{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:50:24Z","timestamp":1725702624225},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331602"},{"type":"electronic","value":"9783642331619"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33161-9_40","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T13:57:47Z","timestamp":1348149467000},"page":"269-272","source":"Crossref","is-referenced-by-count":0,"title":["Concept for Scenario-Development for Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Benesch","sequence":"first","affiliation":[]},{"given":"Johannes","family":"G\u00f6llner","sequence":"additional","affiliation":[]},{"given":"Johann","family":"H\u00f6chtl","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Peer","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Seb\u00f6ck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Focus Consortium: Problem space report: Critical infrastructure & supply chain protection, Deliverable 5.1, p. 20 (January 2012)"},{"key":"40_CR2","unstructured":"Maguire, R.: Safety Cases and Safety Reports: Meaning, Motivation and Management. Ashgate Publishing, Ltd. (2006)"},{"key":"40_CR3","unstructured":"Focus Consortium: Summary of problem space descriptions, p. 2, http:\/\/www.focusproject.eu\/documents\/14976\/15033\/Summary+of+FOCUS+problem+space+descriptions?version=1.0 (retrieved March 29, 2012)"},{"key":"40_CR4","unstructured":"Focus Consortium: Report describing and defining the methodology (Deliverable 2.1) (September 2011)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Merlingen, M., Mireanu, M., Stavrevska, E.B.: Europ\u00e4ische Sicherheit. Wo stehen wir heute? In: Jahrbuch 2008, Center for OSCE research (CORE). Center for OSCE Research (CORE) am Institut f\u00fcr Friedensforschung und Sicherheitspolitik (IFSH) an der Universit\u00e4t Hamburg (2008), http:\/\/www.core-hamburg.de\/documents\/jahrbuch\/08\/pdf-gesamt.pdf","DOI":"10.5771\/9783845220413-97"},{"key":"40_CR6","unstructured":"Fry, M.J., Jan, H.: European Union and Strategy: An Emerging Actor. Routledge Chapman & Hall (2007)"},{"key":"40_CR7","unstructured":"Focus Consortium: Report on alternative future models of comprehensiveness, Deliverable 3.2 (December 2011), http:\/\/www.focusproject.eu\/web\/focus\/downloads\/-\/document_library_display\/1QpQ\/view\/15032"},{"key":"40_CR8","unstructured":"Focus Consortium: Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles: Deliverable 3.3 (March 2012)"},{"key":"40_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Critical Infrastructure Protection","year":"2012","unstructured":"Lopez, J., Setola, R., Wolthusen, S.D. (eds.): Critical Infrastructure Protection. LNCS, vol.\u00a07130. Springer, Heidelberg (2012)"},{"key":"40_CR10","unstructured":"Dostal, E., Cloete, A., J\u00e1ros, G.: Biomatrix: A Systems Approach to Organisational and Societal Change. BiomatrixWeb (2005)"},{"key":"40_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-22961-9_26","volume-title":"Electronic Government and the Information Systems Perspective","author":"J. H\u00f6chtl","year":"2011","unstructured":"H\u00f6chtl, J., Reichst\u00e4dter, P.: Linked Open Data - A Means for Public Sector Information Management. In: Andersen, K.N., Francesconi, E., Gr\u00f6nlund, \u00c5., van Engers, T.M. (eds.) EGOVIS 2011. LNCS, vol.\u00a06866, pp. 330\u2013343. Springer, Heidelberg (2011)"}],"container-title":["Communications in Computer and Information Science","Future Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33161-9_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T12:02:58Z","timestamp":1643457778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33161-9_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331602","9783642331619"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33161-9_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}