{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T10:45:48Z","timestamp":1760438748439,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942131"},{"type":"electronic","value":"9783319942148"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94214-8_20","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T02:07:31Z","timestamp":1530238051000},"page":"289-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Causal Explanatory Model of Bayesian-belief Networks for Analysing the Risks of Opening Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5416-1529","authenticated-orcid":false,"given":"Ahmad","family":"Luthfi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6211-8790","authenticated-orcid":false,"given":"Marijn","family":"Janssen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1077-597X","authenticated-orcid":false,"given":"Joep","family":"Crompvoets","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"20_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-71117-1_7","volume-title":"E-Democracy \u2013 Privacy-Preserving, Secure, Intelligent E-Government Services","author":"A Luthfi","year":"2017","unstructured":"Luthfi, A., Janssen, M.: A conceptual model of decision-making support for opening data. In: Katsikas, Sokratis K., Zorkadis, V. (eds.) e-Democracy 2017. CCIS, vol. 792, pp. 95\u2013105. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71117-1_7"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Ali-Eldin, A.M.T., Zuiderwijk, A., Janssen, M.: Opening more data: a new privacy scoring model of open data. In: Seventh International Symposium on Business Modelling and Software Design (BMSD 2017), Barcelona, Spain. SCITEPRESS - Science and Technology Publication, Lda (2017)","DOI":"10.5220\/0006528301460154"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.giq.2015.05.006","volume":"32","author":"RP Louren\u00e7o","year":"2015","unstructured":"Louren\u00e7o, R.P.: An analysis of open government portals: a perspective of transparency for accountability. Gov. Inf. Q. 32(3), 323\u2013332 (2015)","journal-title":"Gov. Inf. Q."},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.giq.2013.04.003","volume":"31","author":"A Zuiderwijk","year":"2013","unstructured":"Zuiderwijk, A., Janssen, M.: Open data policies, their implementation and impact: a framework for comparison. Gov. Inf. Q. 31(1), 17\u201329 (2013)","journal-title":"Gov. Inf. Q."},{"issue":"2\u20133","key":"20_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.3233\/IP-150358","volume":"20","author":"A Zuiderwijk","year":"2015","unstructured":"Zuiderwijk, A., Janssen, M.: Towards decision support for disclosing data: closed or open data? Inf. Polity 20(2\u20133), 103\u2013107 (2015)","journal-title":"Inf. Polity"},{"issue":"1\u20132","key":"20_CR6","doi-asserted-by":"crossref","first-page":"129","DOI":"10.3233\/IP-140327","volume":"19","author":"E Barry","year":"2014","unstructured":"Barry, E., Bannister, F.: Barriers to open data release: a view from the top. Inf. Polity 19(1\u20132), 129\u2013152 (2014)","journal-title":"Inf. Polity"},{"key":"20_CR7","volume-title":"Risks Assessment and Decision Analysis with Bayesian Networks","author":"N Fenton","year":"2012","unstructured":"Fenton, N., Neil, M.: Risks Assessment and Decision Analysis with Bayesian Networks. CRC Press, Noca Raton (2012)"},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S0167-9236(03)00095-2","volume":"38","author":"S Nadkarni","year":"2004","unstructured":"Nadkarni, S., Shenoy, P.P.: A causal mapping approach to constructing Bayesian networks. Decis. Support Syst. 38(2), 259\u2013281 (2004)","journal-title":"Decis. Support Syst."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Hu, H., Elrafey, A.H., Kerschberg, L.: Using modular ontologies to capture causal knowledge contained in Bayesian networks. In: 2017 IEEE\/ACM International Conference. ACM, Sydney (2017)","DOI":"10.1145\/3110025.3110136"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.13052\/jcsm2245-1439.424","volume":"4","author":"K Herland","year":"2016","unstructured":"Herland, K., H\u00e4mm\u00e4inen, H., Kekolahti, P.: Information security risks assessment of smartphones using Bayesian networks. J. Cyber Secur. 4, 65\u201385 (2016)","journal-title":"J. Cyber Secur."},{"issue":"4","key":"20_CR11","first-page":"2","volume":"3","author":"S Chakraborty","year":"2016","unstructured":"Chakraborty, S., et al.: A Bayesian network-based customer satisfaction model: a tool for management decisions in railway transport. J. Decis. Anal. 3(4), 2\u201324 (2016)","journal-title":"J. Decis. Anal."