{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:24:09Z","timestamp":1743125049787,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_3","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"43-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mitigating Emergent Vulnerabilities in Oil and Gas Assets via Resilience"],"prefix":"10.1007","author":[{"given":"Stig","family":"Johnsen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"unstructured":"Ask, R., Roisli, R., Johnsen, S., Line, M., Ueland, A., Hovland, B., Groteide, L., Birkeland, B., Steinbakk, A., Hagelsteen, E., Rong, C., Losnedahl, T.: Information Security Baseline Requirements for Process Control, Safety and Support ICT Systems, Norwegian Oil and Gas Association, Stavanger, Norway (2006)","key":"3_CR1"},{"unstructured":"Byres, E.: Using ANSI\/ISA-99 Standards to Improve Control System Security (plus White Paper), Tofino Security, Lantzville, Canada (2012)","key":"3_CR2"},{"unstructured":"Committee of Digital Vulnerabilities in Society: Digital Vulnerability - Secure Society: Protecting People and Society in a Digitalized World (in Norwegian), Official Norwegian Report (NOU 2015: 13) to the Ministry of Justice and Public Security, Oslo, Norway (2015)","key":"3_CR3"},{"unstructured":"European Council, Council Directive 2008\/114\/EC on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection. Brussels, Belgium (2008)","key":"3_CR4"},{"unstructured":"Falliere, N., O\u2019Murchu, L., Chien, E.: W32.Stuxnet Dossier, Symantec, Mountain View, California (2011)","key":"3_CR5"},{"unstructured":"Federal Office for Information Security: The IT Security Situation in Germany in 2014, Bonn, Germany (2014)","key":"3_CR6"},{"doi-asserted-by":"crossref","unstructured":"Flage, R., Aven, T.: Emerging risk - Conceptual definition and a relation to black swan type of events, Reliability Engineering and System Safety, vol. 144, pp. 61\u201367 (2015)","key":"3_CR7","DOI":"10.1016\/j.ress.2015.07.008"},{"unstructured":"German Institute for Standardization (DIN), Standard DIN CWA 16649, Managing Emerging Technology-Related Risks, Berlin, Germany (2013)","key":"3_CR8"},{"unstructured":"Hollnagel, E., Woods, D., Leveson, N. (eds.): Resilience Engineering: Concepts and Precepts, CRC Press, Boca Raton, Florida (2006)","key":"3_CR9"},{"unstructured":"International Risk Governance Council: Guidelines for Emerging Risk Governance, Lausanne, Switzerland (2015)","key":"3_CR10"},{"unstructured":"International Standards Organization: ISO 19011: 2011, Guidelines for Auditing Management Systems, Geneva, Switzerland (2011)","key":"3_CR11"},{"doi-asserted-by":"crossref","unstructured":"Jansen, S., Finkelstein, A., Brinkkemper, S.: A sense of community: A research agenda for software ecosystems, Proceedings of the Thirty-First International Conference on Software Engineering, Companion Volume, pp. 187\u2013190 (2009)","key":"3_CR12","DOI":"10.1109\/ICSE-COMPANION.2009.5070978"},{"unstructured":"Johnsen, S. : An Investigation of Resilience in Complex Socio-Technical Systems to Improve Safety and Continuity in Integrated Operations, Ph.D. Dissertation, Department of Computer and Information Science, Norwegian University of Science and Technology, Trondheim, Norway (2012)","key":"3_CR13"},{"doi-asserted-by":"crossref","unstructured":"Johnsen, S.: A comparative study of the Norwegian cyber security strategy vs. strategies in the EU and U.S. - Emerging cybersafety ignored, in Safety and Reliability of Complex Engineered Systems, L. Podofillini, B. Sudret, B. Stojadinovic, E. Zio and W. Kroger (Eds.), CRC Press\/Balkema, Leiden, The Netherlands, pp. 3485\u20133492 (2015)","key":"3_CR14","DOI":"10.1201\/b19094-459"},{"doi-asserted-by":"crossref","unstructured":"Johnsen, S. , Ask, R., Roisli, R.: Reducing risk in oil and gas production operations, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 83\u201395 (2008)","key":"3_CR15","DOI":"10.1007\/978-0-387-75462-8_7"},{"unstructured":"Johnsen, S., Bjorkli, C., Steiro, T., Fartum, H., Haukenes, H., Ramberg, J., Skriver, J.: CRIOP: A Scenario Method for Crisis Intervention and Operability Analysis. SINTEF, Trondheim, Norway (2011)","key":"3_CR16"},{"doi-asserted-by":"crossref","unstructured":"Johnsen, S., Oren, A.: Ten years from risk assessment to