{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T23:40:56Z","timestamp":1771544456437,"version":"3.50.1"},"reference-count":19,"publisher":"Oxford University Press (OUP)","issue":"9","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9,1]]},"DOI":"10.1093\/comjnl\/bxy002","type":"journal-article","created":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T20:16:04Z","timestamp":1515788164000},"page":"1389-1406","source":"Crossref","is-referenced-by-count":26,"title":["Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study"],"prefix":"10.1093","volume":"61","author":[{"given":"Samuel","family":"Tweneboah-Koduah","sequence":"first","affiliation":[{"name":"Ghana Institute of Management and Public Administration, Accra, Ghana"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0809-3523","authenticated-orcid":false,"given":"William J","family":"Buchanan","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University, Edinburgh, UK"}]}],"member":"286","published-online":{"date-parts":[[2018,2,1]]},"reference":[{"key":"key\n\t\t\t\t20180827114435_bxy002C1","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","article-title":"Identifying the security risks associated with governmental use of cloud computing","volume":"27","author":"Paquette","year":"2010","journal-title":"Gov. Inf. Q."},{"key":"key\n\t\t\t\t20180827114435_bxy002C2","author":"Stoneburner","year":"2002"},{"key":"key\n\t\t\t\t20180827114435_bxy002C3","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1111\/j.1539-6924.1981.tb01350.x","article-title":"On the quantitative definition of risk","volume":"1","author":"Kaplan","year":"1981","journal-title":"Risk. Anal."},{"key":"key\n\t\t\t\t20180827114435_bxy002C4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1111\/j.1468-5973.2007.00501.x","article-title":"Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment","volume":"15","author":"De Bruijne","year":"2007","journal-title":"J. Contingencies Crisis Manag."},{"key":"key\n\t\t\t\t20180827114435_bxy002C5","author":"National Strategy for Physical Protection of Critical Infrastructure and Key Assets"},{"key":"key\n\t\t\t\t20180827114435_bxy002C6","author":"Bodungen","year":"2016"},{"key":"key\n\t\t\t\t20180827114435_bxy002C7","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1080\/01972243.2011.607038","article-title":"The (social) construction of information security","volume":"27","author":"Pieters","year":"2011","journal-title":"Inf. Soc"},{"key":"key\n\t\t\t\t20180827114435_bxy002C8","author":"Dahbur","year":"2011"},{"key":"key\n\t\t\t\t20180827114435_bxy002C9","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.eiar.2003.12.003","article-title":"The assessment of vulnerability to natural disasters in China by using the DEA method","volume":"24","author":"Wei","year":"2004","journal-title":"Environ. Impact. Assess. Rev."},{"key":"key\n\t\t\t\t20180827114435_bxy002C10","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1504\/IJCIS.2011.045065","article-title":"Vulnerability analysis of interdependent critical infrastructures: case study of the Swedish railway system","volume":"7","author":"Johansson","year":"2011","journal-title":"Int. J. Crit. Infrastruct."},{"key":"key\n\t\t\t\t20180827114435_bxy002C11","author":"TheSecurityRiskManagementGuide-Microsoft.pdf"},{"key":"key\n\t\t\t\t20180827114435_bxy002C12","doi-asserted-by":"crossref","DOI":"10.1002\/9781118908785","volume-title":"Cybersecurity for Executives, A Practical Approach","author":"Touhill","year":"2014"},{"key":"key\n\t\t\t\t20180827114435_bxy002C13","author":"Johansson","year":"2010"},{"key":"key\n\t\t\t\t20180827114435_bxy002C14","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1111\/j.1539-6924.2005.00595.x","article-title":"A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism","volume":"25","author":"Apostolakis","year":"2005","journal-title":"Risk. Anal."},{"key":"key\n\t\t\t\t20180827114435_bxy002C15","doi-asserted-by":"crossref","first-page":"015103","DOI":"10.1103\/PhysRevE.71.015103","article-title":"Vulnerability and protection of infrastructure networks","volume":"71","author":"Latora","year":"2005","journal-title":"Phys. Rev. E"},{"key":"key\n\t\t\t\t20180827114435_bxy002C16","first-page":"138","article-title":"A cautionary note on the use of actuarial risk assessment tools for social control","volume":"48","author":"Silver","year":"2002","journal-title":"NCCD News"},{"key":"key\n\t\t\t\t20180827114435_bxy002C17","author":"Sterman","year":"2002"},{"key":"key\n\t\t\t\t20180827114435_bxy002C18","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1002\/sdr.284","article-title":"Dynamic models of economic systems and industrial organizations","volume":"19","author":"Forrester","year":"2003","journal-title":"Syst. Dyn. Rev"},{"key":"key\n\t\t\t\t20180827114435_bxy002C19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/37.969131","article-title":"Identifying, understanding, and analyzing critical infrastructure interdependencies","volume":"21","author":"Rinaldi","year":"2001","journal-title":"Control. Syst. IEEE"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/9\/1389\/25570274\/bxy002.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T16:51:23Z","timestamp":1693414283000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/9\/1389\/4833881"}},"subtitle":[],"editor":[{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,2,1]]},"references-count":19,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2018,2,1]]},"published-print":{"date-parts":[[2018,9,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy002","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,9]]},"published":{"date-parts":[[2018,2,1]]}}}