{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:22:32Z","timestamp":1771467752486,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T00:00:00Z","timestamp":1450396800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s11277-015-3140-5","type":"journal-article","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T06:58:59Z","timestamp":1450421939000},"page":"913-925","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Information Security Evaluation Using Multi-Attribute Threat Index"],"prefix":"10.1007","volume":"89","author":[{"given":"Young-Man","family":"Je","sequence":"first","affiliation":[]},{"given":"Yen-Yoo","family":"You","sequence":"additional","affiliation":[]},{"given":"Kwan-Sik","family":"Na","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"issue":"2","key":"3140_CR1","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1023\/A:1019920623694","volume":"22","author":"T Ojanper\u00e4","year":"2002","unstructured":"Ojanper\u00e4, T., & Mononen, R. (2002). Security and authentication in the mobile world. Wireless Personal Communications, 22(2), 229\u2013235.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"3140_CR2","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1007\/s11277-015-2662-1","volume":"64","author":"K Saravanan","year":"2015","unstructured":"Saravanan, K., & Senthilkumar, A. (2015). Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced bloom filter. Wireless Personal Communications, 64(2), 821\u2013839.","journal-title":"Wireless Personal Communications"},{"issue":"2\u20133","key":"3140_CR3","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/A:1025546125704","volume":"26","author":"A Prasad","year":"2003","unstructured":"Prasad, A., & Kempf, J. (2003). Wireless personal communications special issue on security for next generation communications. Wireless Personal Communications, 26(2\u20133), 283\u2013284.","journal-title":"Wireless Personal Communications"},{"key":"3140_CR4","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.istr.2013.03.004","volume":"17","author":"D Feledi","year":"2013","unstructured":"Feledi, D., Fenz, S., & Lechner, L. (2013). Toward web-based information security knowledge sharing. Information Security Technical Report, 17, 199\u2013209.","journal-title":"Information Security Technical Report"},{"issue":"6","key":"3140_CR5","first-page":"65","volume":"2","author":"R Kumar","year":"2012","unstructured":"Kumar, R., & Singh, H. (2012). Analysis of information systems security issues and security techniques. International Journal of Advanced Computer Research, 2(6), 65\u201368.","journal-title":"International Journal of Advanced Computer Research"},{"issue":"3\u20134","key":"3140_CR6","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1023\/B:WIRE.0000047064.55093.23","volume":"29","author":"AR Prasad","year":"2004","unstructured":"Prasad, A. R., & Kempf, J. (2004). Security for next generation communications. Wireless Personal Communications, 29(3\u20134), 157\u2013208.","journal-title":"Wireless Personal Communications"},{"key":"3140_CR7","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.ins.2013.02.036","volume":"256","author":"N Feng","year":"2013","unstructured":"Feng, N., Wang, H., & Li, M. (2013). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information Sciences, 256, 57\u201373.","journal-title":"Information Sciences"},{"issue":"5","key":"3140_CR8","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.ijinfomgt.2012.01.001","volume":"32","author":"Y Bang","year":"2012","unstructured":"Bang, Y., Lee, D., Bae, Y., & Ahn, J. (2012). Improving information security management: An analysis of ID\u2013password usage and a new login vulnerability measure. International Journal of Information Management, 32(5), 409\u2013418.","journal-title":"International Journal of Information Management"},{"key":"3140_CR9","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Solms Von","year":"2013","unstructured":"Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 196\u2013207.","journal-title":"Computers & Security"},{"key":"3140_CR10","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A Veiga","year":"2010","unstructured":"Veiga, A., & Eloff, J. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29, 196\u2013207.","journal-title":"Computers & Security"},{"issue":"2","key":"3140_CR11","first-page":"103","volume":"15","author":"K Kim","year":"2004","unstructured":"Kim, K., & Na, K. (2004). Threat index evaluation of information system using multi-attribute risk assessment method. Journal of Korea Risk Management Society, 15(2), 103\u2013126.","journal-title":"Journal of Korea Risk Management Society"},{"issue":"1","key":"3140_CR12","first-page":"118","volume":"7","author":"K Lee","year":"2008","unstructured":"Lee, K., Kim, K., & Na, K. (2008). Multi-attribute threat index for information security. Journal of Korea Society of IT Services, 7(1), 118\u2013122.","journal-title":"Journal of Korea Society of IT Services"},{"key":"3140_CR13","unstructured":"Butler, S. (2000). Security attribute evaluation method: A cost benefit approach. In 24th International conference on software engineering proceedings (pp. 22\u2013240)."},{"key":"3140_CR14","unstructured":"Butler, S., & Fischbeck, P. (2001). Multi-attribute risk assessment, Technical Report CMU-CS-01-169."},{"issue":"8","key":"3140_CR15","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.cose.2011.08.002","volume":"30","author":"L Fuchs","year":"2011","unstructured":"Fuchs, L., Pernul, G., & Sandhu, R. (2011). Roles in information security\u2014A survey and classification of the research area. Computers & Security, 30(8), 748\u2013769.","journal-title":"Computers & Security"},{"key":"3140_CR16","unstructured":"Penta Security Systems Inc. (2013). Web application threat report: Trends for the second half of 2012."},{"key":"3140_CR17","volume-title":"The analytic hierarchy process","author":"T Saaty","year":"1980","unstructured":"Saaty, T. (1980). The analytic hierarchy process. New York: McGraw-Hill."},{"key":"3140_CR18","unstructured":"Korea Internet and Security Agency. (2012). Information security survey 2012 (enterprise edition)."},{"issue":"3","key":"3140_CR19","first-page":"316","volume":"5","author":"M Saleh","year":"2011","unstructured":"Saleh, M. (2011). Information security maturity model. International Journal of Computer Science and Security, 5(3), 316\u2013337.","journal-title":"International Journal of Computer Science and Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3140-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-3140-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3140-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:18:31Z","timestamp":1559395111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-3140-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,18]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["3140"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-3140-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,18]]}}}