{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T21:57:34Z","timestamp":1648850254286},"reference-count":37,"publisher":"Oxford University Press (OUP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1093\/jigpal\/jzw055","type":"journal-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:53:40Z","timestamp":1470344020000},"page":"916-932","source":"Crossref","is-referenced-by-count":2,"title":["Semantics for incident identification and resolution reports"],"prefix":"10.1093","volume":"24","author":[{"given":"Joaqu\u00edn","family":"Borrego-D\u00edaz","sequence":"first","affiliation":[]},{"given":"Antonia M.","family":"Ch\u00e1vez-Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 L.","family":"Pro-Mart\u00edn","sequence":"additional","affiliation":[]},{"given":"Virginia","family":"Matos-Arana","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"key":"2016120907301194000_24.6.916.1","doi-asserted-by":"publisher","DOI":"10.1186\/1678-4804-20-1"},{"key":"2016120907301194000_24.6.916.2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.7"},{"key":"2016120907301194000_24.6.916.3","doi-asserted-by":"crossref","unstructured":"Aranda-Corral G. A. Borrego-D\u00edaz J. Mereotopological analysis of formal concepts in security ontologies. In Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), pp. 33\u201340, 2010.","DOI":"10.1007\/978-3-642-16626-6_4"},{"key":"2016120907301194000_24.6.916.4","doi-asserted-by":"crossref","unstructured":"Aranda-Corral G. A. Borrego-D\u00edaz J. Jim\u00e9nez-Mavillard Antonio Social ontology documentation for knowledge externalization. In Proceedings of the 4th International Conference Metadata and Semantic Research, pp. 137\u2013148, 2010.","DOI":"10.1007\/978-3-642-16552-8_14"},{"key":"2016120907301194000_24.6.916.5","doi-asserted-by":"crossref","unstructured":"Aranda-Corral G. A. Borrego-D\u00edaz J. Gal\u00e1n P\u00e1ez Juan Jim\u00e9nez-Mavillard Antonio Emergent concepts on knowledge intensive processes. In Proceedings of the 6th International Conference Computational Collective Intelligence (ICCCI 2014), pp. 282\u2013291, 2014.","DOI":"10.1007\/978-3-319-11289-3_29"},{"key":"2016120907301194000_24.6.916.6","doi-asserted-by":"crossref","unstructured":"Blanco C. Lasheras J. Valencia-Garc\u00eda R. Fern\u00e1ndez-Medina E. Ambrosio Toval \u00c1lvarez J. Piattini M. A systematic review and comparison of security ontologies. In Proceedings of the 3rd International Conference on Availability, Reliability and Security, ARES 2008, pp. 813\u2013820, 2008.","DOI":"10.1109\/ARES.2008.33"},{"key":"2016120907301194000_24.6.916.7","doi-asserted-by":"crossref","unstructured":"Borrego-D\u00edaz J. Ch\u00e1vez-Gonz\u00e1lez A. M. Mart\u00edn-P\u00e9rez M. A. Zamora-Aguilera J. A. Semantic geodemography and urban interoperability. In Proceedings of the 6rd International Conference Metadata and Semantic Research, pp. 1\u201312, 2012.","DOI":"10.1007\/978-3-642-35233-1_1"},{"key":"2016120907301194000_24.6.916.8","doi-asserted-by":"crossref","unstructured":"Borrego-D\u00edaz J. Ch\u00e1vez-Gonz\u00e1lez A. M. Pro-Mart\u00edn J. L. Matos-Arana V. Specifying and verifying meta-security by means of semantic web methods. In Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, pp. 355\u2013365, 2014.","DOI":"10.1007\/978-3-319-07995-0_35"},{"key":"2016120907301194000_24.6.916.9","doi-asserted-by":"crossref","unstructured":"Catteddu D. Hogben G. Cloud Computing: benefits, risks and recommendations for information security. Technical report. European Network and Information Security Agency, 2009.","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"2016120907301194000_24.6.916.10","first-page":"34","article-title":"On evaluating artificial intelligence systems for medical diagnosis","volume":"4","author":"Chandrasekaran","year":"1983","journal-title":"AI Magazine"},{"key":"2016120907301194000_24.6.916.11","doi-asserted-by":"crossref","unstructured":"Fenz S. Ekelhart A. Formalizing information security knowledge. In Proceedings of the 2009 ACM Symp. on Information, Computer and Communications Security, pp. 183\u2013194. ACM, 2009.","DOI":"10.1145\/1533057.1533084"},{"key":"2016120907301194000_24.6.916.12","doi-asserted-by":"crossref","unstructured":"Fenz S. Goluch G. Ekelhart A. Riedl B. Weippl E. R. Information security fortification by ontological mapping of the ISO\/IEC 27001 standard. In Proceedings of the 13th IEEE Pacific Rim Int. Symp. Dependable Computing (PRDC 2007), pp. 381\u2013388, 2007.","DOI":"10.1109\/PRDC.2007.29"},{"key":"2016120907301194000_24.6.916.13","unstructured":"Geers K. Strategic Cyber Security. CCD COE Publication, 2011."},{"key":"2016120907301194000_24.6.916.14","unstructured":"Glushko R. J. McGrath T. Document Engineering - Analyzing and Designing Documents for Business Informatics and Web Services. MIT Press, 2008."},{"key":"2016120907301194000_24.6.916.15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.017"},{"key":"2016120907301194000_24.6.916.16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jisp.2007100101","article-title":"An ontology of information security","volume":"1","author":"Herzog","year":"2007","journal-title":"International Journal of Information Security and Privacy"},{"key":"2016120907301194000_24.6.916.17","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2013.767382"},{"key":"2016120907301194000_24.6.916.18","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.11.003"},{"key":"2016120907301194000_24.6.916.19","doi-asserted-by":"crossref","unstructured":"Mace J. C. Parkin S. Edward van Moorsel A. P. A. A collaborative ontology development tool for information security managers. In Proceedings of the 4th ACM Symp. Comp. Human Interaction for Management of Information Technology, CHIMIT 2010, p. 5, 2010.","DOI":"10.1145\/1873561.1873566"},{"key":"2016120907301194000_24.6.916.20","unstructured":"Microsoft Inc. Enterprise Risk Management Models. Microsoft, 2010."