{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:35:44Z","timestamp":1775579744417,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,21]]},"DOI":"10.1109\/acit58437.2023.10275626","type":"proceedings-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T17:43:37Z","timestamp":1697564617000},"page":"410-413","source":"Crossref","is-referenced-by-count":4,"title":["A General Method of Risk Estimation"],"prefix":"10.1109","author":[{"given":"Tetiana","family":"Korobeinikova","sequence":"first","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]},{"given":"Illia","family":"Tachenko","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]},{"given":"Roman","family":"Chekhmestruk","sequence":"additional","affiliation":[{"name":"3D GENERATION UA LLC,Vinnytsia,Ukraine"}]},{"given":"Pavlo","family":"Mykhaylov","sequence":"additional","affiliation":[{"name":"CEO 3D GENERATION GmbH,Dortmund,Germany"}]},{"given":"Olexandr","family":"Romanyuk","sequence":"additional","affiliation":[{"name":"Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine"}]},{"given":"Sergey","family":"Romanyuk","sequence":"additional","affiliation":[{"name":"Odessa National Polytechnic University,Department of Biomedical Engineering,Odessa,Ukraine"}]}],"member":"263","reference":[{"key":"ref13","article-title":"ISO\/IEC 27005:2022 Information security, cybersecurity, and privacy protection &#x2014; Guidance on managing information security risks","year":"2023","journal-title":"Int Organization for Standardization"},{"key":"ref12","article-title":"ISO\/IEC 27701:2019 Security techniques &#x2013; Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for privacy information management &#x2013; Requirements and guidelines","year":"2022","journal-title":"International Organization for Standardization"},{"key":"ref15","article-title":"What is MDM","year":"2021","journal-title":"Zoho Corp"},{"key":"ref14","year":"0"},{"key":"ref11","article-title":"ISO 27001 Requirements &#x2013; Information Security Management","year":"2021","journal-title":"Sprin"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.12.4.14865"},{"key":"ref2","year":"2021","journal-title":"Ukraine &#x2013; Data Protection Overview"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT54803.2022.9913098"},{"key":"ref17","volume":"8","year":"2021","journal-title":"CIS critical security controls - Version 6 0"},{"key":"ref16","first-page":"417","article-title":"Overview of the current state of the issue in the field of network security risk assessment","volume":"2021","author":"tachenko","year":"2021","journal-title":"in Proceedings of the 5th International Scientific and Practical Conference &#x00AB;Theory and Practice of Science Key Aspects"},{"key":"ref8","first-page":"15","article-title":"Vulnerability assessment tools","author":"wales","year":"2009","journal-title":"Network Security"},{"key":"ref7","year":"2022","journal-title":"What good AI cyber security software looks like in"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103611"},{"key":"ref4","year":"2022","journal-title":"Law of the Verkhovna Rada of Ukraine On Protection of Personal Data"},{"key":"ref3","article-title":"Convention for the Protection of Individuals regarding Automatic Processing of Personal Data","year":"0","journal-title":"Amendment to Convention ETS ?108 allowing the European Communities to accede"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.11.2640"},{"key":"ref5","year":"2014","journal-title":"The procedure for monitoring compliance with the legislation on the protection of personal data by the Commissioner for Human Rights of the Verkhovna Rada of Ukraine approved by the order of the Commissioner for Human Rights of the Verkhovna Rada of Ukraine"}],"event":{"name":"2023 13th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Wroc\u0142aw, Poland","start":{"date-parts":[[2023,9,21]]},"end":{"date-parts":[[2023,9,23]]}},"container-title":["2023 13th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275066\/10275327\/10275626.pdf?arnumber=10275626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T18:58:02Z","timestamp":1699297082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,21]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/acit58437.2023.10275626","relation":{},"subject":[],"published":{"date-parts":[[2023,9,21]]}}}