{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:07:21Z","timestamp":1773950841432,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11036-018-01208-0","type":"journal-article","created":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T07:17:00Z","timestamp":1547882220000},"page":"2032-2037","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Security Challenges Emerging from the Technological Developments"],"prefix":"10.1007","volume":"24","author":[{"given":"Paulo","family":"Costa","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Montenegro","sequence":"additional","affiliation":[]},{"given":"Teresa","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"1208_CR1","unstructured":"(2017) Outbreak WCry\/WannaCry Ransomware | \nwww.cert.be\n\n. \nhttps:\/\/www.cert.be\/docs\/outbreak-wcrywannacry-ransomware.html"},{"key":"1208_CR2","unstructured":"Petya ransomware outbreak: Here\u2019s what you need to know. \nhttps:\/\/www.symantec.com\/blogs\/threat-intelligence\/petya-ransomware-wiper"},{"key":"1208_CR3","unstructured":"(2017) Gartner says 8.4 billion connected \u201cThings\u201d will be in use in 2017, up 31 percent from 2016. \nhttps:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016"},{"key":"1208_CR4","unstructured":"Global cybersecurity index. \nhttps:\/\/www.itu.int\/en\/ITU-D\/Cybersecurity\/Pages\/global-cybersecurity-index.aspx"},{"key":"1208_CR5","unstructured":"Oliphant R, McGoogan C (2017) The telegraph. \nhttps:\/\/www.telegraph.co.uk\/news\/2017\/06\/28\/nato-assisting-ukrainian-cyber-defences-ransom-ware-attack-cripples\/"},{"key":"1208_CR6","unstructured":"Vodafone Funda\u00e7\u00e3o Vodafone apresenta 1a Aldeia Inteligente de Montanha. \nhttps:\/\/press.vodafone.pt\/2016\/02\/23\/fundacao-vodafone-apresenta-1a-aldeia-inteligente-de-montanha-3\/"},{"key":"1208_CR7","unstructured":"Hue products - meethue | Philips lighting. \nhttps:\/\/www2.meethue.com\/en-us\/products"},{"key":"1208_CR8","unstructured":"Nest Nest learning thermostat | programs itself then pays for itself. \nhttps:\/\/www.nest.com\/thermostats\/nest-learning-thermostat\/overview\/"},{"key":"1208_CR9","unstructured":"August smart lock | control and monitor your door from anywhere. \nhttps:\/\/august.com\/products\/august-smart-lock-connect"},{"key":"1208_CR10","unstructured":"Fox-Brewster T (2016) Is this one company to blame for cameras exploited in record web attacks?. \nhttps:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/10\/07\/chinese-firm-xm-blamed-for-epic-ddos-attacks\/"},{"key":"1208_CR11","unstructured":"ISO\/IEC (2018) ISO\/IEC 27000:2018. \nhttp:\/\/www.iso.org"},{"key":"1208_CR12","unstructured":"Allen TA (2018) NIST special publication 800-series general information. \nhttps:\/\/www.nist.gov\/itl\/nist-special-publication-800-series-general-information"},{"key":"1208_CR13","unstructured":"OECD OECD guidelines for the security of information systems and networks: towards a culture of security - OECD. \nhttp:\/\/www.oecd.org"},{"key":"1208_CR14","unstructured":"OECD Digital security risk management - OECD. \nhttp:\/\/www.oecd.org"},{"key":"1208_CR15","unstructured":"PORDATA PORDATA - empresas: total e por dimens\u00e3o. \nhttps:\/\/www.pordata.pt"},{"key":"1208_CR16","unstructured":"PORDATA PORDATA - pequenas e m\u00e9dias empresas em % do total de empresas: total e por dimens\u00e3o. \nhttps:\/\/www.pordata.pt"},{"key":"1208_CR17","unstructured":"DRE (2015) Resolu\u00e7\u00e3o do conselho de ministros 36\/2015, 2015-06-12. \nhttps:\/\/dre.pt"},{"key":"1208_CR18","unstructured":"(2017) Compet\u00eancias Digitais. \nhttp:\/\/www.incode2030.gov.pt\/portugal-e-competencias-digitais"},{"key":"1208_CR19","unstructured":"ISO\/IEC ISO\/IEC 27001 Information security management. \nhttp:\/\/www.iso.org\/cms\/render\/live\/en\/sites\/isoorg\/home\/standards\/popular-standards\/isoiec-27001-information-securit.html"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-01208-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-01208-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-01208-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T14:32:43Z","timestamp":1593527563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-01208-0"}},"subtitle":["A Practical Case Study of Organizational Awareness to the Security Risks"],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1208"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-01208-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,19]]},"assertion":[{"value":"19 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}