{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:42:37Z","timestamp":1761896557131,"version":"3.37.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594149"},{"type":"electronic","value":"9783319594156"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_43","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T04:42:30Z","timestamp":1496119350000},"page":"450-463","source":"Crossref","is-referenced-by-count":6,"title":["The Scope of the Collected Data for a Holistic Risk Assessment Performance in the Road Freight Transport Companies"],"prefix":"10.1007","author":[{"given":"Agnieszka","family":"Tubis","sequence":"first","affiliation":[]},{"given":"Sylwia","family":"Werbi\u0144ska-Wojciechowska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"43_CR1","doi-asserted-by":"publisher","unstructured":"Abbass, W., Baina, A., Bellafkih, M.: Survey on information system security risk management alignment. In: Proceedings of 2016 International Conference on Information Technology for Organizations Development (IT4OD), 30 March\u20131 April 2016. IEEE (2016). doi: 10.1109\/IT4OD.2016.7479260","DOI":"10.1109\/IT4OD.2016.7479260"},{"key":"43_CR2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.2495\/DMAN110201","volume":"119","author":"MD Abkowitz","year":"2011","unstructured":"Abkowitz, M.D., Camp, J.S.: An application of enterprise risk management in the marine transportation industry. WIT Trans. Built Environ. 119, 221\u2013232 (2011)","journal-title":"WIT Trans. Built Environ."},{"issue":"5","key":"43_CR3","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1177\/074823378900500514","volume":"5","author":"EL Anderson","year":"1989","unstructured":"Anderson, E.L.: Scientific trends in risk assessment re-search. Toxicol. Ind. Health 5(5), 777\u2013790 (1989)","journal-title":"Toxicol. Ind. Health"},{"key":"43_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ejor.2015.12.023","volume":"253","author":"T Aven","year":"2016","unstructured":"Aven, T.: Risk assessment and risk management: review of recent advances on their foundation. Eur. J. Oper. Res. 253, 1\u201313 (2016)","journal-title":"Eur. J. Oper. Res."},{"key":"43_CR5","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ress.2013.02.020","volume":"115","author":"T Aven","year":"2013","unstructured":"Aven, T.: Practical implications of the new risk perspectives. Reliab. Eng. Syst. Saf. 115, 136\u2013145 (2013)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"43_CR6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.ress.2011.11.006","volume":"99","author":"T Aven","year":"2012","unstructured":"Aven, T.: The risk concept \u2013 historical and recent development trends. Reliab. Eng. Syst. Saf. 99, 119\u2013132 (2012)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"43_CR7","doi-asserted-by":"crossref","first-page":"798","DOI":"10.1016\/j.ssci.2008.10.008","volume":"47","author":"T Aven","year":"2009","unstructured":"Aven, T.: Perspectives on risk in a decision-making context \u2013 review and discussion. Saf. Sci. 47, 798\u2013806 (2009)","journal-title":"Saf. Sci."},{"key":"43_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ress.2004.10.008","volume":"90","author":"T Aven","year":"2005","unstructured":"Aven, T., Kristensen, V.: Perspectives on risk: review and discussion of the basis for establishing a unified and holistic approach. Reliab. Eng. Syst. Saf. 90, 1\u201314 (2005)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"43_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ress.2013.07.005","volume":"121","author":"T Aven","year":"2014","unstructured":"Aven, T., Krohn, B.S.: A new perspective on how to under-stand, assess and manage risk and the unforeseen. Reliab. Eng. Syst. Saf. 121, 1\u201310 (2014)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"9A","key":"43_CR10","first-page":"72","volume":"87","author":"A Bajda","year":"2011","unstructured":"Bajda, A., Laskowski, D., Wrazen, M.: Diagnostics the quality of data transfer in the management of crisis situation. Przegl\u0105d Elektrotechniczny 87(9A), 72\u201378 (2011)","journal-title":"Przegl\u0105d Elektrotechniczny"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Berle, O., Norstad, I., Asjornslett, B.E.: Optimization, risk assessment and resilience in LNG transportation systems. Supply Chain Manage. Int. J. 18(3), 253\u2013264 (2013)","DOI":"10.1108\/SCM-03-2012-0109"},{"key":"43_CR12","unstructured":"Commission Staff Working Document on Transport Security. EU Brussels, SWD (2012)"},{"key":"43_CR13","unstructured":"COSO