{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:10:26Z","timestamp":1743034226263,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031048289"},{"type":"electronic","value":"9783031048296"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04829-6_12","type":"book-chapter","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T04:05:42Z","timestamp":1652155542000},"page":"132-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Participative and\u00a0Collaborative Approach for\u00a0Security Risk Management Modelling in\u00a0the\u00a0Context of\u00a0Essential Services"],"prefix":"10.1007","author":[{"given":"Jocelyn","family":"Aubert","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Cholez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/978-3-642-01347-8_54","volume-title":"Enterprise Information Systems","author":"J Barjis","year":"2009","unstructured":"Barjis, J.: Collaborative, participative and interactive enterprise modeling. In: Filipe, J., Cordeiro, J. (eds.) ICEIS 2009. LNBIP, vol. 24, pp. 651\u2013662. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01347-8_54"},{"key":"12_CR2","unstructured":"European Parliament and of the Council: Directive (eu) 2009\/140 of the European parliament and of the council of 25 November 2009 amending directives 2002\/21\/ec on a common regulatory framework for electronic communications networks and services, 2002\/19\/ec on access to, and interconnection of, electronic communications networks and associated facilities, and 2002\/20\/ec on the authorisation of electronic communications networks and services (2009). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32009L0140"},{"key":"12_CR3","unstructured":"European Parliament and of the Council: Directive (eu) 2016\/1148 of the european parliament and of the council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the union (2016). https:\/\/eur-lex.europa.eu\/legal-content\/GA\/TXT\/?uri=CELEX:32016L1148"},{"key":"12_CR4","unstructured":"France24: Cyber attacks hit two French hospitals in one week. France24 (2021). https:\/\/www.france24.com\/en\/europe\/20210216-cyber-attacks-hit-two-french-hospitals-in-one-week. Accessed 7 Nov 21"},{"key":"12_CR5","unstructured":"International Organization for Standardization and International Electrotechnical Commission: Iso\/iec 27005 information technology \u2013 security techniques \u2013 information security risk management (2018)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Mayer, N., Aubert, J.: A risk management framework for security and integrity of networks and services. J. Risk Res. 24, 1\u201312 (2020)","DOI":"10.1080\/13669877.2020.1779786"},{"key":"12_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-39179-8_2","volume-title":"Systems, Software and Services Process Improvement","author":"N Mayer","year":"2013","unstructured":"Mayer, N., Aubert, J., Cholez, H., Grandry, E.: Sector-based improvement of the information security risk management process in the context of telecommunications regulation. In: McCaffery, F., O\u2019Connor, R.V., Messnarz, R. (eds.) EuroSPI 2013. CCIS, vol. 364, pp. 13\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39179-8_2"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1007\/s10270-018-0661-x","volume":"18","author":"N Mayer","year":"2019","unstructured":"Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E., Wieringa, R.: An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18(3), 2285\u20132312 (2019)","journal-title":"Softw. Syst. Model."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Mayer, N., Sottet, J.S.: Systemic security risks in the telecommunications sector: an approach for security and integrity of networks and services. In: COMPLEXIS, pp. 72\u201379 (2020)","DOI":"10.5220\/0009352200720079"},{"key":"12_CR10","unstructured":"NIS Cooperation Group: Reference document on security measures for operators of essential services, cg publication 01\/2018 (2018). http:\/\/ec.europa.eu\/newsroom\/dae\/document.cfm?doc_id=53643"},{"key":"12_CR11","unstructured":"Poulsen, K., McMillan, R., Evans, M.: A hospital hit by hackers, a baby in distress: the case of the first alleged ransomware death. Wall Street J. (2021). https:\/\/www.wsj.com\/articles\/ransomware-hackers-hospital-first-alleged-death-11633008116. Accessed 7 Nov 21"},{"key":"12_CR12","unstructured":"Sophos: The state of ransomware in healthcare 2021 (2021). https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-in-healthcare-2021-wp.pdf"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-540-72988-4_38","volume-title":"Advanced Information Systems Engineering","author":"J Stirna","year":"2007","unstructured":"Stirna, J., Persson, A., Sandkuhl, K.: Participative enterprise modeling: experiences and recommendations. In: Krogstie, J., Opdahl, A., Sindre, G. (eds.) CAiSE 2007. LNCS, vol. 4495, pp. 546\u2013560. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72988-4_38"},{"key":"12_CR14","unstructured":"The Open Group: ArchiMate 3.1 Specification. Van Haren Publishing, The Netherlands (2020)"}],"container-title":["Lecture Notes in Networks and Systems","Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04829-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T04:18:27Z","timestamp":1652156307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04829-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031048289","9783031048296"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04829-6_12","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}