{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:18:39Z","timestamp":1725491919681},"publisher-location":"Berlin, Heidelberg","reference-count":55,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540751007"},{"type":"electronic","value":"9783540751014"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75101-4_21","type":"book-chapter","created":{"date-parts":[[2007,9,21]],"date-time":"2007-09-21T09:15:29Z","timestamp":1190366129000},"page":"224-237","source":"Crossref","is-referenced-by-count":1,"title":["Learning from Your Elders: A Shortcut to Information Security Management Success"],"prefix":"10.1007","author":[{"given":"Finn Olav","family":"Sveen","sequence":"first","affiliation":[]},{"given":"Jose Manuel","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Jose Maria","family":"Sarriegi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"22nd International Conference of the System Dynamics Society","author":"D.F. Andersen","year":"2004","unstructured":"Andersen, D.F., et al.: Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem. In: 22nd International Conference of the System Dynamics Society, The System Dynamics Society, Oxford, England (2004)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why information security is hard - an economic perspective. In: 17th Annual Computer Security Applications Conference (2001)","DOI":"10.1109\/ACSAC.2001.991552"},{"key":"21_CR3","series-title":"Research Series","volume-title":"From Modeling to Managing Security : A System Dynamics Approach","year":"2003","unstructured":"Gonzalez, J.J. (ed.): From Modeling to Managing Security: A System Dynamics Approach. Research Series, vol.\u00a035. Norwegian Academic Press, Kristiansand, Norway (2003)"},{"key":"21_CR4","unstructured":"Putnam, A.: Information Security Management References. In: U.S.H.o. Representatives (eds.) Mapping of Existing Work on Infosec \u201cBest Practices\u201d Subgroup (2004)"},{"key":"21_CR5","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","volume-title":"The Knowledge-Creating Company","author":"I. Nonaka","year":"1995","unstructured":"Nonaka, I., Takeuchi, H.: The Knowledge-Creating Company. Oxford University Press, New York & Oxford (1995)"},{"key":"21_CR6","volume-title":"Working Knowledge: how organizations know what they know","author":"T.H. Davenport","year":"1998","unstructured":"Davenport, T.H., Prusak, L.: Working Knowledge: how organizations know what they know. Harvard Business School Press, Boston Massachusetts (1998)"},{"key":"21_CR7","volume-title":"Managing Knowledge: building blocks for success","author":"G. Probst","year":"2000","unstructured":"Probst, G., Raub, S., Romhardt, K.: Managing Knowledge: building blocks for success. John Wiley & Sons, Chichester (2000)"},{"key":"21_CR8","volume-title":"The Six Sigma Way: how GE, Motorola, and other top companies are honing their performance","author":"P.S. Pande","year":"2000","unstructured":"Pande, P.S., Neuman, R.P., Cavanagh, R.R.: The Six Sigma Way: how GE, Motorola, and other top companies are honing their performance. McGraw-Hill, New York (2000)"},{"issue":"3","key":"21_CR9","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1108\/01445150610679731","volume":"26","author":"A. Lee-Mortimer","year":"2006","unstructured":"Lee-Mortimer, A.: Six Sigma: Effective Handling of deep rooted quality problems. Assembly Automation\u00a026(3), 200\u2013204 (2006)","journal-title":"Assembly Automation"},{"issue":"2","key":"21_CR10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1080\/1478336032000149036","volume":"15","author":"D.I. Prajogo","year":"2004","unstructured":"Prajogo, D.I., Sohal, A.S.: The Sustainability and Evolution of Quality Improvement Programmes - An Australian Case Study. Total Quality Management\u00a015(2), 205\u2013220 (2004)","journal-title":"Total Quality Management"},{"issue":"5","key":"21_CR11","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.jsr.2006.06.005","volume":"37","author":"K.J. Nielsen","year":"2006","unstructured":"Nielsen, K.J., Carstensen, O., Rasmussen, K.: The Prevention of Occupational Injuries in Two Industrial Plants Using an Incident Reporting