{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:00:02Z","timestamp":1763665202377,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031330797"},{"type":"electronic","value":"9783031330803"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33080-3_5","type":"book-chapter","created":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T16:02:35Z","timestamp":1684771355000},"page":"69-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On the\u00a0Semantics of\u00a0Risk Propagation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3385-4769","authenticated-orcid":false,"given":"Mattia","family":"Fumagalli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9021-9740","authenticated-orcid":false,"given":"Gal","family":"Engelberg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5385-5761","authenticated-orcid":false,"given":"Tiago Prince","family":"Sales","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2384-3081","authenticated-orcid":false,"given":"\u00cdtalo","family":"Oliveira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8881-1902","authenticated-orcid":false,"given":"Dan","family":"Klein","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4659-883X","authenticated-orcid":false,"given":"Pnina","family":"Soffer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4387-2912","authenticated-orcid":false,"given":"Riccardo","family":"Baratella","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3452-553X","authenticated-orcid":false,"given":"Giancarlo","family":"Guizzardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,23]]},"reference":[{"issue":"8","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1016\/j.ssci.2011.04.015","volume":"49","author":"T Aven","year":"2011","unstructured":"Aven, T., Renn, O., Rosa, E.A.: On the ontological status of the concept of risk. Saf. Sci. 49(8), 1074\u20131079 (2011)","journal-title":"Saf. Sci."},{"key":"5_CR2","unstructured":"Band, I., et al.: Modeling enterprise risk management and security with the archimate language - W172 (2017)"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-031-05760-1_23","volume-title":"Research Challenges in Information Science","author":"R Baratella","year":"2022","unstructured":"Baratella, R., et al.: Understanding and modeling prevention. In: Guizzardi, R., Ralyt\u00e9, J., Franch, X. (eds.) RCIS 2022, pp. 389\u2013405. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05760-1_23"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Cao, S., Bryceson, K., Hine, D.: An ontology-based Bayesian network modelling for supply chain risk propagation. Ind. Manag. Data Syst. (2019)","DOI":"10.1108\/IMDS-01-2019-0032"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Chaudhuri, A., et al.: Risk propagation and its impact on performance in food processing supply chain: a fuzzy interpretive structural modeling based approach. J. Model. Manag. (2016)","DOI":"10.1108\/JM2-08-2014-0065"},{"key":"5_CR6","unstructured":"Coso, I.: Enterprise risk management-integrated framework. Committee of Sponsoring Organizations of the Treadway Commission, vol. 2 (2004)"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"386","DOI":"10.3390\/su10020386","volume":"10","author":"X Deng","year":"2018","unstructured":"Deng, X., et al.: Formation mechanism and coping strategy of public emergency for urban sustainability: a perspective of risk propagation in the sociotechnical system. Sustainability 10(2), 386 (2018)","journal-title":"Sustainability"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1016\/j.cie.2019.01.014","volume":"135","author":"X Deng","year":"2019","unstructured":"Deng, X., et al.: Risk propagation mechanisms and risk management strategies for a sustainable perishable products supply chain. Comput. Ind. Eng. 135, 1175\u20131187 (2019)","journal-title":"Comput. Ind. Eng."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Engelberg, G., et al.: An ontology-driven approach for process-aware risk propagation. In: 38th ACM\/SIGAPP Symposium on Applied Computing (2023)","DOI":"10.1145\/3555776.3577795"},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2020.107752","volume":"228","author":"MD Garvey","year":"2020","unstructured":"Garvey, M.D., Carnovale, S.: The rippled newsvendor: a new inventory framework for modeling supply chain risk severity in the presence of risk propagation. Int. J. Prod. Econ. 228, 107752 (2020)","journal-title":"Int. J. Prod. Econ."},{"issue":"2","key":"5_CR11","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.ejor.2014.10.034","volume":"243","author":"MD Garvey","year":"2015","unstructured":"Garvey, M.D., et al.: An analytical framework for supply network risk propagation: a Bayesian network approach. Eur. J. Oper. Res. 243(2), 618\u2013627 (2015)","journal-title":"Eur. J. Oper. Res."