{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:57Z","timestamp":1742913837230,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031665936"},{"type":"electronic","value":"9783031665943"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-66594-3_31","type":"book-chapter","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T01:01:48Z","timestamp":1723597308000},"page":"293-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security and\u00a0Communication Models of\u00a0Failures and\u00a0Attacks on\u00a0E-services"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7229-5037","authenticated-orcid":false,"given":"Anna","family":"Pira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9204-921X","authenticated-orcid":false,"given":"Jaros\u0142aw","family":"Protasiewicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Barnlund, D.C.: A transactional model of communication. In: Communication Theory, pp. 47\u201357. Routledge (2017)","DOI":"10.4324\/9781315080918-5"},{"key":"31_CR2","unstructured":"Critical\u00a0Infrastructure Cybersecurity. Framework for improving critical infrastructure cybersecurity. https:\/\/nvlpubsnist.gov\/nistpubs\/CSWP\/NIST.CSWP, 4162018, 2018"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Frijns, H.A., Oliver Sch\u00fcrer, O., Koeszegi, S.T.: Communication models in human\u2013robot interaction: an asymmetric model of alterity in human\u2013robot interaction (AMODAL-HRI). Int. J. Soc. Robot. 15(3), 473\u2013500 (2023)","DOI":"10.1007\/s12369-021-00785-7"},{"key":"31_CR4","unstructured":"Gunkel, D.J.: Communication and artificial intelligence: opportunities and challenges for the 21st century. Communication+ 1 1(1), 1\u201325 (2012)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Guzman, A.L., Lewis, S.C.: Artificial intelligence and communication: a human\u2013machine communication research agenda. New Media Soc. 22(1), 70\u201386 (2020)","DOI":"10.1177\/1461444819858691"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi, M., Ahmad, R.: Machine learning and deep learning approaches for cybersecurity: a review. IEEE Access 10, 19572\u201319585 (2022)","DOI":"10.1109\/ACCESS.2022.3151248"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Hochstein, A., Zarnekow, R., Brenner, W.: ITIL as common practice reference model for it service management: formal assessment and implications for practice. In: 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 704\u2013710 (2005)","DOI":"10.1109\/EEE.2005.86"},{"key":"31_CR8","unstructured":"Kincaid, D.L.: The convergence model of communication. Communication Institute. Papers, 1979"},{"key":"31_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102036","volume":"99","author":"R Knight","year":"2020","unstructured":"Knight, R., Nurse, J.R.C.: A framework for effective corporate communication after cyber security incidents. Comput. Secur. 99, 102036 (2020)","journal-title":"Comput. Secur."},{"issue":"4","key":"31_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MS.2020.3030198","volume":"38","author":"S P\u00e9rez-Soler","year":"2021","unstructured":"P\u00e9rez-Soler, S., Juarez-Puerta, S., Guerra, E., de Lara, J.: Choosing a chatbot development tool. IEEE Softw. 38(4), 94\u2013103 (2021)","journal-title":"IEEE Softw."},{"issue":"1","key":"31_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1093\/cybsec\/tyw004","volume":"2","author":"A Sarabi","year":"2016","unstructured":"Sarabi, A., Naghizadeh, P., Liu, Y., Liu, M.: Risky business: Fine-grained data breach prediction using business profiles. J. Cybersecur. 2(1), 15\u201328 (2016)","journal-title":"J. Cybersecur."},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.jbusres.2021.03.020","volume":"130","author":"L Schoofs","year":"2021","unstructured":"Schoofs, L., Claeys, A.-S.: Communicating sadness: the impact of emotional crisis communication on the organizational post-crisis reputation. J. Bus. Res. 130, 271\u2013282 (2021)","journal-title":"J. Bus. Res."},{"issue":"3","key":"31_CR13","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"Claude Elwood Shannon","year":"1948","unstructured":"Claude Elwood Shannon: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Stevens, R., et al.: How ready is your ready? Assessing the usability of incident response playbook frameworks. In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, pp. 1\u201318 (2022)","DOI":"10.1145\/3491102.3517559"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Suhaili, S.M., Salim, N., Jambli, M.N.: Service chatbots: a systematic review. Expert Syst. Appl. 184, 115461 (2021)","DOI":"10.1016\/j.eswa.2021.115461"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Thakur, K., Qiu, M., Gai, K., Ali, M.L.: An investigation on cyber security threats and security models. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 307\u2013311. IEEE (2015)","DOI":"10.1109\/CSCloud.2015.71"},{"key":"31_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.101935","volume":"68","author":"G Wilk-Jakubowski","year":"2022","unstructured":"Wilk-Jakubowski, G., Harabin, R., Ivanov, S.: Robotics in crisis management: a review. Technol. Soc. 68, 101935 (2022)","journal-title":"Technol. Soc."}],"container-title":["Lecture Notes in Networks and Systems","Digital Interaction and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66594-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T17:57:01Z","timestamp":1732643821000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66594-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031665936","9783031665943"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66594-3_31","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIDI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Machine Intelligence and Digital Interaction Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"midi12023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/midi2023.opi.org.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}