Enterprise Risk Management \u2013 Integrated Framework. COSO (2004)"},{"key":"43_CR14","unstructured":"Cybersecurity considerations for public transit. Recommended Practice APTA SS-ECS-RP-001-14. American Public Transportation Association (2013). www.apta.com\/resources\/standards\/Documents\/APTA%20SS-ECS-RP-001-14%20RP.pdf , Accessed Jan 2017"},{"key":"43_CR15","unstructured":"The Definitive guide on Risk Management Information system. Aon eSolutions. http:\/\/cdn2.hubspot.net\/hub\/208738\/file-30267257-pdf\/downloadable_content\/The-Definitive-Guide-to-RMIS.pdf , Accessed Jan 2017"},{"key":"43_CR16","first-page":"288","volume":"8","author":"W Ennouri","year":"2013","unstructured":"Ennouri, W.: Risks management: new literature review. Polish J. Manage. Stud. 8, 288\u2013297 (2013)","journal-title":"Polish J. Manage. Stud."},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Gibson, M.: Information systems for risk management. FRB International Finance Discussion Paper No. 585 (July 1997). http:\/\/dx.doi.org\/10.2139\/ssrn.231755 , Accessed Jan 2017","DOI":"10.2139\/ssrn.231755"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Gibson, M.S.: The implications of risk management information systems for the organization of financial firms. International Finance Discussion Paper No. 632 (December 1998). http:\/\/dx.doi.org\/10.2139\/ssrn.146910 , Accessed Jan 2017","DOI":"10.2139\/ssrn.146910"},{"key":"43_CR19","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ress.2015.01.025","volume":"138","author":"F Goerlandt","year":"2015","unstructured":"Goerlandt, F., Montewka, J.: Maritime transportation risk analysis: review and analysis in light of some foundational issues. Reliab. Eng. Syst. Saf. 138, 115\u2013134 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"2","key":"43_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12735\/ier.v2i2p01","volume":"2","author":"J Grabara","year":"2014","unstructured":"Grabara, J., Kolcun, M., Kot, S.: he role of information systems in transport logistics. Int. J. Educ. Res. 2(2), 1\u20138 (2014)","journal-title":"Int. J. Educ. Res."},{"key":"43_CR21","unstructured":"Haimes, Y.Y., Lambert, J. H., Kaplan, S., Pikus, I., Leung, F.: A risk assessment methodology for critical transportation infrastructure. Final contract report no. FHWA\/VTRC 02-CR5. Virginia Transportation Research Council (2002)"},{"key":"43_CR22","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.omega.2014.10.004","volume":"52","author":"I Heckmann","year":"2015","unstructured":"Heckmann, I., Comes, T., Nickel, S.: A critical review on supply chain risk \u2013 definition, measure and modelling. Omega 52, 119\u2013132 (2015)","journal-title":"Omega"},{"key":"43_CR23","unstructured":"Heimbecher, F., Kaundinya I.: Protection of vulnerable infrastructures in a road transport network. In: Transport Research Arena Europe, Brussels, pp. 1\u201310 (2010)"},{"key":"43_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2017.03.002","author":"A Kierzkowski","year":"2017","unstructured":"Kierzkowski, A., Kisiel, T.: A model of check-in system management to reduce the security checkpoint variability. Simul. Model. Pract. Theor. (2017). doi: 10.1016\/j.simpat.2017.03.002","journal-title":"Simul. Model. Pract. Theor."},{"key":"43_CR25","doi-asserted-by":"crossref","unstructured":"Kierzkowski, A.: Method for management of an airport security control system. In: Proceedings of the Institution of Civil Engineers - Transport (2016). http:\/\/dx.doi.org\/10.1680\/jtran.16.00036","DOI":"10.1680\/jtran.16.00036"},{"key":"43_CR26","unstructured":"Kisiel, T., Valis, D., Zak, L.: Application of regression function - two areas for technical system operation assessment. In: CLC 2013: Carpathian Logistics Congress - Congress Proceedings, pp. 500\u2013505 (2013)"},{"key":"43_CR27","first-page":"59","volume":"471","author":"P Lubkowski","year":"2014","unstructured":"Lubkowski, P., Laskowski, D.: Selected issues of reliable identification of object in transport systems using video monitoring services. Telematics \u2013 Support for transport. Commun. Comput. Inf. Sci. 471, 59\u201368 (2014)","journal-title":"Commun. Comput. Inf. Sci."},{"key":"43_CR28","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.jlp.2011.03.004","volume":"24","author":"PK Marhavilas","year":"2011","unstructured":"Marhavilas, P.K., Koulouriotis, D., Gemeni, V.: Risk analysis and assessment methodologies in the work sites: on a review classification and comparative study of the scientific literature of the period 2000-2009. J. Loss Prev. Process Ind. 24, 477\u2013523 (2011)","journal-title":"J. Loss Prev. Process Ind."