{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T12:58:03Z","timestamp":1649163483307},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s10257-012-0204-x","type":"journal-article","created":{"date-parts":[[2012,10,25]],"date-time":"2012-10-25T08:23:49Z","timestamp":1351153429000},"page":"429-431","source":"Crossref","is-referenced-by-count":0,"title":["Introduction to the special issue on cyber security and management"],"prefix":"10.1007","volume":"10","author":[{"given":"Frederick T.","family":"Sheldon","sequence":"first","affiliation":[]},{"given":"J. Todd","family":"McDonald","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"204_CR1","unstructured":"Hack Against Citigroup revealed: is bank security system really bullet-proof? International Business Times New York, Jun 09, 2011. http:\/\/newyork.ibtimes.com\/articles\/160322\/20110609\/citibank-hacked-security-online.htm"},{"key":"204_CR2","unstructured":"Internet Crime Report (2011) U.S. Federal Bureau of Investigation, Internet Crime Complaint Center. http:\/\/www.ic3.gov\/media\/annualreport\/2011_IC3Report.pdf"},{"key":"204_CR3","unstructured":"Johnson R (2011) The biggest hacking attacks of 2011. Business Insider, Jun 13, 2011. http:\/\/www.businessinsider.com\/imf-cyber-attacked-hackers-sony-rsa-lockheed-martin-epsilon-michaels-2011-6?op=1"},{"key":"204_CR4","unstructured":"McDonald JT, HivelyLM (2012) Multidisciplinary approaches for cyber security, Jr. of Computer Engineering and Information Technology http:\/\/scitechnol.com\/jceithome.php"},{"key":"204_CR5","unstructured":"Miller F (1882) Telegraphic code to insure privacy and secrecy in the transmission of telegrams"},{"key":"204_CR6","doi-asserted-by":"crossref","unstructured":"Mink A, Tang X, Ma L, Nakassis T, et al (2006) High speed quantum key distribution system supports one-time pad encryption of real-time video. In Donkor EJ, Pirich AR, Brandt HE (eds) Proceeding of SPIE quantum information and computation IV, 6244: 62440 M","DOI":"10.1117\/12.664114"},{"key":"204_CR50","unstructured":"Norton (2012) Cybercrime Report (Sept. 5, 2012). http:\/\/now-static.norton.com\/now\/en\/pu\/images\/Promotions\/2012\/cybercrimeReport\/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf"},{"key":"204_CR7","unstructured":"Shachtman N (2011) Computer virus hits US drone fleet. Wired, Oct 7, 2011. http:\/\/www.wired.com\/dangerroom\/2011\/10\/virus-hits-drone-fleet\/"},{"key":"204_CR8","doi-asserted-by":"crossref","unstructured":"Shannon C (1948) A mathematical theory of communications. Bell Syst Tech J 27: 379\u2013423 & 623\u2013656","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"issue":"4","key":"204_CR9","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"204_CR10","unstructured":"Siciliano R (2009) Credit card fraud tops consumers concerns. Finextra, Apr 7, 2009. http:\/\/www.finextra.com\/community\/fullblog.aspx?id=2756"},{"key":"204_CR11","unstructured":"Thomas P, Katrandjian O (2011) Chinese hack into us chamber of commerce, authorities say. ABC News, Dec 21, 2011. http:\/\/abcnews.go.com\/International\/chinese-hack-us-chamber-commerce-authorities\/story?id=15207642"},{"key":"204_CR12","first-page":"109","volume":"55","author":"G Vernam","year":"1926","unstructured":"Vernam G (1926) Cipher printing telegraph systems for secret wire and radio telegraphic communications. J IEEE 55:109\u2013115","journal-title":"J IEEE"},{"key":"204_CR13","unstructured":"Waugh R (2012) Cyber-espionage warning from US security chief who warned of 9\/11. Daily Mail Online. Mar 28, 2012. http:\/\/www.dailymail.co.uk\/sciencetech\/article-2121624\/Every-major-company-U-S-hacked-China-Cyber-espionage-warning-U-S-security-chief-warned-9-11.html"},{"key":"204_CR14","unstructured":"Wyler G (2011) Pentagon admits 24,000 files were hacked, declares cyberspace a theater of war. Business Insider, Jun. 13, 2011. http:\/\/articles.businessinsider.com\/2011-07-14\/politics\/30034321_1_cyber-threat-cyber-attacks-new-command"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-012-0204-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-012-0204-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-012-0204-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T20:13:20Z","timestamp":1562271200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-012-0204-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["204"],"URL":"https:\/\/doi.org\/10.1007\/s10257-012-0204-x","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,26]]}}}