{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:49:35Z","timestamp":1725889775039},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611174"},{"type":"electronic","value":"9783319611181"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61118-1_33","type":"book-chapter","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T09:35:42Z","timestamp":1497432942000},"page":"269-277","source":"Crossref","is-referenced-by-count":1,"title":["Information Security Maturity Level: A Fast Assessment Methodology"],"prefix":"10.1007","author":[{"given":"S\u00e9rgio","family":"Monteiro","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o Paulo","family":"Magalh\u00e3es","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,15]]},"reference":[{"key":"33_CR1","unstructured":"Lewis, J., Baker, S.: The Economic Impact of Cybercrime and Cyber Espionage. Centre for Strategic and International Studies (2013)"},{"key":"33_CR2","unstructured":"Juniper Research: Cybercrime will Cost Businesses Over $2 Trillion by 2019. https:\/\/www.juniperresearch.com\/press\/press-releases\/cybercrime-cost-businesses-over-2trillion (2015). Accessed May 2015"},{"key":"33_CR3","unstructured":"Deloitte: The cyber security imperative. http:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/ca\/Documents\/risk\/ca-en-13-3694-cyber-security-pov-fin.pdf (2013)"},{"key":"33_CR4","unstructured":"Tarala, J.: A Real-Time Approach to Continuous Monitoring. SANS Institute (2011)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Dempsey, K., Chawla, N., Johnson, A., Johnson, R., Jones, A., Orebaugh, A., Scholl, M., Stine, K.: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. NIST Special Publication 800-139, Sept 2011 (2011)","DOI":"10.6028\/NIST.SP.800-137"},{"key":"33_CR6","unstructured":"Macedo, F.N.: Models for assessing information security risk. M.Sc. thesis. Instituto Superior Tecnico da Universidade Tecnica de Lisboa (2009)"}],"container-title":["Advances in Intelligent Systems and Computing","Ambient Intelligence\u2013 Software and Applications \u2013 8th International Symposium on Ambient Intelligence (ISAmI 2017)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61118-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T02:05:53Z","timestamp":1569463553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61118-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611174","9783319611181"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61118-1_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}