{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:53Z","timestamp":1740099113285,"version":"3.37.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319913339"},{"type":"electronic","value":"9783319913346"}],"license":[{"start":{"date-parts":[[2018,6,3]],"date-time":"2018-06-03T00:00:00Z","timestamp":1527984000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91334-6_2","type":"book-chapter","created":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T06:59:38Z","timestamp":1527922778000},"page":"10-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Planning, Managing and Monitoring Technological Security Infrastructures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1874-7340","authenticated-orcid":false,"given":"Jorge","family":"Ribeiro","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6330-0260","authenticated-orcid":false,"given":"Victor","family":"Alves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8456-7773","authenticated-orcid":false,"given":"Henrique","family":"Vicente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8863-0351","authenticated-orcid":false,"given":"Jos\u00e9","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,3]]},"reference":[{"key":"2_CR1","unstructured":"ISO \u2013 International Organization for Standardization. \nhttps:\/\/www.iso.org\/standards.html\n\n. Accessed 15 Feb 2018"},{"key":"2_CR2","unstructured":"ISACA \u2013 The Official Site of Information Systems Audit and Control Association. \nhttps:\/\/www.isaca.org\/pages\/default.aspx\n\n. Accessed 18 Feb 2018"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, V.: A framework for the information classification in ISO 27005 Standard. In: Qiu, M. (ed.) Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2017), pp. 264\u2013269. IEEE Edition (2017)","DOI":"10.1109\/CSCloud.2017.13"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.future.2017.05.043","volume":"83","author":"G Gonzalez-Granadillo","year":"2017","unstructured":"Gonzalez-Granadillo, G., Dubus, S., Motzekc, A., Garcia-Alfaro, J., Alvarez, E., Merialdo, M., Papillon, S., Debar, H.: Dynamic risk management response system to handle cyber threats. Future Gener. Comput. Syst. 83, 535\u2013552 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MC.2017.107","volume":"50","author":"G Wangen","year":"2017","unstructured":"Wangen, G.: Information security risk assessment: a method comparison. Computer 50(4), 52\u201361 (2017)","journal-title":"Computer"},{"key":"2_CR6","volume-title":"Enterprise-Wide Risk Management: Strategies for Linking Risk and Opportunity","author":"J Deloach","year":"2000","unstructured":"Deloach, J., Temple, N.: Enterprise-Wide Risk Management: Strategies for Linking Risk and Opportunity. Prentice Hall, London (2000)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Cayirci, E., Garaga, A., Oliveira, A.S., Roudier, Y.: A risk assessment model for selecting cloud service providers. J. Cloud Comput. Adv. Syst. Appl. 5(14), 12 (2016)","DOI":"10.1186\/s13677-016-0064-x"},{"issue":"4","key":"2_CR8","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1108\/09593849910301621","volume":"12","author":"K Olesen","year":"1999","unstructured":"Olesen, K., Myers, D.: Trying to improve communication and collaboration with information technology: an action research project which failed. Inf. Technol. People 12(4), 317\u2013332 (1999)","journal-title":"Inf. Technol. People"},{"key":"2_CR9","unstructured":"Ribeiro, J., Gomes, R.: Information system to support quality management systems: a case study in a Portuguese high educational institution. In: Proceedings of the 4th Mediterranean Conference on Information Systems (MCIS 2009), paper 2 (2009)"},{"issue":"59","key":"2_CR10","first-page":"82","volume":"20","author":"J Ramos","year":"2017","unstructured":"Ramos, J., Oliveira, T., Satoh, K., Neves, J., Novais, P.: An orientation method with prediction and anticipation features. Artif. Intell. 20(59), 82\u201395 (2017)","journal-title":"Artif. Intell."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-29133-8_8","volume-title":"Enterprise Information Systems","author":"Jos\u00e9 Neves","year":"2015","unstructured":"Neves, J., Fernandes, A., Gomes, G., Neves, M., Abelha, A., Vicente, H.: International Standard ISO 9001 \u2013 a soft computing view. In: Hammoudi, S., Maciaszek, L., Teniente, E., Camp, O., Cordeiro, J. (eds.) Enterprise Information Systems. Lecture Notes in Business Information Processing, vol. 241, pp. 153\u2013167. Springer, Cham (2015)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Fernandes, B., Freitas, M., Analide, C., Vicente, H., Neves, J.: Handling default data under a case-based reasoning approach. In: Proceedings of the 7th International Conference on Agents and Artificial Intelligence (ICAART 2015), vol. II, pp. 294\u2013304. Scitepress, Lisbon (2015)","DOI":"10.5220\/0005184602940304"}],"container-title":["Lecture Notes in Electrical Engineering","Innovation, Engineering and Entrepreneurship"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91334-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T07:00:35Z","timestamp":1527922835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91334-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,3]]},"ISBN":["9783319913339","9783319913346"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91334-6_2","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,6,3]]}}}