},{"key":"2016120907301194000_24.6.916.21","first-page":"535","article-title":"Evaluating knowledge management performance","volume":"7","author":"Minonne","year":"2010","journal-title":"Electronic Journal of Knowledge Management"},{"key":"2016120907301194000_24.6.916.22","unstructured":"National Academy of Sciences and Royal Society. Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum. National Academic Press, 2015."},{"key":"2016120907301194000_24.6.916.23","doi-asserted-by":"crossref","unstructured":"Nonaka I. Takeuchi H. The knowledge-creating company: How Japanese Companies Create the Dynamics of Innovation. Oxford University Press, 1995.","DOI":"10.1016\/0024-6301(96)81509-3"},{"key":"2016120907301194000_24.6.916.24","unstructured":"Olson D. L. Wu D. Information Security Management System for Microsoft's Cloud Infrastructure. Springer Berlin Heidelberg, 2010."},{"key":"2016120907301194000_24.6.916.25","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2010.07.002"},{"key":"2016120907301194000_24.6.916.26","doi-asserted-by":"crossref","unstructured":"Parkin S. Edward van Moorsel A. P. A. Coles R. An information security ontology incorporating human-behavioural implications. In Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, pp. 46\u201355, 2009.","DOI":"10.1145\/1626195.1626209"},{"key":"2016120907301194000_24.6.916.27","doi-asserted-by":"crossref","unstructured":"Mendes Pereira T. S. Dinis Santos H. M. An ontology based approach to information security. In Proceedings of the 3rd International Conference Metadata and Semantic Research, pp. 183\u2013192, 2009.","DOI":"10.1007\/978-3-642-04590-5_17"},{"key":"2016120907301194000_24.6.916.28","doi-asserted-by":"crossref","unstructured":"Sadvandi S. Chapon N. Pi\u00e8tre-Cambac\u00e9d\u00e8s L. Safety and security interdependencies in complex systems and sos: Challenges and perspectives. In Complex Systems Design & Management - Proceedings of the 2nd International Conference on Complex Systems Design & Management, pp. 229\u2013241, 2011.","DOI":"10.1007\/978-3-642-25203-7_16"},{"key":"2016120907301194000_24.6.916.29","doi-asserted-by":"crossref","unstructured":"Sadvandi S. Chapon N. Pi\u00e8tre-Cambac\u00e9d\u00e8s L. Safety and security interdependencies in complex systems and sos: Challenges and perspectives. In Proceedings of the 2nd International Conference on Complex Systems Design & Management, CSDM, pp. 229\u2013241, 2011.","DOI":"10.1007\/978-3-642-25203-7_16"},{"key":"2016120907301194000_24.6.916.30","doi-asserted-by":"crossref","unstructured":"Sarmah A. Hazarika S. M. Kumar Sinha S. Security pattern lattice: A formal model to organize security patterns. In 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 292\u2013296, 2008.","DOI":"10.1109\/DEXA.2008.74"},{"key":"2016120907301194000_24.6.916.31","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0327"},{"key":"2016120907301194000_24.6.916.32","unstructured":"Riley Shawn Science of Cybersecurity Developing Scientific Foundations for the Operational Cybersecurity Ecosystem. Centre for Strategic Cyberspace\u2009+\u2009Security Science, 2015."},{"key":"2016120907301194000_24.6.916.33","doi-asserted-by":"publisher","DOI":"10.1080\/00207540601020544"},{"key":"2016120907301194000_24.6.916.34","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MSECP.2004.1264859","article-title":"Grand challenges in information security: Process and output","volume":"2","author":"Smith","year":"2004","journal-title":"IEEE Security & Privacy"},{"key":"2016120907301194000_24.6.916.35","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Figueroa M. C. G\u00f3mez-P\u00e9rez A. Fern\u00e1ndez-L\u00f3pez M. The neon methodology for ontology engineering. In Ontology Engineering in a Networked World, pp. 9\u201334. Springer, Berlin, Heidelberg, 2012.","DOI":"10.1007\/978-3-642-24794-1_2"},{"key":"2016120907301194000_24.6.916.36","unstructured":"D\u00edaz Vico J. F\u00edrvida Pereira D. Lozano Merino M. A. Identification and Reporting of Security Incidents for Strategic Operators. A Basic Guide for the Protection of Critical Infrastructures. NICT, 2014."},{"key":"2016120907301194000_24.6.916.37","unstructured":"D\u00edaz Vico J. F\u00edrvida Pereira D. Lozano Merino M. A. The Operator Console. A Basic Guide to Critical Infrastructure Protection. NICT, 2014."}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/24\/6\/916\/8357725\/jzw055.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T01:11:02Z","timestamp":1568250662000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzw055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,4]]},"references-count":37,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2016,12,9]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1093\/jigpal\/jzw055"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzw055","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,4]]}}}