{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:40:16Z","timestamp":1743658816621,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031823480","type":"print"},{"value":"9783031823497","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82349-7_27","type":"book-chapter","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:12:20Z","timestamp":1743657140000},"page":"425-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3069-6788","authenticated-orcid":false,"given":"Lars Halvdan","family":"Fl\u00e5","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1853-0950","authenticated-orcid":false,"given":"Christoph Alexander","family":"Thieme","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7127-6694","authenticated-orcid":false,"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2718-6637","authenticated-orcid":false,"given":"Geir Kjetil","family":"Hanssen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Jaatun, M.G., Bodsberg, L., Gr\u00f8tan, T.O., Moe, M.E.G.: An empirical study of CERT capacity in the North Sea. In: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, Dublin, Ireland (2020)","DOI":"10.1109\/CyberSecurity49315.2020.9138865"},{"key":"27_CR2","unstructured":"Hanssen, G.K., Onshus, T., Jaatun, M.G., Myklebust, T., Ottermo, M., Lundteigen, M.A.: Principles of digitalisation and IT-OT integration. SINTEF"},{"key":"27_CR3","unstructured":"Jaatun, M.G., Wille, E., Bernsmed, K., Kilskar, S.S.: Grunnprinsipper for IKT-sikkerhet i industrielle IKT-systemer. SINTEF (2021)"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/jcp2010003","volume":"2","author":"T Onshus","year":"2022","unstructured":"Onshus, T., et al.: Security and independence of process safety and control systems in the petroleum industry. J. Cybersecur. Priv. 2, 20\u201341 (2022)","journal-title":"J. Cybersecur. Priv."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Jaatun, M.G., S\u00e6le, H.: A checklist for supply chain security for critical infrastructure operators. In: The Cyber Science 2023, Copenhagen, Denmark July 3 (2023)","DOI":"10.1007\/978-981-99-6974-6_14"},{"key":"27_CR6","unstructured":"Evripidou, S., Ani, U.D., Hailes, S., Watson, J.D.M.K.: Exploring the security culture of operational technology (OT) organisations: the role of external consultancy in overcoming organisational barriers. In: Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), pp. 113\u2013129. USENIX Association (2023)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Jamil, A.-M., ben Othmane, L., Valani, A.: Threat modeling of cyber-physical systems in practice. In: International Conference on Risks and Security of Internet and Systems, pp. 3\u201319. Springer International Publishing (2021)","DOI":"10.1007\/978-3-031-02067-4_1"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Nu\u00dfer, W., Koch, E., Trsek, H., Schumann, R., Mahrenholz, D.: Cyber security in production networks \u2013 an empirical study about the current status. In: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE (2017)","DOI":"10.1109\/ETFA.2017.8247725"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3, 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1080\/14780887.2020.1769238","volume":"18","author":"V Braun","year":"2021","unstructured":"Braun, V., Clarke, V.: One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qual. Res. Psychol. 18, 328\u2013352 (2021)","journal-title":"Qual. Res. Psychol."},{"key":"27_CR11","first-page":"27","volume":"29","author":"K Kaynar","year":"2016","unstructured":"Kaynar, K.: A taxonomy for attack graph generation and usage in network security. J. Inf. Secur. Appl. 29, 27\u201356 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TDSC.2013.24","volume":"11","author":"L Wang","year":"2014","unstructured":"Wang, L., Singhal, A., Cheng, P., Noel, S.: K-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Tran. Dependable Secur. Comput. 11, 30\u201344 (2014)","journal-title":"IEEE Tran. Dependable Secur. Comput."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82349-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:12:35Z","timestamp":1743657155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82349-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823480","9783031823497"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82349-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}