{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:35:23Z","timestamp":1742978123608,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319326887"},{"type":"electronic","value":"9783319326894"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32689-4_42","type":"book-chapter","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T05:18:24Z","timestamp":1463548704000},"page":"547-560","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automated Identification and Prioritization of Business Risks in e-service Networks"],"prefix":"10.1007","author":[{"given":"Dan","family":"Ionita","sequence":"first","affiliation":[]},{"given":"Roel J.","family":"Wieringa","sequence":"additional","affiliation":[]},{"given":"Jaap","family":"Gordijn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,19]]},"reference":[{"unstructured":"Reaves, B., Shernan, E., Bates, A., Carter, H., Traynor, P.: Boxed out: Blocking cellular interconnect bypass fraud at the network edge. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 833\u2013848. Washington, D.C., USENIX Association, August 2015","key":"42_CR1"},{"doi-asserted-by":"crossref","unstructured":"Mohan, K., Ramesh, B.: Ontology-based support for variability management in product and families. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, pp. 9\u201318, January 2003","key":"42_CR2","DOI":"10.1109\/HICSS.2003.1174190"},{"key":"42_CR3","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-540-37017-8_15","volume-title":"E-Service Intelligence","author":"J Carbo","year":"2007","unstructured":"Carbo, J., Garcia, J., Molina, J.: Trust and reputation in e-services: concepts, models and applications. In: Lu, J., Zhang, G., Ruan, D. (eds.) E-Service Intelligence. Studies in Computational Intelligence, vol. 37, pp. 327\u2013345. Springer, Berlin Heidelberg (2007)"},{"key":"42_CR4","series-title":"Service Science: Research and Innovations in the Service Economy","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4419-7904-9_4","volume-title":"Service Systems Implementation","author":"YH Tan","year":"2011","unstructured":"Tan, Y.H., Hofman, W., Gordijn, J., Hulstijn, J.: A framework for the design of service systems. In: Demirkan, H., Spohrer, J.C., Krishna, V. (eds.) Service Systems Implementation. Service Science: Research and Innovations in the Service Economy, pp. 51\u201374. Springer, New York (2011)"},{"key":"42_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/978-3-642-36285-9_68","volume-title":"Business Process Management Workshops","author":"I Soomro","year":"2013","unstructured":"Soomro, I., Ahmed, N.: Towards security risk-oriented misuse cases. In: La Rosa, M., Soffer, P. (eds.) BPM Workshops 2012. LNBIP, vol. 132, pp. 689\u2013700. Springer, Heidelberg (2013)"},{"doi-asserted-by":"crossref","unstructured":"Yu, E.S.K.: Models for supporting the redesign of organizational work. In: Proceedings of Conference on Organizational Computing Systems, COCS 1995, pp. 226\u2013236. ACM, New York (1995)","key":"42_CR6","DOI":"10.1145\/224019.224044"},{"key":"42_CR7","series-title":"Massive Computing","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1007\/978-1-4615-0005-6_26","volume-title":"Handbook of Massive Data Sets","author":"M Cahill","year":"2002","unstructured":"Cahill, M., Lambert, D., Pinheiro, J., Sun, D.: Detecting fraud in the real world. In: Abello, J., Pardalos, P.M., Resende, M.G.C. (eds.) Handbook of Massive Data Sets. Massive Computing, vol. 4, pp. 911\u2013929. Springer, New York (2002)"},{"key":"42_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-25897-3_16","volume-title":"The Practice of Enterprise Modeling","author":"D Ionita","year":"2015","unstructured":"Ionita, D., Wieringa, R.J., Wolos, L., Gordijn, J., Pieters, W.: Using value models for business risk analysis in e-service networks. In: Ralyt\u00e9, J., et al. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 239\u2013253. Springer, Heidelberg (2015). doi:\n                    10.1007\/978-3-319-25897-3_16"},{"key":"42_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-03132-8_6","volume-title":"Value Creation in E-Business Management","author":"M Ruch","year":"2009","unstructured":"Ruch, M., Sackmann, S.: Customer-specific transaction risk management in e-commerce. In: Nelson, M.L., Shaw, M.J., Strader, T.J. (eds.) AMCIS 2009. LNBIP, vol. 36, pp. 68\u201379. Springer, Heidelberg (2009)"},{"key":"42_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2627534.2627538","volume":"41","author":"L Dritsoula","year":"2014","unstructured":"Dritsoula, L., Musacchio, J.: A game of clicks: Economic incentives to fight click fraud in ad networks. Perform. Eval. Rev. 41, 12\u201315 (2014)","journal-title":"Perform. Eval. Rev."},{"unstructured":"Pieters, W., Banescu, S., Posea, S.: System abuse by service composition: Analysis and prevention. In: CESUN 2012: 3rd International Engineering Systems Symposium Delft University of Technology, The Netherlands, pp. 18\u201320, June 2012","key":"42_CR11"},{"issue":"3","key":"42_CR12","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"RJ Bolton","year":"2002","unstructured":"Bolton, R.J.: Statistical fraud detection: A review. Stat. Sci. 17(3), 235\u2013249 (2002)","journal-title":"Stat. Sci."},{"issue":"4","key":"42_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/5254.941353","volume":"16","author":"J Gordijn","year":"2001","unstructured":"Gordijn, J., Akkermans, H.: Designing and evaluating e-business models. IEEE Intell. Syst. 16(4), 11\u201317 (2001)","journal-title":"IEEE Intell. Syst."},{"issue":"2","key":"42_CR14","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.tele.2008.02.003","volume":"26","author":"TJ Gerpott","year":"2009","unstructured":"Gerpott, T.J.: Biased choice of a mobile telephony tariff type: Exploring usage boundary perceptions as a cognitive cause in choosing between a use-based or a flat rate plan. Telematics Inform. 26(2), 167\u2013179 (2009)","journal-title":"Telematics Inform."},{"unstructured":"Scourias, J.: Overview of the global system for mobile communications. Technical report (1995)","key":"42_CR15"},{"key":"42_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-45394-6_5","volume-title":"Conceptual Modeling for E-Business and the Web","author":"J Gordijn","year":"2000","unstructured":"Gordijn, J., Akkermans, H., van Vliet, H.: Business modelling is not process modelling. In: Mayr, H.C., Liddle, S.W., Thalheim, B. (eds.) ER Workshops 2000. LNCS, vol. 1921, pp. 40\u201351. Springer, Heidelberg (2000)"},{"unstructured":"Ionita, D., Koenen, S.K., Wieringa, R.J.: Modelling telecom fraud with e3value. Technical report TR-CTIT-14-11, Centre for Telematics and Information Technology, University of Twente, Enschede, October 2014","key":"42_CR17"},{"unstructured":"Ross, S.: How does revenue sharing work in practice? Investopedia (2015). \n                    http:\/\/www.investopedia.com\/ask\/answers\/010915\/how-does-revenue-sharing-work-practice.asp\n                    \n                  . Accessed 12 December 2015","key":"42_CR18"}],"container-title":["Lecture Notes in Business Information Processing","Exploring Services Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32689-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T05:14:04Z","timestamp":1558502044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32689-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319326887","9783319326894"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32689-4_42","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}