{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:14:53Z","timestamp":1772061293754,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031594618","type":"print"},{"value":"9783031594625","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-59462-5_5","type":"book-chapter","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:02:12Z","timestamp":1714633332000},"page":"70-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Business Process and Data Modelling Approach to Enhance Cyber Security in Smart Cities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3534-026X","authenticated-orcid":false,"given":"Josef","family":"Horalek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5725-9302","authenticated-orcid":false,"given":"Tereza","family":"Otcenaskova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0917-5988","authenticated-orcid":false,"given":"Vladimir","family":"Sobeslav","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6705-8974","authenticated-orcid":false,"given":"Petr","family":"Tucnik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"key":"5_CR1","unstructured":"Berkeley Center for Long-Term Cybersecurity. https:\/\/cltc.berkeley.edu\/publication\/smart-cities\/. Accessed 31 Mar 2023"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.diin.2017.08.002","volume":"22","author":"E Casey","year":"2017","unstructured":"Casey, E., Barnum, S., Griffith, R., Snyder, J., van Beek, H., Nelson, A.: Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language. Digit. Investig. 22, 14\u201345 (2017)","journal-title":"Digit. Investig."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Chergui, M.E., Benslimane, S.M. (eds.) A valid BPMN extension for supporting security requirements based on cyber security ontology. In: 8th International Conference on Model and Data Engineering (MEDI), Marrakesh, Morocco (2018)","DOI":"10.1007\/978-3-030-00856-7_14"},{"key":"5_CR4","unstructured":"Computer Security Resource Center. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-53b\/final. Accessed 31 Mar 2023"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Conrad, E., Misenar, S., Feldman, J.: Chapter 8 - domain 7: security operations (e.g., foundational concepts, investigations, incident management, disaster recovery). In: Conrad, E., Misenar, S., Feldman, J. (eds.) CISSP Study Guide. 3rd edn. Syngress, Boston, pp. 347\u2013428 (2016)","DOI":"10.1016\/B978-0-12-802437-9.00008-4"},{"issue":"10","key":"5_CR6","doi-asserted-by":"publisher","first-page":"5578","DOI":"10.3390\/su13105578","volume":"13","author":"A De Nicola","year":"2021","unstructured":"De Nicola, A., Villani, M.L.: Smart City Ontologies and Their Applications: A Systematic Literature Review. Sustainability 13(10), 5578 (2021)","journal-title":"Sustainability"},{"key":"5_CR7","unstructured":"Deloitte. https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/de\/Documents\/risk\/Report_making_smart_cities_cyber_secure.pdf. Accessed 31 Mar 2023"},{"key":"5_CR8","unstructured":"Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and repealing Directive (EU) 2016\/1148 (NIS 2 Directive) (Text with EEA relevance) (2022)"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"012040","DOI":"10.1088\/1742-6596\/1069\/1\/012040","volume":"1069","author":"N Dong","year":"2018","unstructured":"Dong, N., Zhao, J., Yuan, L., Kong, Y.: Research on information security system of smart city based on information security requirements. J. Phys. Conf. Ser. 1069, 012040 (2018)","journal-title":"J. Phys. Conf. Ser."},{"key":"5_CR10","unstructured":"European Union Agency for Cybersecurity (ENISA). https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot. Accessed 31 Mar 2023"},{"key":"5_CR11","unstructured":"Unified Cyberontology. https:\/\/unifiedcyberontology.org. Accessed 31 Mar 2023"},{"key":"5_CR12","unstructured":"ISO\/IEC 27001: Information technology - Security techniques - Information security management systems \u2013 Requirements (2013)"},{"key":"5_CR13","unstructured":"ISO\/IEC 27002: Information technology \u2014 Security techniques \u2014 Code of practice for information security management. International Organization for Standardization (2013)"},{"key":"5_CR14","unstructured":"Kaspersky Daily. https:\/\/www.kaspersky.com\/blog\/cybersecurity-ontology\/40404\/. Accessed 31 Mar 2023"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1108\/09685220010339192","volume":"8","author":"S Kokolakis","year":"2000","unstructured":"Kokolakis, S., Demopoulos, A., Kiountouzis, E.: The use of business process modelling in information systems security analysis and design. Inf. Manag. Comput. Secur. 