Scheme. Journal of Safety Research\u00a037(5), 479\u2013486 (2006)","journal-title":"Journal of Safety Research"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Repenning, N.P., Sterman, J.D.: Nobody ever gets credit for fixing problems that never happened. California Management Review, 43(4) (2001)","DOI":"10.2307\/41166101"},{"key":"21_CR13","first-page":"425","volume":"24","author":"E. Schultz","year":"2005","unstructured":"Schultz, E.: The human Factor in Security. Computer&Security\u00a024, 425\u2013426 (2005)","journal-title":"Computer&Security"},{"key":"21_CR14","volume-title":"Spies Among Us: How To Stop The Spies, Terrorists, Hackers, And Criminals You Don\u2019t Even Know You Encounter Every Day","author":"I. Winkler","year":"2005","unstructured":"Winkler, I.: Spies Among Us: How To Stop The Spies, Terrorists, Hackers, And Criminals You Don\u2019t Even Know You Encounter Every Day. Wiley, Indianapolis (2005)"},{"key":"21_CR15","volume-title":"The Art of Deception","author":"K. Mitnick","year":"2002","unstructured":"Mitnick, K.: The Art of Deception. Wiley, Chichester (2002)"},{"key":"21_CR16","unstructured":"Abagnale, F., et al.: FBI 2005 Computer Crime Survey. Federal Bureau of Investigation (2005)"},{"key":"21_CR17","volume-title":"Secrets & Lies: Digital Security in a Networked World","author":"B. Schneier","year":"2000","unstructured":"Schneier, B.: Secrets & Lies: Digital Security in a Networked World. Wiley, Chichester (2000)"},{"key":"21_CR18","volume-title":"The New Knowledge Management","author":"M.W. McElroy","year":"2003","unstructured":"McElroy, M.W.: The New Knowledge Management. Butterworth Heinemann, Amsterdam (2003)"},{"issue":"1","key":"21_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/09544120120098591","volume":"13","author":"J. Yong","year":"2002","unstructured":"Yong, J., Wilkinson, A.: The long and winding road: The evolution of quality management. Total Quality Management\u00a013(1), 101\u2013121 (2002)","journal-title":"Total Quality Management"},{"issue":"4","key":"21_CR20","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1177\/0170840699204003","volume":"20","author":"D.L. Collinson","year":"1999","unstructured":"Collinson, D.L.: Surviving the rigs: Safety and Surveilance on North Sea Oil Platforms. Organization Studies\u00a020(4), 579\u2013600 (1999)","journal-title":"Organization Studies"},{"key":"21_CR21","unstructured":"Johnson, C.: Failure in Safety Critical Systems: A Handbook of Incident and Accident Reporting. Glasgow University Press (2003)"},{"key":"21_CR22","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1201\/b17206","volume-title":"Prevention of Accidents Through Experience Feedback","author":"U. Kjell\u00e9n","year":"2000","unstructured":"Kjell\u00e9n, U.: Prevention of Accidents Through Experience Feedback, p. 450. Taylor & Francis, London and New York (2000)"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Morag, I.: Intel\u2019s Incident-free Culture: A Case Study. Applied Ergonomics\u00a02006(38), 201\u2013211","DOI":"10.1016\/j.apergo.2006.03.007"},{"issue":"3","key":"21_CR24","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1111\/1539-6924.00326","volume":"23","author":"J.R. Phimister","year":"2003","unstructured":"Phimister, J.R., et al.: Near-Miss Incident Management in the Chemical Process Industry. Risk Analysis\u00a023(3), 445\u2013459 (2003)","journal-title":"Risk Analysis"},{"key":"21_CR25","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1097\/00019514-200501000-00007","volume":"14","author":"J. Reason","year":"2005","unstructured":"Reason, J.: Safety in the operating theatre - Part 2: Human error and organizational failure. Quality and Safety in Health Care\u00a014, 56\u201361 (2005)","journal-title":"Quality and Safety in Health Care"},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.diin.2006.01.006","volume":"3","author":"E.D. Shaw","year":"2006","unstructured":"Shaw, E.D.: The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation\u00a03, 20\u201331 (2006)","journal-title":"Digital Investigation"},{"issue":"1","key":"21_CR27","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1107458.1107482","volume":"49","author":"S. Campbell","year":"2006","unstructured":"Campbell, S.: