{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:00:10Z","timestamp":1725570010809},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166952"},{"type":"electronic","value":"9783642166969"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16696-9_24","type":"book-chapter","created":{"date-parts":[[2010,11,6]],"date-time":"2010-11-06T07:53:44Z","timestamp":1289030024000},"page":"218-226","source":"Crossref","is-referenced-by-count":0,"title":["Study on Architecture-Oriented Information Security Risk Assessment Model"],"prefix":"10.1007","author":[{"given":"Wei-Ming","family":"Ma","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"International Organization for Standardization, ISO\/IEC 27001 Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements, ISO\/IEC, http:\/\/www.iso.org\/iso"},{"key":"24_CR2","volume-title":"IT Governance: A Manager\u2019s Guide to Data Security and ISO 27001 \/ ISO 27002","author":"A. Calder","year":"2008","unstructured":"Calder, A., Watkins, S.: IT Governance: A Manager\u2019s Guide to Data Security and ISO 27001 \/ ISO 27002. Kogan Page, London (2008)"},{"key":"24_CR3","unstructured":"Ma, W.-M.: Study of Consulting Service in Implementation of Information Security Management System. Journal of Global Business Operation and Management, 23\u201331 (2009)"},{"key":"24_CR4","volume-title":"Economic Control of Quality of Manufactured Product","author":"W.A. Shewhart","year":"1931","unstructured":"Shewhart, W.A.: Economic Control of Quality of Manufactured Product. D. Van Nostrand Company, New York (1931)"},{"key":"24_CR5","volume-title":"Metrics and Methods for Security Risk Management","author":"C. Young","year":"2010","unstructured":"Young, C.: Metrics and Methods for Security Risk Management. Syngress, Boston (2010)"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jclepro.2003.08.008","volume":"12","author":"A. Labodova","year":"2004","unstructured":"Labodova, A.: Implementing integrated management systems using a risk analysis based approach. Journal of Cleaner Production\u00a012, 571\u2013580 (2004)","journal-title":"Journal of Cleaner Production"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Poore, R.S.: Valuing Information Assets for Security Risk Management. Information Systems Security\u00a09(4) (2000)","DOI":"10.1201\/1086\/43311.9.4.20000910\/31364.4"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Boehm, B.W.: Software Risk Management: Principles and Practices. IEEE Software (1991)","DOI":"10.1109\/52.62930"},{"key":"24_CR9","unstructured":"Hung, M.-F.: Study on Architecture-Oriented Project Risk Management Model, Thesis, Information Management Department, National Sun Yat-sen University (2009)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Gilliam, D.P.: Security Risks: Management and Mitigation in the Software Life Cycle. In: Proceedings of the 13th IEEE International Workshops on Enabling Technologies, p. 3 (2004)","DOI":"10.1109\/ENABL.2004.55"},{"key":"24_CR11","unstructured":"Yazar, Z.: A qualitative risk analysis and management tool \u2013 CRAMM, SANS Institute (2002)"},{"key":"24_CR12","volume-title":"System Analysis and Design","author":"W.S. Chao","year":"2009","unstructured":"Chao, W.S., Moore, J.M., Chang, C.S.: System Analysis and Design. Lambert, New York (2009)"},{"key":"24_CR13","volume-title":"Architect: System Analysis and Design\u2014Using Software Architecture Model","author":"Chao","year":"2008","unstructured":"Chao: Architect: System Analysis and Design\u2014Using Software Architecture Model. Drmaster Culture Publishing, Taipei (2008)"},{"key":"24_CR14","volume-title":"Achieving Service-Oriented Architecture: Applying an Enterprise Architecture Approach","author":"R. Sweeney","year":"2010","unstructured":"Sweeney, R.: Achieving Service-Oriented Architecture: Applying an Enterprise Architecture Approach. Wiley, Hoboken (2010)"},{"key":"24_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9781420045017","volume-title":"Service-Oriented Architecture: SOA Strategy, Methodology, and Technology","author":"J.P. Lawler","year":"2007","unstructured":"Lawler, J.P., Howell-Barber, H.: Service-Oriented Architecture: SOA Strategy, Methodology, and Technology. Auerbach Publications, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16696-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T23:31:16Z","timestamp":1559777476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16696-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166952","9783642166969"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16696-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}