{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:22:08Z","timestamp":1730193728905,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/acit54803.2022.9913155","type":"proceedings-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T15:53:28Z","timestamp":1665590008000},"page":"356-359","source":"Crossref","is-referenced-by-count":0,"title":["Modeling the Information Security System Under the Impact of COVID-19"],"prefix":"10.1109","author":[{"given":"Olha","family":"Ivanytska","sequence":"first","affiliation":[{"name":"National Technical University of Ukraine,Igor Sikorsky Kyiv Polytechnic Institute,Kyiv,Ukraine"}]},{"given":"Tetyana","family":"Manuilova","sequence":"additional","affiliation":[{"name":"Odessa National Academy of Food Technologies,Odessa,Ukraine"}]},{"given":"Kateryna","family":"Kolesnikova","sequence":"additional","affiliation":[{"name":"Odessa National Academy of Technologies,Odessa,Ukraine"}]},{"given":"Mykola","family":"Slobodianiuk","sequence":"additional","affiliation":[{"name":"Institute of Naval Forces National University &#x00AB;Odessa Maritime Academy&#x00BB;,Department &#x00AB;Ship energy and power system&#x00BB;,Odessa,Ukraine"}]},{"given":"Yurii","family":"Norchuk","sequence":"additional","affiliation":[{"name":"National University &#x00AB;Odessa Maritime Academy&#x00BB;,Department of day-to-day management of divisions,Odessa,Ukraine"}]}],"member":"263","reference":[{"key":"ref4","first-page":"103","article-title":"A comparison study of information security risk management frameworks in cloud computing","author":"alnuem","year":"2015","journal-title":"Cloud Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3846\/bmee.2021.14798"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18662\/po\/12.1\/246"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208970"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3846\/btp.2019.41"},{"key":"ref7","first-page":"99","article-title":"Survey on economics of information security","volume":"16","author":"aminnezhad","year":"2016","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3846\/btp.2020.11573"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3846\/tede.2019.10298"}],"event":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2022,9,26]]},"location":"Ruzomberok, Slovakia","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 12th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912736\/9912739\/09913155.pdf?arnumber=9913155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:30:57Z","timestamp":1667511057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9913155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/acit54803.2022.9913155","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}