{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:31:14Z","timestamp":1742988674130,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_31","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"451-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?"],"prefix":"10.1007","author":[{"given":"Ahto","family":"Buldas","sequence":"first","affiliation":[]},{"given":"M\u00e4rt","family":"Saarepera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"31_CR1","unstructured":"Baran, P.: Reliable Digital Communications Systems Using Unreliable Network Repeater Nodes. RAND Corporation P-1995 (1960). https:\/\/www.rand.org\/content\/dam\/rand\/pubs\/papers\/2008\/P1995.pdf"},{"key":"31_CR2","unstructured":"Baran, P.: On Distributed Communications. RAND Corporation P-2626 (1962). https:\/\/www.rand.org\/content\/dam\/rand\/pubs\/papers\/2005\/P2626.pdf"},{"key":"31_CR3","first-page":"167","volume-title":"Organizational, Legal and Technological Dimensions of Information System Administrator","author":"Y Cherdantseva","year":"2013","unstructured":"Cherdantseva, Y., Hilton, J.: Information security and information assurance. The discussion about the meaning, scope and goals. In: Almeida, F., Portela, I. (eds.) Organizational, Legal and Technological Dimensions of Information System Administrator, pp. 167\u2013198. IGI Global Publishing, Hershey (2013). http:\/\/www.igi-global.com\/chapter\/information-security-and-information-assurance\/80717"},{"key":"31_CR4","doi-asserted-by":"publisher","unstructured":"Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: Proceedings of ARES 2013, pp. 546\u2013555 (2013). doi:10.1109\/ARES.2013.72","DOI":"10.1109\/ARES.2013.72"},{"key":"31_CR5","unstructured":"War in the fifth domain. Are the mouse and keyboard the new weapons of conflict? Econ., 1 July 2010. http:\/\/www.economist.com\/node\/16478792"},{"key":"31_CR6","unstructured":"http:\/\/www.fairinstitute.org"},{"key":"31_CR7","unstructured":"https:\/\/www.bsi.bund.de\/EN\/Topics\/ITGrundschutz\/itgrundschutz_node.html"},{"key":"31_CR8","unstructured":"Herley, C.: The unfalsifiability of security claims. In: Proceedings National Academy of Sciences, May (2016). https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2015\/09\/unfalsifiabilityOfSecurityClaims.pdf"},{"key":"31_CR9","unstructured":"Nakashima, E.: Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post, 2 June 2012"},{"key":"31_CR10","unstructured":"Caldwell, L.A., Winter, T.: FBI Releases Notes From Interview With Hillary Clinton Over Emails. NBCNews, 3 September 2016. http:\/\/www.nbcnews.com\/politics\/2016-election\/fbi-releases-documents-hillary-clinton-s-interview-n642126"},{"key":"31_CR11","unstructured":"OECD\u2019s Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. OECD (2002). http:\/\/www.oecd.org\/internet\/ieconomy\/15582260.pdf"},{"key":"31_CR12","volume-title":"Fighting Computer Crime","author":"DB Parker","year":"1998","unstructured":"Parker, D.B.: Fighting Computer Crime. Wiley, New York (1998). ISBN 0-471-16378-3"},{"issue":"11","key":"31_CR13","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/PROC.1978.11141","volume":"66","author":"LG Roberts","year":"1978","unstructured":"Roberts, L.G.: The evolution of packet switching. Proc. IEEE 66(11), 1307\u20131313 (1978). http:\/\/www.packet.cc\/files\/ev-packet-sw.html","journal-title":"Proc. IEEE"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Hayden, C., Feringa, A.: Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision A. NIST Special Publication 800\u201327 Rev A (2004). http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-27A\/SP800-27-RevA.pdf","DOI":"10.6028\/NIST.SP.800-27ra"},{"key":"31_CR15","unstructured":"Traynor, I.: Russia accused of unleashing cyberwar to disable Estonia. Guardian (2007). https:\/\/www.theguardian.com\/world\/2007\/may\/17\/topstories3.russia"},{"key":"31_CR16","unstructured":"Internet out hits tourism sector. Myanmar Times, 2 November 2010. http:\/\/www.burmanet.org\/news\/2010\/11\/02\/myanmar-times-internet-out-hits-tourism-sector\/"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:59:49Z","timestamp":1625104789000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}