{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:22:41Z","timestamp":1742984561892,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_8","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"131-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Division of Cyber Safety and Security Responsibilities Between Control System Owners and Suppliers"],"prefix":"10.1007","author":[{"given":"Ruth","family":"Skotnes","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"unstructured":"Adler, E., Clark, R.: An Invitation to Social Research \u2013 How It\u2019s Done, Cengage Learning, Stamford, Connecticut (2015)","key":"8_CR1"},{"unstructured":"Sarri, A., Moulinos, K.: Stocktaking, Analysis and Recommendations on the Protection of CIIs, European Union Agency for Network and Information Security, Heraklion, Greece (2016)","key":"8_CR2"},{"issue":"4","key":"8_CR3","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1111\/j.1468-5973.2010.00619.x","volume":"18","author":"Stian Antonsen","year":"2010","unstructured":"Antonsen, S., Almklov, P., Fenstad, J., Nybo, A.: Reliability consequences of liberalization in the electricity sector: Existing research and remaining questions, Journal of Contingencies and Crisis Management, vol. 18(4), pp. 208\u2013219 (2010)","journal-title":"Journal of Contingencies and Crisis Management"},{"unstructured":"Byres, E.: Revealing network threats, fears \u2013 How to use ANSI\/ISA-99 standards to improve control system security, InTech Magazine, pp. 26\u201331, January\/February (2011)","key":"8_CR4"},{"unstructured":"Centre for the Protection of National Infrastructure, Good Practice Guide, Process Control and SCADA Security, Guide 5: Manage Third Party Risk, London, United Kingdom (2015)","key":"8_CR5"},{"unstructured":"Centre for the Protection of National Infrastructure, Security for Industrial Control Systems, Framework Overview, A Good Practice Guide, London, United Kingdom (2015)","key":"8_CR6"},{"unstructured":"Committee of Digital Vulnerabilities in Society, Digital Vulnerability \u2013 Secure Society: Protecting People and Society in a Digitalized World (in Norwegian), Official Norwegian Report (NOU 2015:13) to the Ministry of Justice and Public Security, Oslo, Norway (2015)","key":"8_CR7"},{"unstructured":"European Reference Network for Critical Infrastructure Protection, The ERNCIP Project Platform, Joint Research Centre, Ispra, Italy (2016). \n                    erncip-project.jrc.ec.europa.eu","key":"8_CR8"},{"unstructured":"Hollnagel, E., Paries, J., Woods, D., Wreathhall, J. (Eds.): Resilience Engineering in Practice: A Guidebook, Ashgate Publishing, Burlington, Vermont (2011)","key":"8_CR9"},{"unstructured":"International Society of Automation, ISA99: Industrial Automation and Control Systems Security, Research Triangle Park, North Carolina (2015)","key":"8_CR10"},{"issue":"1-2","key":"8_CR11","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ijcip.2009.02.004","volume":"2","author":"Martin Gilje Jaatun","year":"2009","unstructured":"Jaatun, M., Albrechtsen, E., Line, M., Tondel, I., Longva, O.: A framework for incident response management in the petroleum industry, International Journal of Infrastructure Protection, vol. 2(1-2), pp. 26\u201337 (2009)","journal-title":"International Journal of Critical Infrastructure Protection"},{"doi-asserted-by":"crossref","unstructured":"Johnsen, S.: Resilience at interfaces \u2013 Improvement of safety and security in distributed control systems by web of influence, Information Management and Computer Security, vol. 20(2), pp. 71\u201387 (2012)","key":"8_CR12","DOI":"10.1108\/09685221211235607"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","volume":"9","author":"William Knowles","year":"2015","unstructured":"Knowles, W., Prince, D., Hutchison, D., Disso, J., Jones, K.: A survey of cyber security management in industrial control systems, International Journal of Critical Infrastructure Protection, vol. 9, pp. 52\u201380 (2015)","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"6","key":"8_CR14","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1016\/j.jlp.2013.10.009","volume":"26","author":"H.M. Leith","year":"2013","unstructured":"Leith, H., Piper, J.: Identification and application of security measures for petrochemical industrial control systems, Journal of Loss Prevention in the Process Industries, vol. 26(6), pp. 982\u2013993 (2013)","journal-title":"Journal of Loss Prevention in the Process Industries"},{"key":"8_CR15","first-page":"147","volume-title":"Springer Series in Reliability Engineering","author":"Maria B. Line","year":"2012","unstructured":"Line, M., Tondel, I.: Information and communications technology: Enabling and challenging critical infrastructure, in Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis, P. Hokstad, I. Utne and J. Vatn (Eds.), Springer, London, United Kingdom, pp. 147\u2013160 (2012)"},{"issue":"4","key":"8_CR16","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A. Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of cyber-warfare, Computers and Security, vol. 31(4), pp. 418\u2013436 (2012)","journal-title":"Computers & Security"},{"unstructured":"Norwegian Business and Industry Security Council, Norwegian Computer Crime and Security Survey \u2013 Information Security, Privacy and Data Crime (in Norwegian), Oslo, Norway (2014)","key":"8_CR17"},{"unstructured":"Norwegian Ministry of Justice and Public Security, National Cyber Security Strategy for Norway, Oslo, Norway (2012). \n                    www.regjeringen.no\/en\/dokumenter\/cyber-security-strategy-for-norway-\/id729821","key":"8_CR18"},{"unstructured":"Norwegian Ministry of Petroleum and Energy, Facts 2013: Energy and Water Resources in Norway, Oslo, Norway (2013). \n                    www.regjeringen.no\/globalassets\/upload\/oed\/faktaheftet\/facts_energy_water.pdf","key":"8_CR19"},{"unstructured":"Norwegian Water Resources and Energy Directorate, Guideline for Contingency Planning Regulations, Guideline No. 1-2013 (in Norwegian), Oslo, Norway (2013)","key":"8_CR20"},{"unstructured":"Perez, E.: U.S. investigators find proof of cyberattack on Ukraine power grid, CNN, February 3, 2016","key":"8_CR21"},{"key":"8_CR22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.ijcip.2014.12.005","volume":"9","author":"Richard Piggin","year":"2015","unstructured":"Piggin, R.: Are industrial control systems ready for the cloud? International Journal of Critical Infrastructure Protection, vol. 9, pp. 38\u201340 (2015)","journal-title":"International Journal of Critical Infrastructure Protection"},{"unstructured":"Skotnes, R.: Strengths and weaknesses of technical standards for management of ICT safety and security in electric power supply network companies, Journal of Risk and Governance, vol. 3(2), pp. 119\u2013134 (2012)","key":"8_CR23"},{"unstructured":"Skotnes, R.: Risk perception regarding the safety and security of ICT systems in electric power supply network companies, Safety Science Monitor, vol. 19(1), article no. 4 (2015)","key":"8_CR24"},{"key":"8_CR25","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.ssci.2015.03.008","volume":"77","author":"Ruth \u00d8stgaard Skotnes","year":"2015","unstructured":"Skotnes, R., Engen, O.: Attitudes toward risk regulation \u2013 Prescriptive or functional regulation? Safety Science, vol. 77, pp. 10\u201318 (2015)","journal-title":"Safety Science"},{"doi-asserted-by":"crossref","unstructured":"Stefanini, A., Doorman, G., Hadjsaid, N.: ICT vulnerabilities of power systems: Towards a roadmap for future research, in Critical Information Infrastructures Security, J. Lopez and B. Hammerli (Eds.), Springer, Berlin Heidelberg, Germany, pp. 13\u201324 (2008)","key":"8_CR26","DOI":"10.1007\/978-3-540-89173-4_2"},{"unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, Gaithersburg, Maryland (2011)","key":"8_CR27"},{"key":"8_CR28","first-page":"13","volume-title":"Springer Series in Reliability Engineering","author":"J\u00f8rn Vatn","year":"2012","unstructured":"Vatn, J., Hokstad, P., Utne, I.: Defining concepts and categorizing interdependencies, in Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis, P. Hokstad, I. Utne and J. Vatn (Eds.), Springer, London, United Kingdom, pp. 13\u201322 (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T01:06:54Z","timestamp":1604711214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}