{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:28Z","timestamp":1725888088683},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_6","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T07:14:39Z","timestamp":1494659679000},"page":"31-36","source":"Crossref","is-referenced-by-count":0,"title":["A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware"],"prefix":"10.1007","author":[{"given":"Junhak","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jae-Woong","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Luia, A.K.H., Ngaib, E.W.T., Lo, C.K.Y.: Disruptive information technology innovations and the cost of equity capital: the moderating effect of CEO incentives and institutional pressures. Inf. Manag. 53(3), 345\u2013354 (2016)","DOI":"10.1016\/j.im.2015.09.009"},{"issue":"4","key":"6_CR2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1361-3723(16)30036-7","volume":"2016","author":"C Everett","year":"2016","unstructured":"Everett, C.: Ransomware: to pay or not to pay? Comput. Fraud Secur. 2016(4), 8\u201312 (2016)","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"6_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/S0252-9602(15)30077-1","volume":"36","author":"NH Khanh","year":"2016","unstructured":"Khanh, N.H., Huy, N.B.: Stability analysis of a computer virus propagation model with antidote in vulnerable system. Acta Math. Sci. 36(1), 49\u201361 (2016)","journal-title":"Acta Math. Sci."},{"key":"6_CR4","unstructured":"KASPERSKY Lab, 28 June 2016. \nhttp:\/\/news.kaspersky.co.kr\/news2016\/06n\/160628.htm"},{"key":"6_CR5","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Computer_worm"},{"key":"6_CR6","unstructured":"Park, J.H.: Penta Security system, standard procedure of IT security, vol. 7 (2015). \n            https:\/\/www.pentasecurity.com"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T07:16:02Z","timestamp":1494659762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_6","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}