{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:09:16Z","timestamp":1743070156153,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_11","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"158-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modeling Cyber Systemic Risk for the Business Continuity Plan of a Bank"],"prefix":"10.1007","author":[{"given":"Angelo","family":"Furfaro","sequence":"first","affiliation":[]},{"given":"Teresa","family":"Gallo","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Sacc\u00e0","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"11_CR1","unstructured":"Business continuity oversight expectations for systemically important payment systems (SIPS). Report, Eurpean Central Bank (2006). \n                      https:\/\/www.ecb.europa.eu\/pub\/pdf\/other\/businesscontinuitysips2006en.pdf"},{"key":"11_CR2","unstructured":"ESCB definitions of major business continuity terms in relation to payment and securities settlement systems. European Central Bank, June 2007"},{"key":"11_CR3","unstructured":"Business Process Model and Notation$$^{\\rm TM}$$ v. 2.0. Spec. formal\/2011-01-03, Object Management Group (2011). \n                      http:\/\/www.omg.org\/spec\/BPMN\/2.0\/"},{"key":"11_CR4","unstructured":"Principles for financial market infrastructures. Press release ISBN 92-9197-108-1, Bank for International Settlements Committee on Payment and Settlement Systems (CPSS) and IOSCO Technical Committee (2012)"},{"key":"11_CR5","unstructured":"Cyber Risk a Global Systemic Threat: A White Paper to the Industry on Systemic Risk. White paper, Depository Trust & Clearing Corporation (DTCC), October 2014. \n                      http:\/\/www.dtcc.com\/%7e\/media\/Files\/Downloads\/issues\/risk\/cyber-risk.pdf"},{"key":"11_CR6","unstructured":"Guidelines on business continuity for market infrastructure. guidelines, Bank of Italy (2014). \n                      https:\/\/www.bancaditalia.it\/compiti\/sispaga-mercati\/codise\/Guidelines_business_continuity_market_infrastructures.pdf"},{"key":"11_CR7","unstructured":"DICET-INMOTO - ORganization of Cultural HEritage for Smart Tourism and Real-time Accessibility (OR.C.HE.S.T.R.A.) - Project funded by the Italian Ministry of Education, University and Research (MIUR) - PON Project - Research and Competitiveness 2007\u20132013 (2015)"},{"key":"11_CR8","unstructured":"Market intermediary business continuity and recovery planning. Technical report FR32\/2015, International Organization of Securities Commissions, December 2015. \n                      http:\/\/www.iosco.org\/library\/pubdocs\/pdf\/IOSCOPD523.pdf"},{"key":"11_CR9","unstructured":"Unified Modeling Language$$^{\\rm TM}$$, v. 2.5. Spec. formal\/15-03-01, Object Management Group (2015). \n                      http:\/\/www.omg.org\/spec\/UML\/2.5\/"},{"key":"11_CR10","unstructured":"District of cyber security (2016). \n                      https:\/\/www.distrettocybersecurity.it"},{"key":"11_CR11","unstructured":"The global risks report 2016. Insight report, 11th edn. World Economic Forum (2016). \n                      http:\/\/www3.weforum.org\/docs\/Media\/TheGlobalRisksReport2016.pdf"},{"key":"11_CR12","unstructured":"Handbook on the assessment of compliance with ESRB recommendations. European Systemic Risk Board (2016)"},{"key":"11_CR13","unstructured":"Internet Security Threat Report. vol. 21, Symantec, April 2016"},{"key":"11_CR14","unstructured":"Systemic risk barometer: results overview 2016\u2013Q1. Press release, Depository Trust & Clearing Corporation (DTCC) (2016). \n                      http:\/\/www.dtcc.com\/%7E\/media\/Files\/PDFs\/Systemic-Risk-Barometer-Q1-2016.pdf"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Caire, P., Genon, N., Heymans, P., Moody, D.L.: Visual notation design 2.0: towards user comprehensible requirements engineering notations. In: 21st IEEE International