{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:24:06Z","timestamp":1743081846796,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035517"},{"type":"electronic","value":"9783642035524"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03552-4_22","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T21:36:51Z","timestamp":1251495411000},"page":"247-257","source":"Crossref","is-referenced-by-count":1,"title":["Security Strategy Analysis for Critical Information Infrastructures"],"prefix":"10.1007","author":[{"given":"Jose Manuel","family":"Torres","sequence":"first","affiliation":[]},{"given":"Finn Olav","family":"Sveen","sequence":"additional","affiliation":[]},{"given":"Jose Maria","family":"Sarriegi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code, 1st edn. John Wiley and Sons Inc., New York (1994)","edition":"1"},{"key":"22_CR2","unstructured":"Torres, J.M., Sarriegi, J.M.: Dynamics aspects of security management of information systems (2004)"},{"key":"22_CR3","volume-title":"The Art of Deception","author":"K. Mitnick","year":"2002","unstructured":"Mitnick, K.: The Art of Deception. John Wiley Inc., Indianapolis (2002)"},{"key":"22_CR4","unstructured":"Anderson, R.: Proceedings of 17th Annual Computer Security Applications Conference, ACSAC 2001, New Orleans, Louisiana (2001)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Dhillon, G.: Computers & Security\u00a020(2), 165 (2001)","DOI":"10.1016\/S0167-4048(01)00209-7"},{"key":"22_CR6","volume-title":"Industrial Dynamics","author":"J. Forrester","year":"1961","unstructured":"Forrester, J.: Industrial Dynamics. Productivity Press, Cambridge (1961)"},{"key":"22_CR7","volume-title":"Business Dynamics: Systems Thinking and Modeling for a Complex World","author":"J.D. Sterman","year":"2000","unstructured":"Sterman, J.D.: Business Dynamics: Systems Thinking and Modeling for a Complex World. Irwin\/McGraw-Hill, Boston (2000)"},{"key":"22_CR8","unstructured":"Torres, J.M.: An information systems security management framework for small and medium size enterprises (unpublished doctoral thesis). Ph.D. thesis, Tecnun, University of Navarra (2007)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Sarriegi, J.M., Torres, J.M., Santos, I.D., Egozcue, J.E., Liberal, D.: Modeling and simulating information security management (2007)","DOI":"10.1007\/978-3-540-89173-4_27"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Richardson, G.P., Andersen, D.F.: System Dynamics Review\u00a011(2), 113 (1995)","DOI":"10.1002\/sdr.4260110203"},{"key":"22_CR11","unstructured":"Vennix, J.A., Andersen, D.F., Richardson, G.P., Rohrbaugh, J.: In Modeling for Learning Organizations. In: Morecroft, J.D.W., Sterman, J.D. (eds.). Productivity Press, Portland (1994)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Vennix, J.A.: System Dynamics Review\u00a015(4), 379\u2013401 (1999)","DOI":"10.1002\/(SICI)1099-1727(199924)15:4<379::AID-SDR179>3.0.CO;2-E"},{"key":"22_CR13","volume-title":"Competitive Strategy Dynamics","author":"K. Warren","year":"2002","unstructured":"Warren, K.: Competitive Strategy Dynamics. John Wiley & Sons, Ltd., Chichester (2002)"},{"key":"22_CR14","volume-title":"Strategic Management Dynamics","author":"K. Warren","year":"2008","unstructured":"Warren, K.: Strategic Management Dynamics. John Wiley & Sons, Ltd., Chichester (2008)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Botha, R., Gaadingwe, T.: Computers & Security\u00a025(4), 247 (2006)","DOI":"10.1016\/j.cose.2006.04.002"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Dhillon, G.: Information Management & Computer Security 7(4), 171 (1999)","DOI":"10.1108\/09685229910292664"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Dhillon, G., Moores, S.: Computers & Security\u00a020(8), 715 (2001)","DOI":"10.1016\/S0167-4048(01)00813-6"},{"key":"22_CR18","volume-title":"Beyond Fear","author":"B. Schneier","year":"2003","unstructured":"Schneier, B.: Beyond Fear, 1st edn. Copernicus Books, New York (2003)","edition":"1"},{"key":"22_CR19","unstructured":"Sarriegi, J.M., Eceiza, E., Torres, J.M., Santos, J.: Informe sobre la Gestion de la Seguridad de los Sistemas de Informacion. Miramon Enpresa Digitala (2005)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03552-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:26:16Z","timestamp":1558268776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03552-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035517","9783642035524"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03552-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}