{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:08:25Z","timestamp":1770682105318,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031179945","type":"print"},{"value":"9783031179952","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17995-2_26","type":"book-chapter","created":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T23:03:46Z","timestamp":1665356626000},"page":"365-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Ontology of\u00a0Security from\u00a0a\u00a0Risk Treatment Perspective"],"prefix":"10.1007","author":[{"given":"\u00cdtalo","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Tiago Prince","family":"Sales","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Baratella","sequence":"additional","affiliation":[]},{"given":"Mattia","family":"Fumagalli","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Guizzardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Adach, M., et al.: A combined security ontology based on the unified foundational ontology. In: International Conference on Semantic Computing, pp. 187\u2013194 (2022)","DOI":"10.1109\/ICSC52841.2022.00039"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-33246-4_1","volume-title":"On the Move to Meaningful Internet Systems: OTM 2019 Conferences","author":"G Amaral","year":"2019","unstructured":"Amaral, G., Sales, T.P., Guizzardi, G., Porello, D.: Towards a reference ontology of trust. In: Panetto, H., et al. (eds.) OTM 2019. LNCS, vol. 11877, pp. 3\u201321. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33246-4_1"},{"key":"26_CR3","unstructured":"Band, I., Engelsman, W., Feltus, C., Paredes, S.G., Diligens, D.: Modeling enterprise risk management and security with the ArchiMate language (2015)"},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Baratella, R., Fumagalli, M., Oliveira, \u00cd., Guizzardi, G.: Understanding and modeling prevention. In: Guizzardi, R., Ralyte, J., Franch, X. (eds.) Research Challenges in Information Science. RCIS 2022. LNBIP, vol. 446, pp. 389\u2013405. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05760-1_23","DOI":"10.1007\/978-3-031-05760-1_23"},{"key":"26_CR5","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-42523-4_2","volume-title":"International Security Management","author":"B van den Berg","year":"2021","unstructured":"van den Berg, B., Hutten, P., Prins, R.: Security and safety: an integrative perspective. In: Jacobs, G., Suojanen, I., Horton, K.E., Bayerl, P.S. (eds.) International Security Management. ASTSA, pp. 13\u201327. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-42523-4_2"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Casola, V., et al.: A first step towards an ISO-based information security domain ontology. In: International Conference on Enabling Technologies, pp. 334\u2013339 (2019)","DOI":"10.1109\/WETICE.2019.00075"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Chen, B., et al.: Research on ontology-based network security knowledge map. In: International Conference on Cloud Computing, Big Data and Blockchain, pp. 1\u20137 (2018)","DOI":"10.1109\/ICCBB.2018.8756379"},{"issue":"5","key":"26_CR8","doi-asserted-by":"publisher","first-page":"549","DOI":"10.3897\/jucs.2020.030","volume":"26","author":"S Debbech","year":"2020","unstructured":"Debbech, S., et al.: An ontological approach to support dysfunctional analysis for railway systems design. J. Univers. Comput. Sci. 26(5), 549\u2013582 (2020)","journal-title":"J. Univers. Comput. Sci."},{"issue":"03","key":"26_CR9","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MSECP.2003.1203222","volume":"1","author":"M Donner","year":"2003","unstructured":"Donner, M.: Toward a security ontology. IEEE Secur. Priv. 1(03), 6\u20137 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Duarte, B.B., de Almeida Falbo, R., Guizzardi, G., Guizzardi, R., Souza, V.E.S.: An ontological analysis of software system anomalies and their associated risks. Data Knowl. Eng. 134, 101892 (2021)","DOI":"10.1016\/j.datak.2021.101892"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/11961635_17","volume-title":"Information Systems Security","author":"A Ekelhart","year":"2006","unstructured":"Ekelhart, A., Fenz, S., Klemen, M.D., Weippl, E.R.: Security ontology: simulating threats to corporate assets. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 249\u2013259. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11961635_17"},{"key":"26_CR12","unstructured":"Guizzardi, G.: Ontological foundations for structural conceptual models (2005)"},{"key":"26_CR13","unstructured":"Guizzardi, G., et al.: Grounding software domain ontologies in the unified foundational ontology (UFO): The case of the ODE software process ontology. In: Ibero-American Conference on Software Engineering, pp. 127\u2013140 (2008)"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-41924-9_27","volume-title":"Conceptual Modeling","author":"G Guizzardi","year":"2013","unstructured":"Guizzardi, G., Wagner, G., de Almeida Falbo, R., Guizzardi, R.S.S., Almeida, J.P.A.: Towards ontological foundations for the conceptual modeling of events. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 327\u2013341. