{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:33:29Z","timestamp":1743039209981,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184722"},{"type":"electronic","value":"9783319184739"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18473-9_32","type":"book-chapter","created":{"date-parts":[[2015,4,25]],"date-time":"2015-04-25T10:00:08Z","timestamp":1429956008000},"page":"327-337","source":"Crossref","is-referenced-by-count":0,"title":["Monitoring the Effectiveness of Security Countermeasures in a Security Risk Management Model"],"prefix":"10.1007","author":[{"given":"Neila","family":"Rjaibi","sequence":"first","affiliation":[]},{"given":"Latifa Ben Arfa","family":"Rabai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Rabai, L.B.A., Rjaibi, N.: Assessing Quality in E-learning including learner with Special Needs. In: Proceedings of The Fourth National Symposium on Informatics, Technologies for Special Needs, April 23-25. King Saud University, Riyadh (2013), \n                    http:\/\/nsi.ksu.edu.sa\/node\/2"},{"key":"32_CR2","unstructured":"Rjaibi, N., Rabai, L.B.A.: Toward A New Model For Assessing Quality Teaching Processes In E-learning. In: Proceedings of 3rd International Conference on Computer Supported Education, CSEDU 2011, Noordwijkerhout, The Netherlands, May 6-9, vol.\u00a02, pp. 468\u2013472. SciTePress (2011), \n                    http:\/\/www.csedu.org\n                  , ISBN: 978-989-8425-50-8"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Rabai, L.B.A., Rjaibi, N., Aissa, A.B.: Quantifying Security Threats for E-learning Systems. In: IEEE Proceedings of International Conference on Education & E-Learning Innovations- Infrastructural Development in Education (ICEELI 2012), Sousse,Tunisia, July 1-3 (2012), \n                    http:\/\/www.iceeli.org\/index.htm\n                  , doi:10.1109\/ICEELI.2012.6360592, Print ISBN:\u00a0978-1-4673-2226-3","DOI":"10.1109\/ICEELI.2012.6360592"},{"key":"32_CR4","unstructured":"Rjaibi, N., Rabai, L.B.A., Omrani, H., Aissa, A.B.: Mean failure cost as a measure of critical security requirements: E-learning case study. In: Proceedings of the 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP 2012, Las Vegas, Nevada, USA), July 16-19, pp. 520\u2013526. CSREA Press, U. S. A. (2012), The 11 th International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE 2012: July 16-19, USA), ISBN: 1-60132-209-7"},{"key":"32_CR5","unstructured":"Rjaibi, N., Rabai, L.B.A., Aissa, B.A., Louadi, M.: Cyber security measurement in depth for e-learning systems. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)\u00a02(11), 107\u2013120 (2012), \n                    http:\/\/www.ijarcsse.com\n                  , ISSN (Online): 2277 128X, ISSN (Print): 2277 6451"},{"issue":"3","key":"32_CR6","doi-asserted-by":"publisher","first-page":"64","DOI":"10.4018\/jsse.2013070104","volume":"4","author":"N. Rjaibi","year":"2013","unstructured":"Rjaibi, N., Rabai, L.B.A., Aissa, B.A., Mili, A.: Mean failure Cost as a Measurable Value and Evidence of Cybersecurity: E-learning Case Study. International Journal of Secure Software Engineering (IJSSE)\u00a04(3), 64\u201381 (2013), \n                    http:\/\/www.igi-global.com\/ijsse\n                  , doi:10.4018\/jsse.2013070104","journal-title":"International Journal of Secure Software Engineering (IJSSE)"},{"key":"32_CR7","unstructured":"Rjaibi, N., Rabai, L.B.A., Aissa, B.A.: A basic security requirements taxonomy to quantify security threats: an e-learning application. In: Proceedings of the Third International Conference on Digital Information Processing and Communications (ICDIPC 2013), Session: Information security, Islamic Azad University (IAU), Dubai, United Arab Emirates (UAE), January 30-February 1, pp. 96\u2013105 (2013), \n                    http:\/\/www.sdiwc.net\/conferences\/2013\/Dubai\/\n                  , ISBN: 978-0-9853483-3-5 \u00a92013 SDIWC"},{"issue":"2","key":"32_CR8","first-page":"23","volume":"2","author":"N. Rjaibi","year":"2013","unstructured":"Rjaibi, N., Rabai, L.B.A., Aissa, A.B.: The Mean Failure Cost Cybersecurity Model toward Security Measures And Associated Mechanisms. International Journal of Cyber-Security and Digital Forensics (IJCSDF)\u00a02(2), 23\u201335 (2013)","journal-title":"International Journal of Cyber-Security and Digital Forensics (IJCSDF)"},{"key":"32_CR9","unstructured":"Aissa, A.B.: Vers une mesure \u00e9conom\u00e9trique de la s\u00e9curit\u00e9 des syst\u00e8mes informatiques, Doctoral dissertation, Faculty of Sciences of Tunis, submitted (Spring 2012)"},{"key":"32_CR10","unstructured":"Nazareth, D.L., Choi, J.A.: System Dynamics Model for Information Security Management. Information & Management (2014)"},{"issue":"5","key":"32_CR11","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1108\/IMCS-07-2013-0053","volume":"22","author":"S. Fenz","year":"2014","unstructured":"Fenz, S., Heurix, J., Neubauer, T., Pechstein, F.: Current challenges in information security risk management. Information Management & Computer Security\u00a022(5), 410\u2013430 (2014)","journal-title":"Information Management & Computer Security"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ins.2013.02.036","volume":"256","author":"N. Feng","year":"2014","unstructured":"Feng, N., Wang, H.J., Li, M.: A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Information Sciences\u00a0256, 57\u201373 (2014)","journal-title":"Information Sciences"},{"key":"32_CR13","unstructured":"Weippl, E.R., Ebner, M.: Security Privacy Challenges in E-Learning 2.0. In: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education\u00a0Healthcare, and Higher Education, pp. 4001\u20134007 (2008)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Raitman, R., Ngo, L., Augar, N., Zhou, W.: Security in the online e-learning environment. In: Fifth IEEE International Conference on Advanced Learning Technologies, ICALT 2005, pp. 702\u2013706. IEEE (2005)","DOI":"10.1109\/ICALT.2005.236"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Weippl, E.: Security In E-Learning, eLearn Magazine. Association for Computing Machinery (ACM), article from\u00a016, 03\u201305 (2005)","DOI":"10.1145\/1070939.1070943"},{"issue":"4","key":"32_CR16","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10257-011-0177-1","volume":"10","author":"A.B. Aissa","year":"2012","unstructured":"Aissa, A.B., Abercrombie, R.K., Sheldon, F.T., Mili, A.: Defining and Computing a Value Based Cyber-Security Measure. Information Systems and e-Business Management\u00a010(4), 433\u2013453 (2012), doi:10.1007\/s10257-011-0177-1","journal-title":"Information Systems and e-Business Management"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18473-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:20:50Z","timestamp":1714746050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18473-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184722","9783319184739"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18473-9_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}