{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:09:41Z","timestamp":1747368581570,"version":"3.40.5"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031924736","type":"print"},{"value":"9783031924743","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92474-3_7","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T18:15:13Z","timestamp":1747332913000},"page":"103-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Friend, Foe, or Target? Domain Models as Risk Deterrents, Risk Sources, and Assets at Risk"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0952-9571","authenticated-orcid":false,"given":"Isadora","family":"Valle","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5385-5761","authenticated-orcid":false,"given":"Tiago Prince","family":"Sales","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2894-9076","authenticated-orcid":false,"given":"Eduardo","family":"Guerra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2384-3081","authenticated-orcid":false,"given":"\u00cdtalo","family":"Oliveira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-5741","authenticated-orcid":false,"given":"Renata","family":"Guizzardi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1164-1351","authenticated-orcid":false,"given":"Luiz Olavo","family":"Bonino da Silva Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7359-8013","authenticated-orcid":false,"given":"Henderik","family":"Proper","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3452-553X","authenticated-orcid":false,"given":"Giancarlo","family":"Guizzardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/s13023-024-03059-3","volume":"19","author":"A Atalaia","year":"2024","unstructured":"Atalaia, A., et al.: EURO-NMD registry: federated FAIR infrastructure, innovative technologies and concepts of a patient-centred registry for rare neuromuscular disorders. Orphanet J. Rare Dis. 19(1), 66 (2024)","journal-title":"Orphanet J. Rare Dis."},{"issue":"8\u20139","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1016\/j.ssci.2011.04.015","volume":"49","author":"T Aven","year":"2011","unstructured":"Aven, T., et al.: On the ontological status of the concept of risk. Saf. Sci. 49(8\u20139), 1074\u20131079 (2011)","journal-title":"Saf. Sci."},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1057\/ejis.1995.21","volume":"4","author":"D Batra","year":"1995","unstructured":"Batra, D., Marakas, G.M.: Conceptual data modelling in theory and practice. Eur. J. Inf. Syst. 4(3), 185\u2013193 (1995)","journal-title":"Eur. J. Inf. Syst."},{"key":"7_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111413","volume":"192","author":"G Bergstr\u00f6m","year":"2022","unstructured":"Bergstr\u00f6m, G., et al.: Evaluating the layout quality of UML class diagrams using machine learning. J. Syst. Softw. 192, 111413 (2022)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/13669877.2010.515313","volume":"14","author":"\u00c5 Boholm","year":"2011","unstructured":"Boholm, \u00c5., Corvellec, H.: A relational theory of risk. J. Risk Res. 14(2), 175\u2013190 (2011)","journal-title":"J. Risk Res."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-012-9214-z","volume":"19","author":"G Canfora","year":"2014","unstructured":"Canfora, G., et al.: How changes affect software entropy: an empirical study. Empir. Softw. Eng. 19, 1\u201338 (2014)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/320434.320440","volume":"1","author":"P Chen","year":"1976","unstructured":"Chen, P.: The entity-relationship model: toward a unified view of data. ACM Trans. Database Syst. 1(1), 9\u201336 (1976)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.datak.2005.07.007","volume":"58","author":"I Davies","year":"2006","unstructured":"Davies, I., et al.: How do practitioners use conceptual modeling in practice? Data Knowl. Eng. 58(3), 358\u2013380 (2006)","journal-title":"Data Knowl. Eng."},{"issue":"5","key":"7_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1125944.1125949","volume":"49","author":"B Dobing","year":"2006","unstructured":"Dobing, B., Parsons, J.: How UML is used. Commun. ACM 49(5), 109\u2013113 (2006)","journal-title":"Commun. ACM"},{"issue":"1","key":"7_CR10","first-page":"43","volume":"25","author":"P Fettke","year":"2009","unstructured":"Fettke, P.: How conceptual modeling is used. Commun. Assoc. Inf. Syst. 25(1), 43 (2009)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Forward, A., Lethbridge, T.C.: Problems and opportunities for model-centric versus code-centric software development: a survey of software professionals. In: MISE, pp. 27\u201332 (2008)","DOI":"10.1145\/1370731.1370738"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Genero, M., et\u00a0al.: Assessing object-oriented conceptual models maintainability. In: Advanced Conceptual Modeling Techniques: ER 2002 Workshops, pp. 288\u2013299. Springer (2003)","DOI":"10.1007\/978-3-540-45275-1_26"},{"key":"7_CR13","unstructured":"Guarino, N.: Formal ontology in information systems: Proceedings of the first international conference (FOIS\u201998), vol.