{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:01:51Z","timestamp":1725512511804},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681281"},{"type":"electronic","value":"9783540681298"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68129-8_6","type":"book-chapter","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T12:14:59Z","timestamp":1210853699000},"page":"43-58","source":"Crossref","is-referenced-by-count":6,"title":["The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies"],"prefix":"10.1007","author":[{"given":"Simon Edward","family":"Parkin","sequence":"first","affiliation":[]},{"given":"Rouaa","family":"Yassin Kassab","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Avoco Secure Limited, Secure2Trust (as viewed 09\/05\/07), \n                    \n                      www.avocosecure.com\/html_pages\/products\/secure2trust.html"},{"key":"6_CR2","unstructured":"Centennial Software, Gone in Sixty Seconds: The Executive Guide to Internal Data Theft (2006) (as viewed 29\/07\/07), \n                    \n                      www.centennial-software.com\/resources\/whitepapers\/?product=2"},{"key":"6_CR3","unstructured":"Centennial Software, DeviceWall Product Info (as viewed 09\/05\/07), \n                    \n                      www.devicewall.com\/pro\/"},{"key":"6_CR4","unstructured":"Charlesworth, A.: Data theft by employees \u2018commonplace\u2019 (as viewed 29\/07\/07), \n                    \n                      www.vnunet.com\/vnunet\/news\/2165309\/theft-employees-commonplace"},{"key":"6_CR5","unstructured":"Check Point Software Technologies Inc., Pointsec Protector (as viewed 10\/05\/07), \n                    \n                      www.checkpoint.com\/products\/datasecurity\/protector\/index.html"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Clark, G., Courtney, T., Daly, D., Deavours, D., Derisavi, S., Doyle, J.M., Sanders, W.H., Webster, P.: The M\u00f6bius Modeling Tool. In: Proceedings of the 9th International Workshop on Petri Nets and Performance Models, Aachen, Germany, September 11-14, 2001, pp. 241\u2013250 (2001)","DOI":"10.1109\/PNPM.2001.953373"},{"key":"6_CR7","unstructured":"Dekart, Private Disk (as viewed 20\/06\/07), \n                    \n                      www.dekart.com\/products\/encryption\/private_disk\/"},{"key":"6_CR8","unstructured":"GFI Software, GFI EndPoint Security (as viewed 09\/05\/07), \n                    \n                      http:\/\/www.gfi.com\/endpointsecurity\/"},{"key":"6_CR9","unstructured":"Infowatch, Internal IT Threats in Europe 2006 (as viewed 29\/07\/07), \n                    \n                      www.infowatch.com\/threats?chapter=162971949&id=207784668"},{"key":"6_CR10","unstructured":"Layton Technology, DeviceShield (as viewed 20\/06\/07), \n                    \n                      www.laytontechnology.com\/pages\/deviceshield.asp"},{"key":"6_CR11","unstructured":"McAfee Inc., McAfee Data Loss Prevention (as viewed 20\/06\/07), \n                    \n                      www.mcafee.com\/us\/enterprise\/products\/data_loss_prevention\/data_loss_prevention.html"},{"key":"6_CR12","unstructured":"Microsoft Corporation, Windows Rights Management Services (as viewed 20\/06\/07), \n                    \n                      www.microsoft.com\/windowsserver2003\/technologies\/rightsmgmt\/default.mspx"},{"key":"6_CR13","unstructured":"Microsoft Corporation, Windows Server 2003 Active Directory (as viewed 02\/06\/07), \n                    \n                      www.microsoft.com\/windowsserver2003\/technologies\/directory\/activedirectory\/default.mspx"},{"key":"6_CR14","unstructured":"Microsoft Corporation, Windows Vista Home Page (as viewed 18\/07\/07), \n                    \n                      www.microsoft.com\/windows\/products\/windowsvista\/default.mspx"},{"key":"6_CR15","unstructured":"Microsoft Corporation, About Information Rights Management (as viewed 20\/06\/07), \n                    \n                      office.microsoft.com\/en-us\/help\/HP062208591033.aspx"},{"key":"6_CR16","unstructured":"Microsoft Corporation, Step-By-Step Guide to Controlling Device Installation and Usage with Group Policy (as viewed 20\/06\/07), \n                    \n                      www.microsoft.com\/technet\/windowsvista\/library\/9fe5bf05-a4a9-44e2-a0c3-b4b4eaaa37f3.mspx"},{"key":"6_CR17","unstructured":"Microsoft Corporation, Windows Vista Security Guide Chapter 3: Protect Sensitive Data (as viewed 20\/06\/07), \n                    \n                      http:\/\/www.microsoft.com\/technet\/windowsvista\/security\/protect_sensitive_data.mspx"},{"key":"6_CR18","unstructured":"Oracle Corporation, Oracle Information Rights Management (as viewed 09\/05\/07), \n                    \n                      www.oracle.com\/products\/middleware\/content-management\/information-rights-management.html"},{"key":"6_CR19","unstructured":"Parkin, S.E., van Moorsel, A.: A Trust-economic Perspective on Information Security Technologies, Technical Report CS-TR:1056, School of Computing Science, Newcastle University (October 2007)"},{"key":"6_CR20","unstructured":"Reflex Magnetics, Reflex Magnetics Disknet Pro (as viewed 09\/05\/07), \n                    \n                      www.reflex-magnetics.co.uk\/products\/disknetpro\/"},{"key":"6_CR21","unstructured":"Russinovich, M.: Windows Administration: Inside the Windows Vista Kernel: Part 3 (as viewed 18\/07\/07), \n                    \n                      www.microsoft.com\/technet\/technetmag\/issues\/2007\/04\/VistaKernel\/default.aspx"},{"key":"6_CR22","unstructured":"Safend Ltd., Safend Protector (as viewed 10\/05\/07), \n                    \n                      www.safend.com\/65-en\/Safend%20Protector.aspx"},{"key":"6_CR23","unstructured":"SafeNet Inc., SafeNet ProtectPack (as viewed 09\/05\/07), \n                    \n                      www.safenet-inc.com\/products\/data_at_rest_protection\/ProtectPack.asp"},{"key":"6_CR24","unstructured":"SecureWave, SecureWave Sanctuary Device Control (as viewed 09\/05\/07), \n                    \n                      www.securewave.com\/usb_security.jsp"},{"key":"6_CR25","unstructured":"Smartline Inc., DeviceLock (as viewed 09\/05\/07), \n                    \n                      www.protect-me.com\/dl\/"},{"key":"6_CR26","unstructured":"TrueCrypt Foundation, TrueCrypt (as viewed 20\/06\/07), \n                    \n                      www.truecrypt.org\/"},{"key":"6_CR27","unstructured":"Wattanajantra, A.: Data Thefts and Losses in the UK-Timeline (as viewed January 25, 2008), \n                    \n                      www.itpro.co.uk\/news\/158184\/data-thefts-and-losses-in-the-uk-timeline.html"},{"key":"6_CR28","unstructured":"Workshare Inc., Workshare Protect (as viewed 09\/05\/07), \n                    \n                      www.workshare.com\/products\/wsprotect\/default.aspx"}],"container-title":["Lecture Notes in Computer Science","Service Availability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68129-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T02:59:54Z","timestamp":1551495594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68129-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540681281","9783540681298"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68129-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}