},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s12599-020-00634-3","volume":"63","author":"O Gonz\u00e1lez-Rojas","year":"2021","unstructured":"Gonz\u00e1lez-Rojas, O., et al.: Quantifying risk propagation within a network of business processes and it services. Bus. Inf. Syst. Eng. 63(2), 129\u2013143 (2021)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-69904-2_36","volume-title":"Conceptual Modeling","author":"N Guarino","year":"2017","unstructured":"Guarino, N.: On the semantics of ongoing and future occurrence identifiers. In: Mayr, H.C., Guizzardi, G., Ma, H., Pastor, O. (eds.) ER 2017. LNCS, vol. 10650, pp. 477\u2013490. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69904-2_36"},{"key":"5_CR14","unstructured":"Guizzardi, G.: Ontological foundations for structural conceptual models (2005)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Guizzardi, G., et al.: Ontological unpacking as explanation: the case of the viral conceptual model. In: International Conference on Conceptual Modeling, pp. 356\u2013366 (2021)","DOI":"10.1007\/978-3-030-89022-3_28"},{"key":"5_CR16","unstructured":"ISO: Risk Management - Vocabulary, ISO Guide 73:2009 (2009)"},{"key":"5_CR17","unstructured":"ISO: ISO 31000:2018 - Risk management - Guidelines (2018)"},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/COMST.2016.2615098","volume":"19","author":"J Jiang","year":"2016","unstructured":"Jiang, J., et al.: Identifying propagation sources in networks: state-of-the-art and comparative studies. IEEE Commun. Surv. Tutor. 19(1), 465\u2013481 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"5_CR19","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.3390\/s21051691","volume":"21","author":"G Kavallieratos","year":"2021","unstructured":"Kavallieratos, G., et al.: Cyber risk propagation and optimal selection of cybersecurity controls for complex cyberphysical systems. Sensors 21(5), 1691 (2021)","journal-title":"Sensors"},{"issue":"3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1016\/j.aej.2020.02.030","volume":"59","author":"M Li","year":"2020","unstructured":"Li, M., et al.: Risk propagation analysis of urban rail transit based on network model. Alex. Eng. J. 59(3), 1319\u20131331 (2020)","journal-title":"Alex. Eng. J."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Newman, M.: Networks. Oxford University Press, Oxford (2018)","DOI":"10.1093\/oso\/9780198805090.001.0001"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Pearl, J.: Graphical models for probabilistic and causal reasoning. In: Quantified Representation of Uncertainty and Imprecision, pp. 367\u2013389 (1998)","DOI":"10.1007\/978-94-017-1735-9_12"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Pearl, J.: Reverend bayes on inference engines: a distributed hierarchical approach. In: Probabilistic and Causal Inference: The Works of Judea Pearl, pp. 129\u2013138 (2022)","DOI":"10.1145\/3501714.3501727"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-00847-5_11","volume-title":"Conceptual Modeling","author":"TP Sales","year":"2018","unstructured":"Sales, T.P., Bai\u00e3o, F., Guizzardi, G., Almeida, J.P.A., Guarino, N., Mylopoulos, J.: The common ontology of value and risk. In: Trujillo, J.C., et al. (eds.) ER 2018. LNCS, vol. 11157, pp. 121\u2013135. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00847-5_11"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Shin, K., et al.: Risk propagation based dynamic transportation route finding mechanism. Ind. Manag. Data Syst. (2012)","DOI":"10.1108\/02635571211193662"},{"issue":"3","key":"5_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.9790\/0661-0231224","volume":"2","author":"K Sunil","year":"2012","unstructured":"Sunil, K., et al.: Message passing algorithm: a tutorial review. IOSR J. Comput. Eng. 2(3), 12\u201324 (2012)","journal-title":"IOSR J. Comput. Eng."}],"container-title":["Lecture Notes in Business Information Processing","Research Challenges in Information Science: Information Science and the Connected World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33080-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:26:40Z","timestamp":1710271600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33080-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031330797","9783031330803"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33080-3_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research Challenges in Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rcis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.rcis-conf.com\/rcis2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}