\u00a046. IOS press (1998)"},{"key":"7_CR14","unstructured":"Guizzardi, G., Proper, H.A.: On understanding the value of domain modeling. In: Proceedings of 15th VMBO (2021)"},{"issue":"3\u20134","key":"7_CR15","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3233\/AO-150157","volume":"10","author":"G Guizzardi","year":"2015","unstructured":"Guizzardi, G., et al.: Towards ontological foundations for conceptual modeling: the unified foundational ontology (UFO) story. Appl. Ontol. 10(3\u20134), 259\u2013271 (2015)","journal-title":"Appl. Ontol."},{"key":"7_CR16","unstructured":"Halpin, T.A., Morgan, T.: Information Modeling and Relational Databases. Morgan Kaufmann, Burlington (2010)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Ho-Quang, T., et\u00a0al.: Practices and perceptions of UML use in open source projects. In: International Conference on Software Engineering, pp. 203\u2013212 (2017)","DOI":"10.1109\/ICSE-SEIP.2017.28"},{"key":"7_CR18","unstructured":"ISO: ISO 31073:2022 - Risk management \u2013 Vocabulary (2022)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Liddle, S.W.: Model-driven software development. In: Handbook of Conceptual Modeling: Theory, Practice, and Research Challenges, pp. 17\u201354. Springer (2011)","DOI":"10.1007\/978-3-642-15865-0_2"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Lu, Y., Marais, K.B., Zhang, S.G.: Conceptual modeling of training and organizational risk dynamics. Procedia Eng. 80, 313\u2013328 (2014)","DOI":"10.1016\/j.proeng.2014.09.090"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Lund, M.S., et\u00a0al.: A guided tour of the CORAS method. Model-driven risk analysis: The CORAS approach, pp. 23\u201343 (2011)","DOI":"10.1007\/978-3-642-12323-8_3"},{"key":"7_CR22","unstructured":"National Institute of Standards and Technology (NIST): NIST Computer Security Resource Center (CSRC) Glossary (2025)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Oliveira, \u00cd., et\u00a0al.: An ontology of security from a risk treatment perspective. In: Conceptual Modeling. ER 2022, vol. 13607, pp. 365\u2013379. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-17995-2_26"},{"key":"7_CR24","unstructured":"OMG: UML 2.0 superstructure specification \u2013 Final adopted specification. Technical report ptc\/03-08-02, Object Management Group (August 2003)"},{"key":"7_CR25","unstructured":"Pakalnickiene, E., Nemuraite, L.: Checking of conceptual models with integrity constraints. Inf. Technol. Control 36(3) (2007)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Petre, M.: UML in practice. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 722\u2013731. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606618"},{"key":"7_CR27","unstructured":"Proper, H.A., Guizzardi, G.: Modeling for enterprises; let\u2019s go to RoME ViA RiME. In: The Practice of Enterprise Modeling 2022 Forum, vol.\u00a03327 (2022)"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Sales, T.P., et\u00a0al.: The common ontology of value and risk. In: Conceptual Modeling: 37th International Conference, ER, pp. 121\u2013135. Springer (2018)","DOI":"10.1007\/978-3-030-00847-5_11"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Sales, T.P., et\u00a0al.: Ontological analysis and redesign of risk modeling in archimate. In: 22nd EDOC, pp. 154\u2013163. IEEE (2018)","DOI":"10.1109\/EDOC.2018.00028"},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10796-010-9235-3","volume":"13","author":"S Strecker","year":"2011","unstructured":"Strecker, S., Heise, D., Frank, U.: RiskM: a multi-perspective modeling method for IT risk assessment. Inf. Syst. Front. 13, 595\u2013611 (2011)","journal-title":"Inf. Syst. Front."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"St\u00f6rrle, H., Ciolkowski, M.: Stepping away from the lamppost: domain-level technical debt. In: 45th SEAA, pp. 325\u2013332 (2019)","DOI":"10.1109\/SEAA.2019.00056"},{"key":"7_CR32","unstructured":"Valle, I., et\u00a0al.: Unraveling the pain points of domain modeling, Preprint on SSNR at https:\/\/ssrn.com\/abstract=5045287"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Valle, I., et\u00a0al.: What do I get from modeling? An empirical study on using structural conceptual models. In: Enterprise Design, Operations, and Computing, pp. 21\u201338. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-46587-1_2"},{"issue":"1","key":"7_CR34","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10270-022-01020-1","volume":"22","author":"C Verbruggen","year":"2023","unstructured":"Verbruggen, C., Snoeck, M.: Practitioners\u2019 experiences with model-driven engineering: a meta-review. Softw. Syst. Model. 22(1), 111\u2013129 (2023)","journal-title":"Softw. Syst. Model."}],"container-title":["Lecture Notes in Business Information Processing","Research Challenges in Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92474-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T18:15:25Z","timestamp":1747332925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92474-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031924736","9783031924743"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92474-3_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research Challenges in Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rcis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.rcis-conf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}