},{"key":"20_CR12","unstructured":"Hudson, L.D., et al.: An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners (2002)"},{"issue":"4","key":"20_CR13","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1002\/pse.92","volume":"3","author":"H Gulvanessian","year":"2001","unstructured":"Gulvanessian, H., Holick\u00fd, M.: Determination of actions due to fire: recent developments in Bayesian risk assessment of structures under fire. Prog. Struct. Eng. Mater. 3(4), 346\u2013352 (2001)","journal-title":"Prog. Struct. Eng. Mater."},{"issue":"1\u20132","key":"20_CR14","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.physa.2004.02.039","volume":"388","author":"C Cornalba","year":"2004","unstructured":"Cornalba, C., Giudici, P.: Statistical models for operational risk management. Phys. A Stat. Mech. Appl. 388(1\u20132), 166\u2013172 (2004)","journal-title":"Phys. A Stat. Mech. Appl."},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s00477-011-0470-z","volume":"26","author":"K Liu","year":"2012","unstructured":"Liu, K., et al.: Applying Bayesian belief networks to health risks assessment. Stochast. Environ. Res. Risk Assess. 26(3), 451\u2013465 (2012)","journal-title":"Stochast. Environ. Res. Risk Assess."},{"issue":"2\u20133","key":"20_CR16","doi-asserted-by":"crossref","first-page":"17","DOI":"10.3233\/IP-140329","volume":"19","author":"A Zuiderwijk","year":"2014","unstructured":"Zuiderwijk, A., Janssen, M., David, C.: Innovation with open data: essential elements of open data ecosystems. Inf. Polity 19(2\u20133), 17\u201333 (2014)","journal-title":"Inf. Polity"},{"key":"20_CR17","unstructured":"Barnickel, N., et al.: Berlin open data strategy: organisational, legal and technical aspects of open data in Berlin. In: Concept, Pilot System and Recommendations for Action (2012)"},{"issue":"1","key":"20_CR18","first-page":"348","volume":"11","author":"S Martin","year":"2013","unstructured":"Martin, S., et al.: Risk analysis to overcome barriers to open data. Electron. J. e-Gov. 11(1), 348\u2013359 (2013)","journal-title":"Electron. J. e-Gov."},{"issue":"4","key":"20_CR19","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1080\/10580530.2012.716740","volume":"29","author":"M Janssen","year":"2012","unstructured":"Janssen, M., Charalabidis, Y., Zuiderwijk, A.: Benefits, adoption barriers and myths of open data and open government. Inf. Syst. Manag. 29(4), 258\u2013268 (2012)","journal-title":"Inf. Syst. Manag."},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference and Privacy Protection Issues in Cloud Computing, pp. 647\u2013651. IEEE Computer Society, Hangzhou (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"20_CR21","unstructured":"Dekkers, M., et al.: Data and Metadata Licensing, O.D. Support, Editor. European Comission (2014)"},{"issue":"4","key":"20_CR22","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1006\/jbin.2001.1024","volume":"34","author":"S Walter","year":"2001","unstructured":"Walter, S.: Heterogeneous database integration in biomedicine. J. Biomed. Inf. 34(4), 285\u2013298 (2001)","journal-title":"J. Biomed. Inf."},{"issue":"3","key":"20_CR23","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/96602.96604","volume":"22","author":"SP Amit","year":"1990","unstructured":"Amit, S.P., Larson, J.A.: Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Comput. Surv. 22(3), 183\u2013236 (1990)","journal-title":"ACM Comput. Surv."},{"key":"20_CR24","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.sbspro.2014.07.107","volume":"147","author":"Aikaterini Yannoukakou","year":"2014","unstructured":"Yannoukakou, A., Araka, I.: Access to government information: right to information and open government data synergy. In: 3rd International Conference on Integrated Information (IC-ININFO), vol. 147, pp. 332\u2013340 (2014)","journal-title":"Procedia - Social and Behavioral Sciences"},{"key":"20_CR25","unstructured":"Tran, E., Scholtes, G.: Open Data Literature Review. Barkeley School of Law, University of California (2015)"},{"issue":"8","key":"20_CR26","first-page":"331","volume":"18","author":"RL Okediji","year":"2014","unstructured":"Okediji, R.L.: Government as owner of intellectual property? Considerations for public welfare in the era of big data. Vanderbilt J. Entertain. Technol. Law 18(8), 331 (2014)","journal-title":"Vanderbilt J. Entertain. Technol. Law"},{"key":"20_CR27","unstructured":"Uhlir, P.F.: The Socioeconomic Effects of Public Sector Information on Digital Networks: Toward a Better Understanding of Different Access and Reuse Policies. National Research Council, Washington, DC (2009)"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94214-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:02:56Z","timestamp":1709823776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94214-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942131","9783319942148"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94214-8_20","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}