How to Think About Security Failures. Communications of the ACM\u00a049(1), 37\u201339 (2006)","journal-title":"Communications of the ACM"},{"issue":"1","key":"21_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1108\/09604529510081811","volume":"5","author":"E.H. Fram","year":"1995","unstructured":"Fram, E.H.: Not so strange bedfellows: marketing and total quality management. Managing Service Quality\u00a05(1), 50\u201356 (1995)","journal-title":"Managing Service Quality"},{"key":"21_CR29","volume-title":"The Logic of Failure","author":"D. D\u00f6rner","year":"1996","unstructured":"D\u00f6rner, D.: The Logic of Failure. Perseus Books, Cambridge, Massachusets (1996)"},{"key":"21_CR30","unstructured":"Wiik, J., Gonzalez, J.J., Kossakowski, K.-P.: Limits to Effectiveness in Computer Security Incident Response Teams. In: 23rd International Conference of the System Dynamics Society, Oxford (2004)"},{"key":"21_CR31","volume-title":"The Living Company","author":"A.d. Geus","year":"1997","unstructured":"Geus, A.d.: The Living Company. Harvard Business School Press, Boston Massachusetts (1997)"},{"key":"21_CR32","volume-title":"The Fifth Discipline","author":"P. Senge","year":"1990","unstructured":"Senge, P.: The Fifth Discipline. Bantam Doubleday Dell Publishing Group, London (1990)"},{"key":"21_CR33","unstructured":"Lee, P.I., Weitzel, T.R.: Air Carrier Safety and Culture: An Investigation of Taiwan\u2019s Adaptation to Western Incident Reporting Programs. Journal of Air Transportation\u00a010(1) (2005)"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Sveiby, K.-E.: A Knowledge-based theory of the firm to guide strategy formulation. Journal of Intellectual Capital\u00a02(4) (2001)","DOI":"10.1108\/14691930110409651"},{"issue":"2","key":"21_CR35","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/isre.1050.0053","volume":"16","author":"E. Gal-Or","year":"2005","unstructured":"Gal-Or, E., Ghose, A.: The Economic Incentives for Sharing Security Information. Information Systems Research\u00a016(2), 186\u2013208 (2005)","journal-title":"Information Systems Research"},{"issue":"6","key":"21_CR36","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.jaccpubpol.2003.09.001","volume":"22","author":"L.A. Gordon","year":"2003","unstructured":"Gordon, L.A., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting Public Policy\u00a022(6), 461\u2013485 (2003)","journal-title":"Journal of Accounting Public Policy"},{"key":"21_CR37","unstructured":"The 9-11 Commision Report (2002)"},{"key":"21_CR38","doi-asserted-by":"crossref","unstructured":"Rich, E., Sveen, F.O., Jager, M.: Overcoming Organizational Challenges to Secure Knowledge Management. In: Secure Knowledge Management Workshop, New York, US (2006)","DOI":"10.1007\/s10796-007-9052-5"},{"key":"21_CR39","volume-title":"Managing & measuring knowledge-Based assets","author":"K.-E. Sveiby","year":"1997","unstructured":"Sveiby, K.-E.: The new organizational wealth. In: Managing & measuring knowledge-Based assets, Berret-Koehler Publishers Inc., San Francisco (1997)"},{"key":"21_CR40","volume-title":"Intellectual capital: Core asset for the third millennium enterprise","author":"A. Brooking","year":"1997","unstructured":"Brooking, A.: Intellectual capital: Core asset for the third millennium enterprise. Itp-Intern.Thomson Publishing, London (1997)"},{"key":"21_CR41","volume-title":"Intellectual capital","author":"L. Edvinsson","year":"1997","unstructured":"Edvinsson, L.: Intellectual capital. Harper Collins Publishers, New York (1997)"},{"key":"21_CR42","volume-title":"Managing Cyber Security Resources: A cost-benefit analysis","author":"L.A. Gordon","year":"2006","unstructured":"Gordon, L.A., Loeb, M.P.: Managing Cyber Security Resources: A cost-benefit analysis. McGraw-Hill, New York (2006)"},{"key":"21_CR43","volume-title":"Knowledge Management Case Book: Siemens Best Practices","author":"T.H. Davenport","year":"2002","unstructured":"Davenport, T.H., Probst, G.: Knowledge Management Case Book: Siemens Best Practices, 2nd edn. Publicis Corporate Publishing and John Wiley & Sons, Erlangen (2002)","edition":"2"},{"key":"21_CR44","volume-title":"Linkage Inc.