{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:32:11Z","timestamp":1743071531725,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319253596"},{"type":"electronic","value":"9783319253602"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25360-2_11","type":"book-chapter","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T06:23:32Z","timestamp":1444199012000},"page":"131-139","source":"Crossref","is-referenced-by-count":0,"title":["What\u2019s so Unique about Cyber Security?"],"prefix":"10.1007","author":[{"given":"Kenny","family":"Doyle","sequence":"first","affiliation":[]},{"given":"Zeta","family":"Dooly","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Kearney","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"11_CR1","volume-title":"The Rise of the Network Society","author":"M Castells","year":"2000","unstructured":"Castells, M.: The Rise of the Network Society. Blackwell Publishers Inc., Oxford (2000)"},{"key":"11_CR2","volume-title":"The Network Society: Social Aspects of New Media","author":"J Dijk Van","year":"2005","unstructured":"Van Dijk, J.: The Network Society: Social Aspects of New Media. Sage Publications Ltd., London (2005)"},{"key":"11_CR3","first-page":"370","volume-title":"End of the Millennium","author":"M Castells","year":"1998","unstructured":"Castells, M.: End of the Millennium, p. 370. Blackwell Publishers Inc., Oxford (1998)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Whelan, E., Teigland, R.: Managing information overload: examining the role of the human filter (2010). SSRN 1718455","DOI":"10.2139\/ssrn.1718455"},{"key":"11_CR5","unstructured":"Sintef Big Data, for better or worse: 90\u00a0% of world\u2019s data generated over last two years. Science Daily (2013)"},{"key":"11_CR6","unstructured":"Europol. https:\/\/www.europol.europa.eu\/ec\/cybercrime-growing"},{"key":"11_CR7","unstructured":"IPACSO Innovation Framework for ICT Security Deliverable D2.2, Market and Regulatory Environment & Industry Analysis Report (2014)"},{"key":"11_CR8","unstructured":"IPACSO Innovation Framework for ICT Security Deliverable D2.3 PACS Technology and Research Spectrum Report (2014)"},{"key":"11_CR9","unstructured":"Jentzsch, N.: IPACSO Innovation Framework for ICT Security Deliverable D4.1 State-of-the-art of the Economics of Cyber security and Privacy (2014)"},{"key":"11_CR10","unstructured":"Kearney, P., Dooly, Z. (eds.): NIS Platform Working Group 3 (WG3) Business Cases and Innovation Paths (2014)"},{"key":"11_CR11","volume-title":"The Rise of the Network Society","author":"M Castells","year":"2000","unstructured":"Castells, M.: The Rise of the Network Society. Blackwell Publishers Inc., Oxford (2000)"},{"key":"11_CR12","doi-asserted-by":"crossref","DOI":"10.4135\/9781446212196","volume-title":"Cybercrime and Society","author":"M Yar","year":"2006","unstructured":"Yar, M.: Cybercrime and Society. Sage Publications Ltd., London (2006)"},{"issue":"3","key":"11_CR13","first-page":"29","volume":"41","author":"K Steinmetz","year":"2015","unstructured":"Steinmetz, K., Gerber, J.: It doesn\u2019t have to be this way: hacker perspectives on privacy. Soc. Justice 41(3), 29\u201351 (2015)","journal-title":"Soc. Justice"},{"key":"11_CR14","volume-title":"Hacking the Human: Social Engineering Techniques and Security Countermeasures","author":"I Mann","year":"2008","unstructured":"Mann, I.: Hacking the Human: Social Engineering Techniques and Security Countermeasures. Ashgate Publishing, Aldershot (2008)"},{"issue":"7","key":"11_CR15","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1177\/0002764213479370","volume":"57","author":"M Sauter","year":"2013","unstructured":"Sauter, M.: LOIC will tear us apart : the impact of tool design and media portrayals in the success of activist DDOS Attacks. Am. Behav. Sci. 57(7), 983\u20131007 (2013)","journal-title":"Am. Behav. Sci."},{"key":"11_CR16","unstructured":"Fox-Brewster, T.: \u2018State sponsored\u2019 Russian hacker group linked to cyber attacks on neighbours. The Guardian London (2014)"},{"key":"11_CR17","unstructured":"Stone, J.: China-Backed Hacking Group Axiom Said to Have Attacked 43,000 Computers. International Business Times USA (2014)"},{"key":"11_CR18","unstructured":"Murphy, M.: War in the fifth domain. Economist (2010). http:\/\/www.economist.com\/node\/16478792"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(08)70031-X","volume":"3","author":"G Fyffe","year":"2008","unstructured":"Fyffe, G.: Addressing the insider threat. Netw. Secur. 3, 11\u201314 (2008)","journal-title":"Netw. Secur."},{"issue":"4","key":"11_CR20","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.istr.2010.04.004","volume":"14","author":"C Colwill","year":"2009","unstructured":"Colwill, C.: Human factors in information security: the insider threat \u2013 who can you trust these days? Inf. Secur. Tech. Rep. 14(4), 186\u2013196 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"11_CR21","unstructured":"IPACSO D2.2, Market and Regulatory Environment & Industry Analysis Report (2014)"},{"key":"11_CR22","unstructured":"Jentzcsh, N.: IPACSO Innovation Framework for ICT Security Deliverable D4.1. Market and Regulatory Environment & Industry Analysis Report (2015)"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25360-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,22]],"date-time":"2022-05-22T19:20:21Z","timestamp":1653247221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25360-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319253596","9783319253602"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25360-2_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}