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41924-9_27"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-030-89022-3_28","volume-title":"Conceptual Modeling","author":"G Guizzardi","year":"2021","unstructured":"Guizzardi, G., Bernasconi, A., Pastor, O., Storey, V.C.: Ontological unpacking as explanation: the case of the viral conceptual model. In: Ghose, A., Horkoff, J., Silva Souza, V.E., Parsons, J., Evermann, J. (eds.) ER 2021. LNCS, vol. 13011, pp. 356\u2013366. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89022-3_28"},{"key":"26_CR16","unstructured":"ISO: ISO 31000:2018 - Risk management - Guidelines (2018)"},{"issue":"1\u20132","key":"26_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1162\/dint_r_00024","volume":"2","author":"A Jacobsen","year":"2020","unstructured":"Jacobsen, A., et al.: FAIR principles: interpretations and implementation considerations. Data Intell. 2(1\u20132), 10\u201329 (2020)","journal-title":"Data Intell."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Katsikas, S.K.: Risk management. In: Vacca, J.R. (ed.) Computer and Information Security Handbook, pp. 507\u2013527. Morgan Kaufmann, 3 edn. (2013)","DOI":"10.1016\/B978-0-12-803843-7.00034-X"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Kjell\u00e9n, U.: Prevention of Accidents Through Experience Feedback. CRC Press, Boca Raton (2000)","DOI":"10.1201\/b17206"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The Coras Approach. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"26_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-642-22056-2_64","volume-title":"Advanced Information Systems Engineering Workshops","author":"F Massacci","year":"2011","unstructured":"Massacci, F., Mylopoulos, J., Paci, F., Tun, T.T., Yu, Y.: An extended ontology for security requirements. In: Salinesi, C., Pastor, O. (eds.) CAiSE 2011. LNBIP, vol. 83, pp. 622\u2013636. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22056-2_64"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Oliveira, \u00cd., et al.: How FAIR are security core ontologies? A systematic mapping study. In: Research Challenges in Information Science, pp. 107\u2013123 (2021)","DOI":"10.1007\/978-3-030-75018-3_7"},{"key":"26_CR23","first-page":"26","volume":"2015","author":"A Oltramari","year":"2015","unstructured":"Oltramari, A., et al.: Towards a human factors ontology for cyber security. Semant. Technol. Intell. Def. Secur. 2015, 26\u201333 (2015)","journal-title":"Semant. Technol. Intell. Def. Secur."},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-00847-5_11","volume-title":"Conceptual Modeling","author":"TP Sales","year":"2018","unstructured":"Sales, T.P., Bai\u00e3o, F., Guizzardi, G., Almeida, J.P.A., Guarino, N., Mylopoulos, J.: The common ontology of value and risk. In: Trujillo, J.C., et al. (eds.) ER 2018. LNCS, vol. 11157, pp. 121\u2013135. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00847-5_11"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Sales, T.P., et al.: Ontological analysis and redesign of risk modeling in ArchiMate. In: International Enterprise Distributed Object Computing Conference, pp. 154\u2013163 (2018)","DOI":"10.1109\/EDOC.2018.00028"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-030-21290-2_15","volume-title":"Advanced Information Systems Engineering","author":"TP Sales","year":"2019","unstructured":"Sales, T.P., Roelens, B., Poels, G., Guizzardi, G., Guarino, N., Mylopoulos, J.: A pattern language for value modeling in ArchiMate. In: Giorgini, P., Weber, B. (eds.) CAiSE 2019. LNCS, vol. 11483, pp. 230\u2013245. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21290-2_15"},{"issue":"1","key":"26_CR27","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1002\/prs.11576","volume":"33","author":"YE Saud","year":"2014","unstructured":"Saud, Y.E., Israni, K., Goddard, J.: Bow-tie diagrams in downstream hazard identification and risk assessment. Process Saf. Prog. 33(1), 26\u201335 (2014)","journal-title":"Process Saf. Prog."},{"issue":"3\u20134","key":"26_CR28","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3233\/AO-150154","volume":"10","author":"M Verdonck","year":"2015","unstructured":"Verdonck, M., et al.: Ontology-driven conceptual modeling: a systematic literature mapping and review. Appl. Ontol. 10(3\u20134), 197\u2013227 (2015)","journal-title":"Appl. Ontol."},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, J., et al.: An ontological approach to identify the causes of hazards for safety-critical systems. In: System Reliability and Safety, pp. 405\u2013413 (2017)","DOI":"10.1109\/ICSRS.2017.8272856"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17995-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T12:48:29Z","timestamp":1728132509000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17995-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031179945","9783031179952"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17995-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/er2022web.github.io\/ER2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place in a virtual mode.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}