOI":"10.1057\/978-1-349-94848-2_652-1"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Hoehn, A., et al.: Strategic choices for a turbulent world. In: Pursuit of Security and Opportunity. Rand Corporation. Research Report (2017). https:\/\/doi.org\/10.7249\/RR1631","DOI":"10.7249\/RR1631"},{"key":"19_CR17","unstructured":"Cano, J.: Modelo ADAM. Una estrategia conceptual para repensar los ataques digitales y actualizar las estrategias de seguridad y control vigente. Global Strategy. Global Report No. 22 (2021). https:\/\/global-strategy.org\/modelo-adam-una-estrategia-conceptual-para-repensar-los-ataques-digitales-y-actualizar-las-estrategias-de-seguridad-y-control-vigente\/. Accessed 15 Nov 2021"},{"key":"19_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-16486-1_31","volume-title":"New Contributions in Information Systems and Technologies","author":"F Bj\u00f6rck","year":"2015","unstructured":"Bj\u00f6rck, F., Henkel, M., Stirna, J., Zdravkovic, J.: Cyber resilience \u2013 fundamentals for a definition. In: Rocha, A., Correia, A.M., Costanzo, S., Reis, L.P. (eds.) New Contributions in Information Systems and Technologies. AISC, vol. 353, pp. 311\u2013316. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16486-1_31"},{"key":"19_CR19","unstructured":"Mart\u00ednez, J.: Aprender del futuro. Newsletter No. 179 (2021). http:\/\/www.javiermartinezaldanondo.com\/n179-aprender-del-futuro\/. Accessed 15 Nov 2021"},{"key":"19_CR20","unstructured":"Edmondson, A.: The fearless organization. In: Creating Psychological Safety in the Workplace for Learning, Innovation, and Growth. Wiley, Hoboken (2018)"},{"key":"19_CR21","volume-title":"What\u2019s Your Digital Business Model? Six Questions to Help You Build the Next-Generation Enterprise","author":"P Weil","year":"2018","unstructured":"Weil, P., Woerner, S.: What\u2019s Your Digital Business Model? Six Questions to Help You Build the Next-Generation Enterprise. Harvard Business Review Press, Boston (2018)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Day, G., Schoemaker, P.: See soon, act faster. In: How Vigilant Leader Thrive in an Era of Digital Turbulence. MIT Press, Cambridge (2019)","DOI":"10.7551\/mitpress\/11837.001.0001"},{"key":"19_CR23","unstructured":"Taleb, N.: Antifr\u00e1gil. Las Cosas que se Benefician del Desorden. Paidos, Barcelona (2018)"}],"container-title":["Lecture Notes in Networks and Systems","Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04826-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T16:05:33Z","timestamp":1671552333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04826-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031048258","9783031048265"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04826-5_19","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}