{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:30:40Z","timestamp":1759091440210},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,4,23]],"date-time":"2011-04-23T00:00:00Z","timestamp":1303516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s10257-011-0177-1","type":"journal-article","created":{"date-parts":[[2011,4,22]],"date-time":"2011-04-22T14:11:32Z","timestamp":1303481492000},"page":"433-453","source":"Crossref","is-referenced-by-count":15,"title":["Defining and computing a value based cyber-security measure"],"prefix":"10.1007","volume":"10","author":[{"given":"Anis Ben","family":"Aissa","sequence":"first","affiliation":[]},{"given":"Robert K.","family":"Abercrombie","sequence":"additional","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Mili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,23]]},"reference":[{"key":"177_CR1","doi-asserted-by":"crossref","unstructured":"Ben-Aissa A, Abercrombie RK, Sheldon FT, Mili A (2010) Quantifying security threats and their potential impact: a case study. innovation in systems and software engineering. p 13. doi: 10.1007\/s11334-010-0123-2","DOI":"10.1007\/s11334-010-0123-2"},{"key":"177_CR2","volume-title":"The nature of system dependability: a stakeholder\/value approach. Technical report USC-CSSE-2004\u2013520","author":"B Boehm","year":"2004","unstructured":"Boehm B, Huang LG, Jain A, Madachy R (2004) The nature of system dependability: a stakeholder\/value approach. Technical report USC-CSSE-2004\u2013520. University of Southern California, Centre for Systems and Software Research, California"},{"key":"177_CR3","unstructured":"Estevez E, Fillottrani P, Janowski T (2010) Information sharing in government\u2014conceptual model for policy formulation. Paper presented at the 10th European conference on e-government, Limerick, Ireland, 17\u201318 June 2010"},{"issue":"1","key":"177_CR4","doi-asserted-by":"crossref","first-page":"61","DOI":"10.5381\/jot.2004.3.1.c6","volume":"3","author":"D Firesmith","year":"2004","unstructured":"Firesmith D (2004) Specifying reusable security requirements. J Object Technol 3(1):61\u201375","journal-title":"J Object Technol"},{"key":"177_CR5","first-page":"47","volume-title":"Foundations of component-based systems","author":"D Garlan","year":"2000","unstructured":"Garlan D, Monroe RT, Wile D (2000) Acme: architectural descriptions of component-based systems. In: Leavens GT, Sitaraman M (eds) Foundations of component-based systems. Cambridge University Press, Cambridge, pp 47\u201368"},{"key":"177_CR6","doi-asserted-by":"crossref","unstructured":"Garlan D, Schmerl B, Cheng S-W (2009) Software architecture-based self-adaptation. In: Mieso Denko LYaYZ (ed) Autonomic computing and networking, vol 21. Springer, US. pp 31\u201355. doi: 10.1007\/978-0-387-89828-5_2 . ISBN 978-0-387-89827-8","DOI":"10.1007\/978-0-387-89828-5_2"},{"key":"177_CR7","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1037\/h0054346","volume":"50","author":"AH Maslow","year":"1943","unstructured":"Maslow AH (1943) A theory of human motivation. Origin Pub Psychol Rev 50:370\u2013396","journal-title":"Origin Pub Psychol Rev"},{"key":"177_CR8","unstructured":"Rocha SVD, Abdelounahab Z, Freire E (2005) Requirement elicitation based on goals with security and privacy policies in electronic commerce. In: Anais do WER05\u2014Workshop em Engenharia de Requisitos. pp 63\u201374"},{"key":"177_CR9","unstructured":"Sawma VD, Probert RL (2003) E-commerce authenication: an effective countermeasures design model. In: Paper presented at the ICEIS 2003, proceedings of the 5th international conference on enterprise information systems, Angers, France, 22\u201326 April 2003"},{"key":"177_CR10","unstructured":"Sekaran KC (2007) Requirements driven multiple view paradigm for developing security architecture. PWASET Proc World Acad Sci Eng Technol 25:156\u2013159"},{"key":"177_CR11","volume-title":"Psychology\u2014the search for understanding","author":"JA Simons","year":"1987","unstructured":"Simons JA, Irwin DB, Drinnien BA (1987) Psychology\u2014the search for understanding. West Publishing Company, New York"},{"key":"177_CR12","unstructured":"Wikipedia\u00ae (2010) Maslow\u2019s hierarchy of needs. http:\/\/en.wikipedia.org\/wiki\/Maslow%27s_hierarchy_of_needs . Accessed 19 July 2010"},{"key":"177_CR13","doi-asserted-by":"crossref","unstructured":"Wu D, Li Q, He M, Boehm B, Yang Y, Koolmanojwong S (2010) Analysis of stakeholder\/value dependency patterns and process implications: a controlled experiment. Proceedings of the 43rd Hawaii international conference on system sciences (HICSS-43). doi: 10.1109\/HICSS.2010.60","DOI":"10.1109\/HICSS.2010.60"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-011-0177-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-011-0177-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-011-0177-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:42:14Z","timestamp":1559130134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-011-0177-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,23]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["177"],"URL":"https:\/\/doi.org\/10.1007\/s10257-011-0177-1","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,23]]}}}