{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T01:05:09Z","timestamp":1771635909609,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030456962","type":"print"},{"value":"9783030456979","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45697-9_44","type":"book-chapter","created":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T19:02:23Z","timestamp":1589742143000},"page":"452-465","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Thermodynamic Assessment of the Cyber Security Risk in Healthcare Facilities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6043-1078","authenticated-orcid":false,"given":"Filipe","family":"Fernandes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6330-0260","authenticated-orcid":false,"given":"Victor","family":"Alves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4019-9643","authenticated-orcid":false,"given":"Joana","family":"Machado","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1723-2134","authenticated-orcid":false,"given":"Filipe","family":"Miranda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5856-1279","authenticated-orcid":false,"given":"Dinis","family":"Vicente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1874-7340","authenticated-orcid":false,"given":"Jorge","family":"Ribeiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8456-7773","authenticated-orcid":false,"given":"Henrique","family":"Vicente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8863-0351","authenticated-orcid":false,"given":"Jos\u00e9","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,18]]},"reference":[{"issue":"1","key":"44_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122\u2013129 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"44_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MCOM.2017.1600297CM","volume":"55","author":"R Khatoun","year":"2017","unstructured":"Khatoun, R., Zeadally, S.: Cybersecurity and privacy solutions in smart cities. IEEE Commun. Mag. 55(3), 51\u201359 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1016\/j.procs.2015.05.122","volume":"52","author":"A Gaur","year":"2015","unstructured":"Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Procedia Comput. Sci. 52, 1089\u20131094 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"44_CR4","first-page":"612","volume":"7","author":"S Ijaz","year":"2016","unstructured":"Ijaz, S., Shah, M., Khan, A., Mansoor, A.: Smart cities: a survey on security concerns. Int. J. Adv. Comput. Sci. Appl. 7(2), 612\u2013625 (2016)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"44_CR5","unstructured":"ISO\/IEC 27001 Information security management. \nhttps:\/\/www.iso.org\/isoiec-27001-information-security.html\n\n. Accessed 19 Nov 2019"},{"key":"44_CR6","unstructured":"COBIT: Information Systems Audit and Control Association, Control Objectives for Information and Related Technology, 5th edn. IT Governance Institute (2019)"},{"key":"44_CR7","unstructured":"OGC: Official Introduction to the ITIL Service Lifecycle, Stationery Office, Office of Government Commerce. \nhttps:\/\/www.itgovernance.co.uk\n\n. Accessed 23 Nov 2019"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Armin, A., Junaibi, R., Aung, Z., Woon, W., Omar, M.: Cybersecurity for smart cities: a brief review. Lecture Notes in Computer Science, vol. 10097, pp. 22\u201330 (2017)","DOI":"10.1007\/978-3-319-50947-1_3"},{"key":"44_CR9","unstructured":"Financial Industry Regulatory Authority: Financial Industry Regulatory Practices. \nhttps:\/\/www.finra.org\/file\/report-cybersecurity-practices\n\n. Accessed 22 Nov 2019"},{"key":"44_CR10","unstructured":"National Institute of Standards and Technology: Cybersecurity Framework. \nhttps:\/\/www.nist.gov\/sites\/default\/files\/documents\/cyberframework\/cybersecurity-framework-021214.pdf\n\n. Accessed 22 Nov 2019"},{"key":"44_CR11","unstructured":"SANS Institute: Critical Security Controls for Effective Cyber Defense. \nhttps:\/\/www.sans.org\/critical-security-controls\n\n. Accessed 22 Nov 2019"},{"key":"44_CR12","unstructured":"ISO 27032 - Information technology \u2013 Security techniques \u2013 Guidelines for cybersecurity. \nhttps:\/\/www.iso.org\/standard\/44375.html\n\n. Accessed 22 Nov 2019"},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.proeng.2012.08.106","volume":"43","author":"C Liu","year":"2012","unstructured":"Liu, C., Tan, C.-K., Fang, Y.-S., Lok, T.-S.: The security risk assessment methodology. Procedia Eng. 43, 600\u2013609 (2012)","journal-title":"Procedia Eng."