{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:53:44Z","timestamp":1742979224925,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319114590"},{"type":"electronic","value":"9783319114606"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11460-6_24","type":"book-chapter","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T12:24:37Z","timestamp":1412079877000},"page":"281-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems"],"prefix":"10.1007","author":[{"given":"Yacine","family":"Djemaiel","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-31069-0_1","volume-title":"Advanced Information Systems Engineering Workshops","author":"O Altuhhova","year":"2012","unstructured":"Altuhhova, O., Matulevi\u010dius, R., Ahmed, N.: Towards definition of secure business processes. In: Bajec, M., Eder, J. (eds.) CAiSE Workshops 2012. LNBIP, vol. 112, pp. 1\u201315. Springer, Heidelberg (2012)"},{"issue":"4","key":"24_CR2","first-page":"103","volume":"4","author":"J Capek","year":"2010","unstructured":"Capek, J., Hub, M., Myskova, R.: Basic authentication procedure modelled by Petri nets. Int. J. Comput. Commun. 4(4), 103\u2013108 (2010)","journal-title":"Int. J. Comput. Commun."},{"issue":"4","key":"24_CR3","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","volume":"19","author":"WH Delone","year":"2003","unstructured":"Delone, W.H., McLean, E.R.: The delone and mclean model of information systems success: a ten-year update. J. Manage. Inf. Syst. 19(4), 9\u201330 (2003)","journal-title":"J. Manage. Inf. Syst."},{"key":"24_CR4","unstructured":"Keen, C., Lakos, C.: Information systems modelling using LOOPN++, an object Petri net scheme. In: Proceedings of 4th International Working Conference on Dynamic Modelling and Information Systems, pp. 28\u201330, 31\u201352. University Press (1994)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: ARES, pp. 41\u201348. IEEE Computer Society (2009)","DOI":"10.1109\/ARES.2009.90"},{"issue":"4","key":"24_CR6","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1145\/237496.237498","volume":"14","author":"A Oberweis","year":"1996","unstructured":"Oberweis, A., Sander, P.: Information system behavior specification by high level Petri nets. ACM Trans. Inf. Syst. 14(4), 380\u2013420 (1996)","journal-title":"ACM Trans. Inf. Syst."},{"key":"24_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-29231-6_7","volume-title":"Workshops on Business Informatics Research","author":"E Paja","year":"2012","unstructured":"Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol. 106, pp. 77\u201389. Springer, Heidelberg (2012)"},{"issue":"3","key":"24_CR8","first-page":"236","volume":"17","author":"S Petter","year":"2008","unstructured":"Petter, S., DeLone, W.H., McLean, E.R.: Measuring information systems success: models, dimensions, measures, and interrelationships. EJIS 17(3), 236\u2013263 (2008)","journal-title":"EJIS"},{"issue":"4","key":"24_CR9","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"90","author":"A Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. 90(4), 745\u2013752 (2007)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"24_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-24358-5_14","volume-title":"ENTERprise Information Systems","author":"X Ge","year":"2011","unstructured":"Ge, X., Paige, R.F., McDermid, J.A.: Failures of a business process in enterprise systems. In: Cruz-Cunha, M.M., Varaj\u00e3o, J., Powell, P., Martinho, R. (eds.) CENTERIS 2011, Part I. CCIS, vol. 219, pp. 139\u2013146. Springer, Heidelberg (2011)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-33704-8_25","volume-title":"Computer Network Security","author":"PD Zegzhda","year":"2012","unstructured":"Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., Konoplev, A.S.: Security modeling of grid systems using Petri nets. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 299\u2013308. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11460-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T13:00:47Z","timestamp":1676898047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11460-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319114590","9783319114606"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11460-6_24","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"1 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}