\u2019s Best Practices in Knowledge Management and Organizational Learning Handbook","author":"P. Harkins","year":"2000","unstructured":"Harkins, P., Carter, L.L., Timmins, A.J.: Linkage Inc.\u2019s Best Practices in Knowledge Management and Organizational Learning Handbook. Linkage Press, Lexington, Massachusetts (2000)"},{"issue":"2","key":"21_CR45","doi-asserted-by":"publisher","first-page":"225","DOI":"10.2307\/2393390","volume":"35","author":"D. Vaughan","year":"1990","unstructured":"Vaughan, D.: Autonomy, Interdependence and Social Control: NASA and the Space Shuttle Challenger. Administrative Science Quarterly\u00a035(2), 225\u2013257 (1990)","journal-title":"Administrative Science Quarterly"},{"key":"21_CR46","volume-title":"The 19th International Conference of the System Dynamics Society","author":"S. Tsuchiya","year":"2001","unstructured":"Tsuchiya, S., et al.: An Analysis of Tokaimura Nuclear Criticality Accident: A Systems Approach. In: The 19th International Conference of the System Dynamics Society, System Dynamics Society, Atlanta, Georgia (2001)"},{"key":"21_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/11836810_38","volume-title":"Information Security","author":"J.M. Torres","year":"2006","unstructured":"Torres, J.M., et al.: Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. In: Katsikas, S.K., Lopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 530\u2013545. Springer, Heidelberg (2006)"},{"issue":"1","key":"21_CR48","first-page":"29","volume":"101","author":"J.J. Gonzalez","year":"2005","unstructured":"Gonzalez, J.J., et al.: Helping Prevent Information Security Risks in the Transition to Integrated Operations. Telektronikk\u00a0101(1), 29\u201337 (2005)","journal-title":"Telektronikk"},{"key":"21_CR49","unstructured":"Sveen, F.O., et al.: A Dynamic Approach to Vulnerability and Risk Analysis of the Transition to eOperations. In: 24th International System Dynamics Conference, Nijmegen (2006)"},{"issue":"2","key":"21_CR50","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1002\/sdr.268","volume":"19","author":"D.L. Cooke","year":"2003","unstructured":"Cooke, D.L.: A system dynamics analysis of the Westray mine disaster. System Dynamics Review\u00a019(2), 139\u2013166 (2003)","journal-title":"System Dynamics Review"},{"key":"21_CR51","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1136\/qshc.2004.011510","volume":"14","author":"M.-P. Pomey","year":"2005","unstructured":"Pomey, M.-P., et al.: Paradoxes of French Accreditation. Quality and Safety in Health Care\u00a014, 51\u201355 (2005)","journal-title":"Quality and Safety in Health Care"},{"key":"21_CR52","unstructured":"Parkhurst, J., Shaw, B.: Compliance is Not Enough: The Benefits of Advanced Quality Systems Practices. Medical Device & Diagnostic Industry\u00a0(2004)"},{"issue":"6","key":"21_CR53","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1108\/09576059710187375","volume":"10","author":"J.V. Chelsom","year":"1997","unstructured":"Chelsom, J.V.: Performance-driven quality. Logistics Information Management\u00a010(6), 253\u2013258 (1997)","journal-title":"Logistics Information Management"},{"issue":"2","key":"21_CR54","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1108\/09544789910256993","volume":"11","author":"S. Karapetrovic","year":"1999","unstructured":"Karapetrovic, S.: ISO 9000: the system emerging from the vicious circle of compliance. The TQM Magazine\u00a011(2), 111\u2013120 (1999)","journal-title":"The TQM Magazine"},{"key":"21_CR55","unstructured":"Caralli, R.A., Wilson, W.R.: The Challenges of Security Management. Networked Systems Survivability Program, SEI. [cited 2007 12th March] (2004)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75101-4_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T01:36:15Z","timestamp":1708220175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75101-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540751007","9783540751014"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75101-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}