{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:58:22Z","timestamp":1725829102735},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242545"},{"type":"electronic","value":"9783319242552"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_18","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T09:51:13Z","timestamp":1441446673000},"page":"243-251","source":"Crossref","is-referenced-by-count":0,"title":["Risk Classification of Data Transfer in Medical Systems"],"prefix":"10.1007","author":[{"given":"Dagmar","family":"Rosenbrand","sequence":"first","affiliation":[]},{"given":"Rob","family":"de Weerd","sequence":"additional","affiliation":[]},{"given":"Lex","family":"Bothe","sequence":"additional","affiliation":[]},{"given":"Jan Jaap","family":"Baalbergen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"18_CR1","unstructured":"Volkskrant (2014). \n                      http:\/\/www.volkskrant.nl\/dossier-zorg\/risico-uitval-draadloos-netwerk-in-zorginstellingen-onderschat~a3633074\/"},{"issue":"12","key":"18_CR2","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.2146\/ajhp080389","volume":"66","author":"TL Hanuscak","year":"2009","unstructured":"Hanuscak, T.L., Szeinback, S.L., Seoane-Vazquez, E., Reichert, B.J., McCluskey, C.F.: Evaluation of causes and frequency of medication errors during information technology downtime. Am. J. Health Syst. Pharm. 66(12), 1119\u20131125 (2009)","journal-title":"Am. J. Health Syst. Pharm."},{"key":"18_CR3","unstructured":"Campbell, E.M., Sittig, D.N., Guappone, K.P., Dykstra, R.H., Ash, J.S.: Overdependence on technology: an unintended adverse consequence of computerized provider order entry. In: AMIA Annual Symposium Proceedings, pp. 94\u201398 (2007)"},{"issue":"14","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1001\/archinternmed.2011.327","volume":"171","author":"DF Sittig","year":"2011","unstructured":"Sittig, D.F., Singh, H.: Defining health information technology-related errors: new developments since to err is human. Arch. Intern. Med. 171(14), 1281\u20131284 (2011)","journal-title":"Arch. Intern. Med."},{"key":"18_CR5","unstructured":"Skipr (2014). \n                      http:\/\/www.skipr.nl\/actueel\/id18982-ziekenhuis-weinig-alert-op-cybersecurity.html"},{"key":"18_CR6","unstructured":"Telegraph (2014). \n                      http:\/\/www.telegraph.co.uk\/news\/science\/science-news\/11212777\/Terrorists-could-hack-pacemakers-like-in-Homeland-say-security-experts.html"},{"key":"18_CR7","unstructured":"Volkskrant (2013). \n                      http:\/\/www.volkskrant.nl\/dossier-archief\/hoe-hackers-ons-in-het-hart-raken~a3537587\/"},{"key":"18_CR8","unstructured":"Austrian Times (2012). \n                      http:\/\/austriantimes.at\/news\/General_News\/2012-12-01\/45780\/Patient%20hackers%20managed%20to%20dial%20a%20drug%20in%20hospital"},{"key":"18_CR9","unstructured":"The Economist (2014). \n                      http:\/\/www.economist.com\/news\/special-report\/21606416-companies-markets-and-countries-are-increasingly-under-attack-cyber-criminals"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. Computer Science Department Faculty Publication Series. Paper 68 (2008)","DOI":"10.1109\/SP.2008.31"},{"key":"18_CR11","unstructured":"Himss: Himss System Risk Analysis Survey Report (2012)"},{"key":"18_CR12","unstructured":"European Commission DG Health and Consumers: Medical Devices: Directive 93\/42\/EEC"},{"key":"18_CR13","unstructured":"European Parliament and Council of the European Union: Medical Devices: Guidance Document \u2013 Classification of Medical Devices MEDDEV 2.4\/1 Rev. 9 (2010)"},{"key":"18_CR14","unstructured":"Ekker, A., van Rest, B.: Medische apps, is certificeren nodig? Nictiz (2013)"},{"key":"18_CR15","unstructured":"International Electrotechnical Commission (IEC): International Standard IEC 80001-1: Application of Risk Management for IT-networks Incorporating Medical Devices \u2013 Part 1: Roles, responsibilities and activities (2010)"},{"key":"18_CR16","unstructured":"NEderlandse Norm (NEN): NEN7510:2011 Medische Informatica \u2013 Informatiebeveiliging in de Zorg (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:56:34Z","timestamp":1559238994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}