Requirements Engineering Conference (RE 2013), Rio de Janeiro, Brasil, pp. 115\u2013124, July 2013","DOI":"10.1109\/RE.2013.6636711"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Cerutti, E., Claessens, S., McGuire, P.: Systemic risks in global banking: What available data can tell us and what more data are needed? Working Paper 18531, National Bureau of Economic Research, November 2012. \n                      http:\/\/www.nber.org\/papers\/w18531","DOI":"10.3386\/w18531"},{"key":"11_CR17","unstructured":"Chaudhary, R., Hamilton, J.: The five critical attributes of effective cybersecurity risk management - white paper. Technical report, Crowe Horwath LLP (2015)"},{"key":"11_CR18","unstructured":"Citrigno, S., Furfaro, A., Gallo, T., Garro, A., Graziano, S., Sacc\u00e0, D.: Mastering concept exploration in large industrial research projects. In: INCOSE Italia Conference on Systems Engineering (CIISE 2014), Rome, Italy, pp. 26\u201337, 24-25 November 2014"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Furfaro, A., Gallo, T., Garro, A., Sacc\u00e0, D., Tundis, A.: Requirements specification of a cloud service for cyber security compliance analysis. In: Proceedings of the 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech 2016), IEEE, Marrakesh, 24\u201326 May 2016","DOI":"10.1109\/CloudTech.2016.7847700"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Glinz, M.: On non-functional requirements. In: 15th IEEE International Requirements Engineering Conference (RE 2007), pp. 21\u201326. IEEE, New Delhi, October 2007","DOI":"10.1109\/RE.2007.45"},{"key":"11_CR21","unstructured":"Goldsmith, D., Siegel, M.: Systematic approaches to cyber insecurity. Technical report, MIT Sloan School of Management1 - ECIR Working Paper (2012)"},{"issue":"5","key":"11_CR22","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s12297-015-0316-8","volume":"104","author":"T Kosub","year":"2015","unstructured":"Kosub, T.: Components and challenges of integrated cyber risk management. Zeitschrift f\u00fcr die gesamte Versicherungswissenschaft 104(5), 615\u2013634 (2015)","journal-title":"Zeitschrift f\u00fcr die gesamte Versicherungswissenschaft"},{"key":"11_CR23","unstructured":"van Lamsweerde, A.: Goal-oriented requirements enginering: a roundtrip from research to practice [enginering read engineering]. In: 12th IEEE International Requirements Engineering Conference, Kyoto, Japan, pp. 4\u20137, September 2004"},{"key":"11_CR24","unstructured":"Nouy, D.: Single supervisory mechanism after one year: the state of play and the challenges ahead. In: Bank of Italy Conference on Micro and Macroprudential Banking Supervision in the Euro Area, Milan, Italy, 24 November 2015. \n                      https:\/\/www.bankingsupervision.europa.eu\/press\/speeches\/date\/2015\/html\/se151124.en.html"},{"key":"11_CR25","unstructured":"Rissman, D.: US regulators issue guidance on disaster recovery and business continuity planning for hedge funds (2013). \n                      http:\/\/aceits.net\/us-regulators-issue-guidance-on-disaster-recovery-and-business-continuity-planning-for-hedge-funds\/"},{"key":"11_CR26","unstructured":"Sommer, P.: Reducing systemic cybersecurity risk. Oecd\/ifp project on future global shocks, Information Systems and Innovation Group, London School of Economics and Ian Brown, Oxford Internet Institute, Oxford University (2011). \n                      https:\/\/www.oecd.org\/gov\/risk\/46889922.pdf"},{"key":"11_CR27","unstructured":"Tendulkar, R.: Cyber-crime, securities markets and systemic risk. Joint staff working paper, IOSCO Research Department and World Federation of Exchanges (2013). \n                      http:\/\/www.iosco.org\/research\/pdf\/swp\/Cyber-Crime-Securities-Markets-and-Systemic-Risk.pdf"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T00:18:32Z","timestamp":1598055512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}