regulatory action - Is complacency creating a reactive and brittle regulatory regime in Norway? in Safety and Reliability of Complex Engineered Systems, L. Podofillini, B. Sudret, B. Stojadinovic, E. Zio and W. Kroger (Eds.), CRC Press\/Balkema, Leiden, The Netherlands, pp. 3333\u20133339 (2015)","key":"3_CR17","DOI":"10.1201\/b19094-439"},{"issue":"1\/2","key":"3_CR18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJCIS.2013.051608","volume":"9","author":"Eric Luiijf","year":"2013","unstructured":"Luiijf, E., Basseling, K., de Graaf, P.: Nineteen national cyber security strategies, International Journal of Critical Infrastructures, vol.9(1\u20132), pp. 3\u201331 (2013)","journal-title":"International Journal of Critical Infrastructures"},{"issue":"10","key":"3_CR19","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1016\/j.ssci.2009.01.004","volume":"47","author":"Jonas Lundberg","year":"2009","unstructured":"Lundberg, J., Rollenhagen, C., Hollnagel, E.: What-you-look-for-is-what-you-find: The consequences of underlying accident models in eight accident investigation manuals, Safety Science, vol.47(10), pp. 1297\u20131311 (2009)","journal-title":"Safety Science"},{"unstructured":"National Transportation Safety Board, Supervisory Control and Data Acquisition (SCADA) in Liquid Pipelines, Safety Study NTSB\/SS-05\/02, PB2005-917005, Notation 7505A, Washington, DC (2005)","key":"3_CR20"},{"unstructured":"Norwegian Ministry of Defense: The Security Act (in Norwegian), Oslo, Norway (1998)","key":"3_CR21"},{"unstructured":"Norwegian Ministry of Defense: Measures for Protecting Objects (in Norwegian), Oslo, Norway (2011)","key":"3_CR22"},{"unstructured":"Norwegian Ministry of Justice and Public Security: Statement on Safety and Security, Report 17 (2001\u20132002), Oslo, Norway (2002)","key":"3_CR23"},{"unstructured":"Norwegian Ministry of Justice and Public Security: National Cyber Security Strategy for Norway, Oslo, Norway (2012)","key":"3_CR24"},{"unstructured":"Norwegian Ministry of Justice and Public Security: The Implementation of the EPCIP Directive, Oslo, Norway (2012)","key":"3_CR25"},{"unstructured":"Norwegian National Security Authority: Guideline for Protecting Objects, Oslo, Norway (2014)","key":"3_CR26"},{"unstructured":"Norwegian National Security Authority: Safety Report 2014, Oslo, Norway (2014)","key":"3_CR27"},{"unstructured":"Norwegian Police Directorate: Response on Measures for Protecting Objects, Oslo, Norway (2009)","key":"3_CR28"},{"unstructured":"Petroleum Safety Authority of Norway: Safety System Independence in Focus, Stavanger, Norway (2010)","key":"3_CR29"},{"unstructured":"Petroleum Safety Authority of Norway, Review of ICT - Security in Drilling, Process Control, Safety and Support Systems within the Oil and Gas Sector (in Norwegian), Stavanger, Norway (2013)","key":"3_CR30"},{"unstructured":"Petroleum Safety Authority of Norway, Regulations Relating to Design and Outfitting of Facilities, etc. in the Petroleum Activities (The Facilities Regulations), Stavanger, Norway (2015)","key":"3_CR31"},{"unstructured":"Petroleum Safety Authority of Norway: Trends in Risk Level, Stavanger, Norway (2015)","key":"3_CR32"},{"unstructured":"Rauscher, K., Yaschenko, V. (eds.) Russia-U.S. Bilateral on Cybersecurity:Critical Terminology Foundations, Issue 1, EastWest Institute,New York and Information Security Institute, Moscow State University, Moscow, Russia (2011)","key":"3_CR33"},{"unstructured":"Robertson, J., Riley, M.: Mysterious \u201908 Turkey pipeline blast opened new cyberwar, Bloomberg, December 10, 2014","key":"3_CR34"},{"key":"3_CR35","series-title":"Terrorism, Security, and Computation","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-25760-0","volume-title":"The Global Cyber-Vulnerability Report","author":"V.S. Subrahmanian","year":"2015","unstructured":"Subrahmanian, V., Ovelgonne, M., Dumitras, T., Prakash, B.: The Global Cyber-Vulnerability Report. Springer International Publishing, Cham, Switzerland (2015)"},{"unstructured":"U.S. Department of Defense, Department of Defense Standard Practice: System Safety, MIL-STD-882E, Washington, DC (2012)","key":"3_CR36"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T01:05:43Z","timestamp":1604711143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}