{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T07:16:50Z","timestamp":1775114210873,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319713670","type":"print"},{"value":"9783319713687","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_24","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T12:22:30Z","timestamp":1511266950000},"page":"283-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards a Cybersecurity Game: Operation Digital Chameleon"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Rieb","sequence":"first","affiliation":[]},{"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"24_CR1","unstructured":"McAfee: Combating Advanced Persistent Threats, Santa Clara (2011)"},{"key":"24_CR2","unstructured":"Symantec: Advanced Persistent Threats: How They Work. http:\/\/www.symantec.com\/theme.jsp?themeid=apt-infographic-1"},{"key":"24_CR3","unstructured":"Rowney, K.: What We Talk About When We Talk About APT. http:\/\/www.symantec.com\/connect\/blogs\/what-we-talk-about-when-we-talk-about-apt#!"},{"key":"24_CR4","unstructured":"Rouse, M.: advanced persistent threat (APT). http:\/\/searchsecurity.techtarget.com\/definition\/advanced-persistent-threat-APT"},{"key":"24_CR5","doi-asserted-by":"crossref","first-page":"87","DOI":"10.5465\/AMP.2011.61020810","volume":"25","author":"J Su\u00e1rez-Lled\u00f3","year":"2011","unstructured":"Su\u00e1rez-Lled\u00f3, J.: The black swan: the impact of the highly improbable. Acad. Manag. Perspect. 25, 87\u201390 (2011)","journal-title":"Acad. Manag. Perspect."},{"key":"24_CR6","unstructured":"Perla, P.P.: The Art of Wargaming: A Guide for Professionals and Hobbyists. US Naval Institute Press (1990)"},{"key":"24_CR7","unstructured":"Geilhardt, T., M\u00fchlbrandt, T.: Planspiele im Personal- und Organisationsmanagement. Hogrefe Publishing G\u00f6ttingen (1995)"},{"key":"24_CR8","volume-title":"Planspiel und soziale Simulation im Bildungsbereich (Studien zur P\u00e4dagogik, Andragogik und Gerontagogik\/Studies in Pedagogy, Andragogy, and Gerontagogy)","author":"M Geuting","year":"1992","unstructured":"Geuting, M.: Planspiel und soziale Simulation im Bildungsbereich (Studien zur P\u00e4dagogik, Andragogik und Gerontagogik\/Studies in Pedagogy, Andragogy, and Gerontagogy). Lang, Peter Frankfurt (1992)"},{"key":"24_CR9","unstructured":"ENISA: On National and International Cyber Security Exercises. Europ\u00e4ische Agentur f\u00fcr Netz- und Informationssicherheit (ENISA), Heraklion (2012)"},{"key":"24_CR10","unstructured":"ENISA: The 2015 Report on National and International Cyber Security Exercises. Europ\u00e4ische Agentur f\u00fcr Netz- und Informationssicherheit (ENISA), Athen (2015)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Rieb, A., Lechner, U.: Operation digital chameleon \u2013 towards an open cybersecurity method. In: Proceedings of the 12th International Symposium on Open Collaboration (OpenSym 2016), Berlin, pp. 1\u201310 (2016)","DOI":"10.1145\/2957792.2957800"},{"key":"24_CR12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28, 75\u2013105 (2004)","journal-title":"MIS Q."},{"key":"24_CR13","unstructured":"BMI: Definition \u201cKritische Infrastrukturen\u201d (2009). http:\/\/www.bmi.bund.de\/SharedDocs\/Downloads\/DE\/Themen\/Sicherheit\/BevoelkerungKrisen\/Sektoreneinteilung.pdf?__blob=publicationFile\\nBundesministeriumdesInnern2009-DefinitionKritischeInfrastrukturen.pdf"},{"key":"24_CR14","unstructured":"UPKRITIS: UP KRITIS \u00d6ffentlich-Private Partnerschaft zum Schutz Kritischer Infrastrukturen., Bonn (2014)"},{"key":"24_CR15","unstructured":"Kamath, M.: Hackers can remotely take over Nuclear Power Plants by exploiting vulnerability in IES. http:\/\/www.techworm.net\/2015\/08\/security-flaws-in-industrial-ethernet-switches.html"},{"key":"24_CR16","unstructured":"Neitzel, L., Huba, B.: Top ten differences between ICS and IT cybersecurity (2014). http:\/\/www.isa.org\/standards-and-publications\/isa-publications\/intech-magazine\/2014\/may-jun\/features\/cover-story-top-ten-differences-between-ics-and-it-cybersecurity\/"},{"key":"24_CR17","unstructured":"Erswell, D.: The SCADA Internet - What to Look Out for, pp. 1\u20135 (2015)"},{"key":"24_CR18","unstructured":"Hald, S., Pedersen, J.: An updated taxonomy for characterizing hackers according to their threat properties. In: 2012 14th International Conference on 2012 Advanced Communication Technology (ICACT), pp. 81\u201386 (2012)"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Robinson, M.: The SCADA threat landscape. In: 1st International Symposium on ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), pp. 30\u201341 (2013)","DOI":"10.14236\/ewic\/ICSCSR2013.4"},{"key":"24_CR20","unstructured":"Schneier, B.: Attack Trees - Modeling security threats. Dr. Dobb\u2019s J. (1999)"},{"key":"24_CR21","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511606472","volume-title":"Assumption-Based Planning - A Tool for Reducing Avoidable Surprises","author":"JA Dewar","year":"2002","unstructured":"Dewar, J.A.: Assumption-Based Planning - A Tool for Reducing Avoidable Surprises. The Press Syndicate of the University of Cambridge, Cambridge (2002)"},{"key":"24_CR22","first-page":"45","volume":"1993","author":"S Thiagarajan","year":"1993","unstructured":"Thiagarajan, S.: How to maximize transfer from simulation games through systematic debriefing. Simul. Gaming Yearb. 1993, 45\u201352 (1993)","journal-title":"Simul. Gaming Yearb."},{"key":"24_CR23","volume-title":"Besser als die Wirklichkeit!: Warum wir von Computerspielen profitieren und wie sie die Welt ver\u00e4ndern","author":"J McConigal","year":"2012","unstructured":"McConigal, J.: Besser als die Wirklichkeit!: Warum wir von Computerspielen profitieren und wie sie die Welt ver\u00e4ndern. Heyne Verlag, M\u00fcnchen (2012)"},{"key":"24_CR24","unstructured":"Newlin, M.: MouseJack Injecting Keystrokes into Wireless Mice (2016)"},{"key":"24_CR25","unstructured":"Spill, D.: USBProxy - an open and affordable USB man in the middle device. In: 2014 ShmooCon Proceedings (2014)"},{"key":"24_CR26","volume-title":"The motivation to work","author":"F Herzberg","year":"1959","unstructured":"Herzberg, F., Mausner, B., Snyderman, B.B.: The motivation to work. Transaction publishers, Piscataway (1959)"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Mayring, P.: Qualitative Inhaltsanalyse. Grundlagen und Techniken. (2008)","DOI":"10.1007\/978-3-8349-9441-7_42"},{"key":"24_CR28","unstructured":"Hofmann, M.: Abschlussbericht taktisches Wargaming. ITIS, M\u00fcnchen"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T06:27:16Z","timestamp":1603348036000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}