{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:07Z","timestamp":1725790987881},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_45","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T02:15:38Z","timestamp":1395713738000},"page":"446-455","source":"Crossref","is-referenced-by-count":3,"title":["Motivation-Based Risk Analysis Process for IT Systems"],"prefix":"10.1007","author":[{"given":"Agata","family":"Niescieruk","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Ksiezopolski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Barber, R.: Hackers Profiled - Who Are They and What Are Their Motivations? Computer Fraud & Security\u00a02(1), 14\u201317 (2001)","DOI":"10.1016\/S1361-3723(01)02017-6"},{"issue":"5","key":"45_CR2","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1007\/s12204-013-1439-5","volume":"18","author":"J. Gao","year":"2013","unstructured":"Gao, J., Zhang, B., Chen, X., Luo, Z.: Ontology-Based Model of Network and Computer Attacks for Security Assessment. Journal of Shanghai Jiaotong University\u00a018(5), 554\u2013562 (2013)","journal-title":"Journal of Shanghai Jiaotong University"},{"key":"45_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.cose.2004.11.002","volume":"14","author":"M. Gerber","year":"2005","unstructured":"Gerber, M., Solms, R.: Management of risk in the information age. Computer & Security\u00a014, 16\u201330 (2005)","journal-title":"Computer & Security"},{"issue":"8","key":"45_CR4","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.jss.2007.11.716","volume":"81","author":"L. Grunske","year":"2008","unstructured":"Grunske, L., Juoyce, D.: Quantitative risk-based security prediction for component-based systems with explicity modeled attack profiles. Journal of Systems and Software\u00a081(8), 1327\u20131345 (2008)","journal-title":"Journal of Systems and Software"},{"key":"45_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2006.11.002","volume":"26","author":"B. Ksiezopolski","year":"2007","unstructured":"Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security\u00a026, 246\u2013255 (2007)","journal-title":"Computers & Security"},{"issue":"4","key":"45_CR6","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.cose.2012.01.006","volume":"31","author":"B. Ksiezopolski","year":"2012","unstructured":"Ksiezopolski, B.: QoP-ML: Quality of Protection modelling language for cryptographic protocols. Computers & Security\u00a031(4), 569\u2013596 (2012)","journal-title":"Computers & Security"},{"key":"45_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/978-3-642-36818-9_27","volume-title":"Information and Communication Technology","author":"B. Ksiezopolski","year":"2013","unstructured":"Ksiezopolski, B., Rusinek, D., Wierzbicki, A.: On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML). In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 261\u2013270. Springer, Heidelberg (2013)"},{"issue":"2","key":"45_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.diin.2006.03.001","volume":"3","author":"M.K. Rogers","year":"2006","unstructured":"Rogers, M.K.: A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation\u00a03(2), 97\u2013102 (2006)","journal-title":"Digital Investigation"},{"key":"45_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.diin.2006.06.002","volume":"3","author":"M.K. Rogers","year":"2006","unstructured":"Rogers, M.K., Seigfried, K., Tidke, K.: Self-reported computer criminal behavior: A psychological analysis. Digital Investigation\u00a03, 116\u2013120 (2006)","journal-title":"Digital Investigation"},{"key":"45_CR10","unstructured":"Othmane, L., Weffers, H., Klabbers, M.: Using Attacker Capabilities and Motivations in Estimating Security Risk. In: SOUPS (2013)"},{"key":"45_CR11","unstructured":"NIST SP 800-30: Risk Management Guide for IT Systems (2008)"},{"key":"45_CR12","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippman, R., Wing, J.M.: Automated generation and analysis of attack graphs. S&Pi (2002)"},{"key":"45_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-21694-7_2","volume-title":"Critical Information Infrastructures Security","author":"N. Vavoulas","year":"2011","unstructured":"Vavoulas, N., Xenakis, C.: A Quantitative Risk Analysis Approach for Deliberate Threats. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol.\u00a06712, pp. 13\u201325. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T17:52:43Z","timestamp":1565286763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}