},{"issue":"5","key":"44_CR14","first-page":"6","volume":"85","author":"J Lanz","year":"2015","unstructured":"Lanz, J.: Conducting information technology risk assessments. CPA J. 85(5), 6\u20139 (2015)","journal-title":"CPA J."},{"key":"44_CR15","first-page":"119","volume":"23","author":"O Tymchuk","year":"2017","unstructured":"Tymchuk, O., Iepik, M., Sivyakov, A.: Information security risk assessment model based on computing with words. MENDEL Soft Comput. J. 23, 119\u2013124 (2017)","journal-title":"MENDEL Soft Comput. J."},{"key":"44_CR16","first-page":"012004","volume":"1018","author":"A Amini","year":"2018","unstructured":"Amini, A., Norziana, J.: A comprehensive review of existing risk assessment models in cloud computing. J. Phys: Conf. Ser. 1018, 012004 (2018)","journal-title":"J. Phys: Conf. Ser."},{"key":"44_CR17","unstructured":"European Union Agency for Network and Information Security (ENISA). \nhttps:\/\/www.smesec.eu\n\n. Accessed 22 Nov 2019"},{"key":"44_CR18","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-319-91334-6_2","volume-title":"Innovation, Engineering and Entrepreneurship","author":"J Ribeiro","year":"2019","unstructured":"Ribeiro, J., Alves, V., Vicente, H., Neves, J.: Planning, managing and monitoring technological security infrastructures. In: Machado, J., Soares, F., Veiga, G. (eds.) Innovation, Engineering and Entrepreneurship. Lecture Notes in Electrical Engineering, vol. 505, pp. 10\u201316. Springer, Cham (2019)"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Caralli, R.A., Stevens, J.F., Young, L.R., Wilson, W.R.: Introducing OCTAVE Allegro: improving the information security risk assessment process. Technical report CMU. Software Engineering Institute (2007)","DOI":"10.21236\/ADA470450"},{"key":"44_CR20","unstructured":"Neves, J.: A logic interpreter to handle time and negation in logic databases. In: Muller, R., Pottmyer, J. (eds.) Proceedings of the 1984 Annual Conference of the ACM on the 5th Generation Challenge, pp. 50\u201354. Association for Computing Machinery, New York (1984)"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1023\/B:HEUR.0000034714.09838.1e","volume":"10","author":"P Cortez","year":"2004","unstructured":"Cortez, P., Rocha, M., Neves, J.: Evolving time series forecasting ARMA models. J. Heuristics 10, 415\u2013429 (2004)","journal-title":"J. Heuristics"},{"key":"44_CR22","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.neunet.2013.11.002","volume":"50","author":"M Fern\u00e1ndez-Delgado","year":"2014","unstructured":"Fern\u00e1ndez-Delgado, M., Cernadas, E., Barro, S., Ribeiro, J., Neves, J.: Direct Kernel Perceptron (DKP): ultra-fast kernel ELM-based classification with non-iterative closed-form weight calculation. J. Neural Netw. 50, 60\u201371 (2014)","journal-title":"J. Neural Netw."},{"key":"44_CR23","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.3390\/e16042071","volume":"16","author":"T Wenterodt","year":"2014","unstructured":"Wenterodt, T., Herwig, H.: The entropic potential concept: a new way to look at energy transfer operations. Entropy 16, 2071\u20132084 (2014)","journal-title":"Entropy"},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Neves, J., Maia, N., Marreiros, G., Neves, M., Fernandes, A., Ribeiro, J., Ara\u00fajo, I., Ara\u00fajo, N., \u00c1vidos, L., Ferraz, F., Capita, A., Lori, N., Alves, V., Vicente, N.: Entropy and organizational performance. In: P\u00e9rez Garc\u00eda, H., S\u00e1nchez Gonz\u00e1lez, L., Castej\u00f3n Limas, M., Quinti\u00e1n Pardo, H., Corchado Rodr\u00edguez, E. (eds.) Hybrid Artificial Intelligent Systems. Lecture Notes in Computer Science, vol. 11734, pp. 206\u2013217. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-29859-3_18"},{"key":"44_CR25","unstructured":"OWASP Open Cyber Security Framework Project. \nhttps:\/\/www.owasp.org\/index.php\/OWASP_Open_Cyber_Security_Framework_Project\n\n. Accessed 21 Nov 2019"},{"key":"44_CR26","unstructured":"OWASP Risk Rating Methodology. \nhttps:\/\/www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology\n\n. Accessed 21 Nov 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Innovations in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45697-9_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T19:08:58Z","timestamp":1589742538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45697-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030456962","9783030456979"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45697-9_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}