8, 107\u2013116 (2000)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"5_CR16","unstructured":"Manville, C., Kotterink, G.B.: Mapping Smart Cities in the EU. EPRS: European Parliamentary Research Service, Belgium (2014)"},{"key":"5_CR17","unstructured":"Maschio, I.: European Innovation Partnership on Smart Cities and Communities. European Comission (2023)"},{"issue":"9","key":"5_CR18","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.3390\/s18093053","volume":"18","author":"B Mozzaquatro","year":"2018","unstructured":"Mozzaquatro, B., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the Internet of Things. Sensors 18(9), 3053 (2018)","journal-title":"Sensors"},{"key":"5_CR19","unstructured":"Open Data. https:\/\/opendata.gov.cz\/informace:kontext:smart-city. Accessed 31 Mar 2023"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Pastuszuk, J., Burek, P., Ksiezopolski, B. (eds.) Cybersecurity ontology for dynamic analysis of IT systems. In: 25th KES International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES), Szczecin, Poland (2021)","DOI":"10.1016\/j.procs.2021.08.104"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Rodriguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inform. Syst. E90-D(4), 745\u2013752 (2007)","DOI":"10.1093\/ietisy\/e90-d.4.745"},{"key":"5_CR22","unstructured":"Massink, R., Manville GCJCJMJKPRKTALMW, C., Bas, K.: Mapping Smart Cities in the EU. European Parliamentary Research Service (2014)"},{"issue":"3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10270-015-0499-4","volume":"16","author":"M Salnitri","year":"2017","unstructured":"Salnitri, M., Dalpiaz, F., Giorgini, P.: Designing secure business processes with SecBPMN. Softw. Syst. Model. 16(3), 737\u2013757 (2017)","journal-title":"Softw. Syst. Model."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"San Mart\u00edn, L., Rodr\u00edguez, A., Caro, A., Vel\u00e1squez, I.: Obtaining secure business process models from an enterprise architecture considering security requirements.\u00a0Bus. Process Manage. J. 28(1), 150\u2013177 (2022)","DOI":"10.1108\/BPMJ-01-2021-0025"},{"key":"5_CR25","unstructured":"Silicon Labs. https:\/\/pages.silabs.com\/rs\/634-SLU-379\/images\/Preparing_for_Next-Gen_Cyber_Attacks_on_IoT.pdf. Accessed 31 Mar 2023"},{"key":"5_CR26","unstructured":"Staalduinen van, W., Bond R., Dantas, C., Jegundo, A.L.: Smart Age Friendly Cities, Age Friendly Smart Cities. European Comission, Futurium (2022)"},{"issue":"6","key":"5_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103334","volume":"57","author":"R Syed","year":"2020","unstructured":"Syed, R.: Cybersecurity vulnerability management: a conceptual ontology and cyber intelligence alert system. Inf. Manage. 57(6), 103334 (2020)","journal-title":"Inf. Manage."},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s10664-021-10056-8","volume":"28","author":"WG Temple","year":"2022","unstructured":"Temple, W.G., Wu, Y., Cheh, C., Li, Y., Chen, B., Kalbarczyk, Z.T., et al.: CyberSAGE: the cyber security argument graph evaluation tool. Empir. Softw. Eng. 28(1), 18 (2022)","journal-title":"Empir. Softw. Eng."},{"key":"5_CR29","first-page":"803","volume-title":"Design of the Smart City Domain Concept in the Czech Republic","author":"P Urbanik","year":"2023","unstructured":"Urbanik, P., Horalek, J.: Design of the Smart City Domain Concept in the Czech Republic, pp. 803\u2013814. Hradec Economic Days, University of Hradec Kralove (2023)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Vojkovic, G.: Will the GDPR slow down development of smart cities?. In: IEEE 2018 41st InternationalConvention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatja, Croatia, pp. 1295\u20131297 (2018)","DOI":"10.23919\/MIPRO.2018.8400234"},{"issue":"1","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00094-6","volume":"4","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Zhu, H., Liu, P., Sun, L.: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. Cybersecurity 4(1), 1\u201321 (2021)","journal-title":"Cybersecurity"},{"issue":"14","key":"5_CR32","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.3390\/app10144981","volume":"10","author":"S Zareen","year":"2020","unstructured":"Zareen, S., Akram, A., Khan, S.A.: Security requirements engineering framework with BPMN 2.0.2 extension model for development of information systems. Appl. Sci. 10(14), 4981 (2020)","journal-title":"Appl. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Nature of Computation and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-59462-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:04:36Z","timestamp":1714633476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-59462-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031594618","9783031594625"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-59462-5_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Nature of Computation and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictcc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}