{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:31:46Z","timestamp":1743114706617,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811597381"},{"type":"electronic","value":"9789811597398"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_47","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"643-653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8179-9007","authenticated-orcid":false,"given":"Lixia","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-8178","authenticated-orcid":false,"given":"Huiyu","family":"Ni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-3944","authenticated-orcid":false,"given":"Guangquan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Moldagulova, A., Uskenbayeva, R.K., Satybaldiyeva, R.Z., Kamennova, M.S., Kalpeeva, Z.B., Bektemyssova, G.U.: On identification of hybrid business processes for effective implementation in the form of cloud services. In: 2019 19th International Conference on Control, Automation and Systems (ICCAS), pp. 51\u201354, IEEE, Jeju (2019)","DOI":"10.23919\/ICCAS47443.2019.8971520"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Sherzod, G., Abdukhalil, G., Viktoriya, V.: Formalization of the business process security. In: 2019 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1\u20133. IEEE, Tashkent (2019)","DOI":"10.1109\/ICISCT47635.2019.9011940"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Ming, Q., Songtao, L.: Overview of system wide information management and security analysis. In: 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), pp. 191\u2013194, IEEE, Bangkok (2017)","DOI":"10.1109\/ISADS.2017.39"},{"key":"47_CR4","doi-asserted-by":"publisher","first-page":"101869","DOI":"10.1016\/j.cose.2020.101869","volume":"96","author":"G Stergiopoulos","year":"2020","unstructured":"Stergiopoulos, G., Dedousis, P., Gritzalis, D.: Automatic network restructuring and risk mitigation through business process asset dependency analysis. Comput. Secur. 96, 101869 (2020)","journal-title":"Comput. Secur."},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12599-018-0518-4","volume":"60","author":"R Matulevi\u010dius","year":"2018","unstructured":"Matulevi\u010dius, R., Norta, A., Samar\u00fctel, S.: Security requirements elicitation from airline turnaround processes. Bus. Inf. Syst. Eng. 60, 3\u201320 (2018)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"47_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.ssci.2016.06.015","volume":"89","author":"S Torabi","year":"2016","unstructured":"Torabi, S., Giahi, R., Sahebjamnia, N.: An enhanced risk assessment framework for business continuity management systems. Saf. Sci. 89, 201\u2013218 (2016)","journal-title":"Saf. Sci."},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Belov, V.M., Pestunov, A.I., Pestunova, T.M.: On the issue of information security risks assessment of business processes. In: Proceedings of the 14th International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering APEIE, pp. 136\u2013139. IEEE, Piscataway (2018)","DOI":"10.1109\/APEIE.2018.8545576"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Hariyanti, E., Djunaidy, A., Siahaan, D.O.: A conceptual model for information security risk considering business process perspective. In: 2018 4th International Conference on Science and Technology (ICST), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICSTC.2018.8528678"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Yang, J., Han, J., Zhang, X.: Information system security risk assessment based on IDAV multi-criteria decision model. In: 2018 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 121\u2013127. IEEE, Xiamen (2018)","DOI":"10.1109\/ICASID.2018.8693111"},{"key":"47_CR10","doi-asserted-by":"publisher","first-page":"6466","DOI":"10.1016\/j.egypro.2019.01.132","volume":"158","author":"Y Shen","year":"2019","unstructured":"Shen, Y., Gu, C., Zhao, P.: Structural vulnerability assessment of multi-energy system using a pagerank algorithm. Energy Procedia 158, 6466\u20136471 (2019)","journal-title":"Energy Procedia"},{"key":"47_CR11","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1016\/j.procs.2018.08.109","volume":"126","author":"M Piwowarski","year":"2018","unstructured":"Piwowarski, M., Danuta, M., Ma\u0142gorzata, \u0141., Mariusz, B., Kesra, N.: TOPSIS and VIKOR methods in study of sustainable development in the EU countries. Procedia Comput. Sci. 126, 1683\u20131692 (2018)","journal-title":"Procedia Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:21:24Z","timestamp":1604578884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}