{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:33:21Z","timestamp":1761597201803},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540890959"},{"type":"electronic","value":"9783540891734"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89173-4_27","type":"book-chapter","created":{"date-parts":[[2010,5,8]],"date-time":"2010-05-08T07:58:06Z","timestamp":1273305486000},"page":"327-336","source":"Crossref","is-referenced-by-count":5,"title":["Modeling and Simulating Information Security Management"],"prefix":"10.1007","author":[{"given":"Jose M.","family":"Sarriegi","sequence":"first","affiliation":[]},{"given":"Javier","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Torres","sequence":"additional","affiliation":[]},{"given":"David","family":"Imizcoz","sequence":"additional","affiliation":[]},{"given":"Elyoenai","family":"Egozcue","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Liberal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.cose.2006.04.002","volume":"25","author":"R.A. Botha","year":"2006","unstructured":"Botha, R.A., Gaadwinge, T.G.: Reflecting on 20 SEC conferences. Computers & Security\u00a025, 247\u2013256 (2006)","journal-title":"Computers & Security"},{"key":"27_CR2","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley & Sons, Inc., New York (1994)"},{"key":"27_CR3","volume-title":"Beyond Fear","author":"B. Schneier","year":"2003","unstructured":"Schneier, B.: Beyond Fear. Copernicus Book, New York (2003)"},{"key":"27_CR4","volume-title":"Industrial Dynamics","author":"J. Forrester","year":"1961","unstructured":"Forrester, J.: Industrial Dynamics. MIT Press, Cambridge (1961)"},{"key":"27_CR5","volume-title":"Business Dynamics","author":"J. Sterman","year":"2000","unstructured":"Sterman, J.: Business Dynamics. McGraw Hill, New York (2000)"},{"volume-title":"Managerial applications of system dynamics","year":"1978","key":"27_CR6","unstructured":"Roberts, E.B. (ed.): Managerial applications of system dynamics. Productivity Press, Cambridge (1978)"},{"key":"27_CR7","unstructured":"Andersen, D., Cappelli, D., Gonzalez, J.J., Mojtahedzadeh, M., Moore, A., Rich, E., Sarriegi, J.M., Shimeall., T., Stanton, J., Weaver, E., Zagonel, A.: Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem. In: Proceedings of the 22nd International Conference of the System Dynamics Society, Oxford, UK (2004)"},{"key":"27_CR8","volume-title":"From Modeling to Managing Security: A System Dynamics Approach","author":"C. Melara","year":"2003","unstructured":"Melara, C., Sarriegi, J.M., Gonzalez, J.J., Sawicka, A., Cooke, D.L.: A System Dynamics Model of an Insider Attack on an Information System. In: Gonzalez, J.J. (ed.) From Modeling to Managing Security: A System Dynamics Approach, Norwegian Academic Press, Kristiansand (2003)"},{"key":"27_CR9","volume-title":"TIMS Studies in the Management Sciences","author":"J. Forrester","year":"1980","unstructured":"Forrester, J., Senge, P.: Tests for building confidence in system dynamics models. In: Legasto, A., Forrester, J., Lyneis, J. (eds.) TIMS Studies in the Management Sciences, North Holland, New York (1980)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Dhillon, G.: Managing and Controlling Computer Misuse. Information Management & Computer Security, 171-175 (1999)","DOI":"10.1108\/09685229910292664"},{"issue":"8","key":"27_CR11","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/S0167-4048(01)00813-6","volume":"20","author":"G. Dhillon","year":"2001","unstructured":"Dhillon, G., Moores, A.: Computer crimes: Theorizing About the Enemy Within. Computers & Security\u00a020(8), 715\u2013723 (2001)","journal-title":"Computers & Security"},{"key":"27_CR12","unstructured":"Torres, J.M., Sarriegi, J.M.: Dynamics Aspects of Security Management of Information Systems. In: Proceedings of the 22nd International Conference of the System Dynamics Society, Oxford, UK (2004)"},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0167-4048(03)00406-1","volume":"22","author":"H.S. Venter","year":"2003","unstructured":"Venter, H.S., Eloff, J.H.P.: A taxonomy for information security technologies. Computers & Security\u00a022, 299\u2013307 (2003)","journal-title":"Computers & Security"},{"key":"27_CR14","unstructured":"Gonzalez, J.J., Sawicka, A.: The role of learning and risk perception in compliance. In: Proceedings of the 21st International Conference of the System Dynamics Society, New York (2003)"},{"key":"27_CR15","unstructured":"OECD: Guidelines for the Security of Information Systems and Networks: Towards a culture of security (2002)"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/11836810_38","volume-title":"Information Security","author":"J.M. Torres","year":"2006","unstructured":"Torres, J.M., Sarriegi, J.M., Santos, J., Serrano, N.: Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 530\u2013545. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89173-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:38:25Z","timestamp":1558291105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89173-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540890959","9783540891734"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89173-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}