{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T22:03:38Z","timestamp":1761948218308,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_2","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"27-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Critical Infrastructure Asset Identification: Policy, Methodology and Gap Analysis"],"prefix":"10.1007","author":[{"given":"Christine","family":"Izuakor","sequence":"first","affiliation":[]},{"given":"Richard","family":"White","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, D., Kelcher, P., Smith, P.: Towards an assessment tool for the strategic management of asset criticality, in Engineering Asset Management, J. Mathew, J. Kennedy, L. Ma, A. Tan and D. Anderson (Eds.), pp. 1232\u20131242 (2006)","DOI":"10.1007\/978-1-84628-814-2_136"},{"key":"2_CR2","volume-title":"Policy Statement","author":"Australian Government, Critical Infrastructure Reliance Strategy","year":"2015","unstructured":"Australian Government, Critical Infrastructure Reliance Strategy: Policy Statement. Barton, Australia (2015)"},{"key":"2_CR3","unstructured":"Bouchon, S.: The Vulnerability of Interdependent Critical Infrastructure Systems: Epistemological and Conceptual State-of-the-Art, EUR 22205 EN, Institute for the Protection and Security of the Citizen, European Commission Joint Research Centre, Ispra, Italy (2006)"},{"key":"2_CR4","unstructured":"CIPedia, CIPedia Main Page (2016). www.cipedia.eu"},{"key":"2_CR5","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/S1462-9011(00)00022-8","volume":"3","author":"Dennis J Dunning","year":"2000","unstructured":"Dunning, D., Ross, Q., Merkhofer, M.: Multiattribute utility analysis for addressing Section 316(b) of the Clean Water Act, Environmental Science and Policy, vol.3(S1), 7\u201314 (2000)","journal-title":"Environmental Science & Policy"},{"key":"2_CR6","unstructured":"European Commission, Commission Staff Working Document on the Reviewof the European Programme for Critical Infrastructure Protection(EPCIP), SWD(2012) 190 Final, Brussels, Belgium (2012)"},{"key":"2_CR7","unstructured":"European Council, Council Directive 2008\/114\/EC on the Identificationand Designation of European Critical Infrastructures and the Assessmentof the Need to Improve Their Protection, Brussels, Belgium (2008)"},{"key":"2_CR8","unstructured":"Giannopoulos, G., Filippini, R., Schimmer, M.: Risk AssessmentMethodologiesfor Critical Infrastructure Protection, Part 1: A State of the Art,JRC 70046, European Commission Joint Research Centre, Ispra, Italy (2012)"},{"key":"2_CR9","unstructured":"Government of Canada: National Strategy for Critical Infrastructure. Ottawa, Canada (2009)"},{"key":"2_CR10","unstructured":"Halim, M., Mohammed, A.: Identification of critical level of assets by using analytic hierarchy process for water assets management, International Journal of Technical Research and Applications, vol. 2(S1), pp. 54\u201358 (2014)"},{"issue":"9","key":"2_CR11","doi-asserted-by":"crossref","first-page":"1176","DOI":"10.1080\/15732479.2013.795978","volume":"10","author":"Golam Kabir","year":"2013","unstructured":"Kabir, G., Sadiq, R., Tesfamariam, S.: A review of multi-criteria decision-making methods for infrastructure management, Structure and Infrastructure Engineering: Maintenance, Management, Life-Cycle Design and Performance, vol. 10(9), pp. 1176\u20131210 (2014)","journal-title":"Structure and Infrastructure Engineering"},{"key":"2_CR12","unstructured":"Mattioli, R., Levy-Bencheton, C.: Methodologies for the Identification of Critical Infrastructure Assets and Services. Guidelines for Charting Electronic Data Communication Networks, European Union Agency for Network and Information Security, Heraklion, Greece (2014)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Metzger, J.: The concept of critical infrastructure protection, in Business, Security: Public-Private Sector Relationships in a New Security Environment, A. Bailes and I. Frommelt (Eds.), Oxford University Press, NewYork, pp. 197\u2013209 (2004)","DOI":"10.1093\/oso\/9780199274505.003.0018"},{"key":"2_CR14","unstructured":"Moteff, J.: Critical Infrastructure: The National Asset Database, CRS Report for Congress, RL33648, Congressional Research Service, Washington, DC (2007)"},{"key":"2_CR15","unstructured":"Moteff, J.: Critical Infrastructures: Background, Policy and Implementation, CRS Report for Congress, RL30153, Congressional Research Service, Washington, DC (2015)"},{"key":"2_CR16","unstructured":"Obama, B.: Presidential Policy Directive - Critical Infrastructure Security and Resilience, PPD-21, The White House, Washington, DC (2013)"},{"key":"2_CR17","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.ijcip.2015.05.003","volume":"10","author":"George Stergiopoulos","year":"2015","unstructured":"Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis, International Journal of Critical Infrastructure Protection, vol. 10, pp. 34\u201344 (2015)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"2_CR18","unstructured":"U.S. Department of Defense, Defense Critical Infrastructure Protection: DoD Mission-Based Critical Asset Identification Process, Department of Defense Manual, No. 3020.45, vol. 1, Washington, DC (2008)"},{"key":"2_CR19","unstructured":"U.S. Department of Homeland Security, National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency, Washington, DC,(2009)"},{"key":"2_CR20","unstructured":"U.S. Government, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Public Law 107\u201356, Washington, DC (2001)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"U.S. Government, Homeland Security Act of 2002, Public Law 107\u2013296, Washington, DC, (2002)","DOI":"10.1016\/S1353-4858(02)08004-2"},{"key":"2_CR22","unstructured":"U.S. Government Accountability Office, Defense Critical Infrastructure:Actions Needed to Improve the Consistency, Reliability and Usefulness ofDoD\u2019s Tier 1 Task Critical Asset List, GAO-09-740R, Washington, DC,(2009)"},{"key":"2_CR23","unstructured":"U.S. Government Accountability Office, Critical Infrastructure Protection:DHS List of Priority Assets Needs to Be Validated and Reportedto Congress, Report to Congressional Requesters, GAO-13-296, Washington,DC (2013)"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T09:01:02Z","timestamp":1718874062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}