{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:42Z","timestamp":1725538302178},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047978"},{"type":"electronic","value":"9783642047985"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04798-5_8","type":"book-chapter","created":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T08:17:52Z","timestamp":1254385072000},"page":"113-123","source":"Crossref","is-referenced-by-count":9,"title":["Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research"],"prefix":"10.1007","author":[{"given":"Stig","family":"Johnsen","sequence":"first","affiliation":[]},{"given":"Torbjorn","family":"Skramstad","sequence":"additional","affiliation":[]},{"given":"Janne","family":"Hagen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"B. Alteren, J. Sveen, G. Guttormsen, B. Madsen, R. Klev and O. Helgesen, Smarter together in offshore drilling \u2013 A successful action research project? Proceedings of the Seventh International Conference on Probabilistic Safety Assessment and Management, pp. 1302\u20131308, 2004.","key":"8_CR1","DOI":"10.1007\/978-0-85729-410-4_210"},{"unstructured":"S. Antonsen, L. Ramstad and T. Kongsvik, Unlocking the organization: Action research as a means of improving organizational safety, Safety Science Monitor, vol. 11(1), 2007.","key":"8_CR2"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-0-387-35515-3_3","volume-title":"Information Security for Global Information Infrastructures","author":"H. Armstrong","year":"2000","unstructured":"H. Armstrong, Managing information security in healthcare \u2013 An action research experience, in Information Security for Global Information Infrastructures, S. Qing and J. Eloff (Eds.), Kluwer, Boston, Massachusetts, pp. 19\u201328, 2000."},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1111\/j.1365-2575.2004.00162.x","volume":"14","author":"R. Davison","year":"2004","unstructured":"R. Davison, M. Martinsons and N. Kock, Principles of canonical action research, Information Systems Journal, vol. 14(1), pp. 65\u201386, 2004.","journal-title":"Information Systems Journal"},{"key":"8_CR5","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984614","volume-title":"Introduction to Action Research: Social Research for Social Change","author":"D. Greenwood","year":"2007","unstructured":"D. Greenwood and M. Levin, Introduction to Action Research: Social Research for Social Change, Sage Publications, Thousand Oaks, California, 2007."},{"key":"8_CR6","volume-title":"Resilience Engineering","author":"E. Hollnagel","year":"2006","unstructured":"E. Hollnagel, D. Woods and N. Leveson, Resilience Engineering, Ashgate, Aldershot, United Kingdom, 2006."},{"unstructured":"International Society for Automation, ISA Security Compliance Institute, Research Triangle Park, North Carolina (www.isa.org\/Content\/Naviga tionMenu\/Technical_Information\/ASCI\/ISCI\/ISCI.htm).","key":"8_CR7"},{"unstructured":"International Society for Automation, Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program, ANSI\/ISA-99.02.01-2009, Research Triangle Park, North Carolina, 2009.","key":"8_CR8"},{"doi-asserted-by":"crossref","unstructured":"H. James, Managing information systems security: A soft approach, Proceedings of the Information Systems Conference of New Zealand, pp. 10\u201320, 1996.","key":"8_CR9","DOI":"10.1109\/ISCNZ.1996.554947"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-0-387-75462-8_7","volume-title":"Critical Infrastructure Protection","author":"S. Johnsen","year":"2007","unstructured":"S. Johnsen, R. Ask and R. Roisli, Reducing risk in oil and gas production operations, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 83\u201395, 2007."},{"key":"8_CR11","first-page":"12","volume-title":"CERN tests reveal security flaws with industrial networked devices, The Industrial Ethernet Book, GGH Marketing Communications","author":"S. Luders","year":"2006","unstructured":"S. Luders, CERN tests reveal security flaws with industrial networked devices, The Industrial Ethernet Book, GGH Marketing Communications, Titchfield, United Kingdom, pp. 12\u201323, November 2006."},{"key":"8_CR12","volume-title":"The Human Problems of an Industrial Civilization","author":"E. Mayo","year":"1933","unstructured":"E. Mayo, The Human Problems of an Industrial Civilization, Macmillan, New York, 1933."},{"unstructured":"Nuclear Regulatory Commission, The effects of Ethernet-based, non-safety-related controls on the safe and continued operation of nuclear power stations, NRC Information Notice 2007-15, Washington, DC (www.nrc.gov\/reading-rm\/doc-collections\/gen-comm\/info-notices\/20 07\/in200715.pdf), 2007.","key":"8_CR13"},{"key":"8_CR14","volume-title":"Normal Accidents: Living with High Risk Technologies","author":"C. Perrow","year":"1999","unstructured":"C. Perrow, Normal Accidents: Living with High Risk Technologies, Princeton University Press, Princeton, New Jersey, 1999."},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/B978-0-7506-1178-7.50006-X","volume-title":"Near Miss Reporting as a Safety Tool","author":"J. Reason","year":"1991","unstructured":"J. Reason, Too little and too late: A commentary on accident and incident reporting systems, in Near Miss Reporting as a Safety Tool, T. van der Schaaf, D. Lucas and A. Hale (Eds.), Butterworth-Heinemann, Oxford, United Kingdom, pp. 9\u201326, 1991."},{"key":"8_CR16","volume-title":"Managing the Risks of Organizational Accidents","author":"J. Reason","year":"1997","unstructured":"J. Reason, Managing the Risks of Organizational Accidents, Ashgate, Aldershot, United Kingdom, 1997."},{"unstructured":"A. Richter, New ways of managing prevention: A cultural and participative approach, Safety Science Monitor, vol. 7(1), 2003.","key":"8_CR17"},{"doi-asserted-by":"crossref","unstructured":"S. Smith, R. Jamieson and D. Winchester, An action research program to improve information systems security compliance across government agencies, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences, p. 99, 2007.","key":"8_CR18","DOI":"10.1109\/HICSS.2007.58"},{"unstructured":"K. Stouffer, J. Falco and K. Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST Special Publication 800-82, Initial Public Draft, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006.","key":"8_CR19"},{"key":"8_CR20","volume-title":"The Black Swan: The Impact of the Highly Improbable","author":"N. Taleb","year":"2007","unstructured":"N. Taleb, The Black Swan: The Impact of the Highly Improbable, Random House, New York, 2007."},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1108\/01437739010135529","volume":"11","author":"D. Eynde van","year":"1990","unstructured":"D. van Eynde and J. Bledsoe, The changing practice of organizational development, Leadership and Organizational Development Journal, vol. 11(2), pp. 25\u201330, 1990.","journal-title":"Leadership and Organizational Development Journal"},{"unstructured":"R. Westrum, Removing latent pathogens, presented at the Sixth International Australian Aviation Psychology Conference, 2003.","key":"8_CR22"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04798-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,10]],"date-time":"2019-03-10T01:59:04Z","timestamp":1552183144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04798-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047978","9783642047985"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04798-5_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}