},{"key":"43_CR29","first-page":"137","volume":"1","author":"M M\u0142y\u0144czak","year":"2011","unstructured":"M\u0142y\u0144czak, M., Nowakowski, T., Valis, D.: How to manage risks? The normative approach (in Polish). Problemy Eksploatacji 1, 137\u2013147 (2011)","journal-title":"Problemy Eksploatacji"},{"key":"43_CR30","unstructured":"Patterson, T.: The use of information technology in risk management. White paper (2015). https:\/\/www.aicpa.org\/InterestAreas\/FRC\/AssuranceAdvisoryServices\/DownloadableDocuments\/ASEC_Whitepapers\/Risk_Technology.pdf , Accessed Jan 2017"},{"key":"43_CR31","unstructured":"PN-ISO 31000:2010: Risk management \u2013 principles and guide-lines. PKN, Warsaw (2010)"},{"key":"43_CR32","doi-asserted-by":"crossref","unstructured":"Restel, F.J.: The Markov reliability and safety model of the railway transportation system. Safety and Reliability: Methodology and Applications. In: Proceedings of the European Safety and Reliability Conference, ESREL 2014, pp. 303\u2013311. Taylor and Francis (2015)","DOI":"10.1201\/b17399-46"},{"key":"43_CR33","unstructured":"Risk and safety in the transport sector RISIT \u2013 A state-of-the-art review of current knowledge. Research Report, The Research Council of Norway. http:\/\/www.forskningsradet.no\/csstorage\/vedlegg\/english_report.pdf , Accessed Jan 2017"},{"key":"43_CR34","unstructured":"RiskConsole Risk Management Information System. Mitsui Sumitomo Insurance Group. http:\/\/www.msigusa.com\/risk_management\/docs\/RiskConsoleMarketingBrochure2013.pdf . Accessed Jan 2017"},{"key":"43_CR35","unstructured":"Roadmap to secure control systems in the transportation sector. Technical Report (2012). https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/documents\/TransportationRoadmap20120831.pdf , Accessed Jan 2017"},{"key":"43_CR36","unstructured":"Rodion, Z.: Analysis of information risk management methods. Bachelor\u2019s Thesis. University of Jyvaskyla (2014)"},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems. Technical Report no. SP 800\u201330. National Institute of Standards & Technology Gaithersburg, MD, United States (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"43_CR38","volume-title":"Insurances in Logistics (in Polish)","author":"M Szczepa\u0144ski","year":"2011","unstructured":"Szczepa\u0144ski, M.: Insurances in Logistics (in Polish). Poznan University of Technology Publ. House, Poznan (2011)"},{"key":"43_CR39","unstructured":"\u015awieboda, J.: System resilience at an intermodal transhipment node. In: CLC 2015: Carpathian Logistics Congress \u2013 Conference Proceedings, Tanger Ltd., pp. 502\u2013511 (2015)"},{"key":"43_CR40","unstructured":"Thomas, M.J.W.: A systematic review of the effectiveness of safety management systems. ATSB Transport Safety Report, Australian Government (2012). https:\/\/www.atsb.gov.au\/media\/4053559\/xr2011002_final.pdf , Accessed Jan 2017"},{"key":"43_CR41","doi-asserted-by":"crossref","unstructured":"Tubis, A., Werbi\u0144ska-Wojciechowska, S.: Operational risk assessment in road passenger transport companies performing at Polish market. Article prepared for conference European Safety and Reliability ESREL 2017, 18\u201322 June, Portoroz, Slovenia (2017)","DOI":"10.1201\/9781315210469-185"},{"key":"43_CR42","unstructured":"Tubis, A., Werbi\u0144ska-Wojciechowska, S.: Risk assessment issues in the process of freight transport performance. Article Accepted for Publication in Journal of Konbin (in Press)"},{"key":"43_CR43","unstructured":"www.project-seron.eu , Accessed Mar 2017"},{"key":"43_CR44","doi-asserted-by":"publisher","unstructured":"Zajac, M., Swieboda, J.: Process hazard analysis of the selected process in intermodal transport. In: 2015 International Conference on Military Technologies (ICMT), pp. 1\u20137. IEEE (2015). doi: 10.1109\/MILTECHS.2015.7153698","DOI":"10.1109\/MILTECHS.2015.7153698"},{"key":"43_CR45","doi-asserted-by":"crossref","unstructured":"Zurek, J., Smalko, Z., Zieja, M.: Methods applied to identify causes of air events. In: Reliability, Risk and Safety: Theory and Applications - Proceedings of European Safety and Reliability Conference ESREL 2009, 07\u201310 September 2009, pp. 1817\u20131822. Taylor and Francis, Prague (2010)","DOI":"10.1201\/9780203859759.ch251"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:11:55Z","timestamp":1569381115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}