{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:39Z","timestamp":1767339519592,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T00:00:00Z","timestamp":1671235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,17]]},"DOI":"10.1109\/bigdata55660.2022.10020529","type":"proceedings-article","created":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T14:35:23Z","timestamp":1674743723000},"page":"2620-2629","source":"Crossref","is-referenced-by-count":6,"title":["An Effect Analysis of ISO\/IEC 27001 Certification on Technical Security of Norwegian Grid Operators"],"prefix":"10.1109","author":[{"given":"Oyvind Anders","family":"Arntzen Toftegaard","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology"}]}],"member":"263","reference":[{"article-title":"Impact analysis for program evaluation","year":"1995","author":"mohr","key":"ref13"},{"year":"0","key":"ref35","article-title":"IT Vendor Risk Management (VRM) Tools"},{"key":"ref12","article-title":"The Effect of Regulation and Audits on Implementation of Cybersecurity Controls in Norwegian Grid Companies","author":"storm","year":"2022","journal-title":"European Safety and Reliability Conference"},{"year":"0","key":"ref34","article-title":"Consistent, data-driven ratings"},{"article-title":"Cybersecurity Audit: Relationships between Security Management and Technical Security","year":"0","author":"toftegaard","key":"ref15"},{"year":"0","key":"ref37","article-title":"Technical Cyber Rating"},{"key":"ref14","article-title":"Ledelse og kvalitet i helsetjenesten","volume":"1","author":"arntzen","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"ref31","article-title":"IKT-sikkerhetstilstanden i kraftforsyningen","author":"t\u00f8ien","year":"2021","journal-title":"2021 Oslo Norwegian Water Resources and Energy Directorate"},{"article-title":"SME definition","year":"0","author":"commission","key":"ref30"},{"year":"2017","key":"ref11","article-title":"Mapping of OES security requirements to specific sectors"},{"year":"0","key":"ref33","article-title":"Third party risk intelligance"},{"journal-title":"Norwegian Water Resources and Energy Directorate (NVE)","year":"0","key":"ref10"},{"year":"0","key":"ref32","article-title":"Understand the cyber health of your ecosystem across 10 risk factor groups"},{"year":"0","key":"ref2","article-title":"Catalogue of IT security requirements"},{"journal-title":"International Standard ISO\/IEC 27001 2013","article-title":"Information technology &#x2014; Security techniques &#x2014; Information security management systems &#x2014; Requirements","year":"0","key":"ref1"},{"article-title":"Hvordan organisasjonen fungerer","year":"2013","author":"jacobsen","key":"ref17"},{"journal-title":"FOR-2012-12-07-1157","article-title":"Forskrift om sikkerhet og beredskap i kraftforsyningen","year":"0","key":"ref39"},{"article-title":"Risky Business: Assessing Security with External Measurements","year":"2019","author":"edwards","key":"ref16"},{"year":"0","key":"ref38","article-title":"Consistent, data-driven ratings"},{"key":"ref19","article-title":"The Norwegian Water Resources and Energy Directorate","author":"hagen","year":"2022","journal-title":"Personal communication"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.600"},{"year":"0","key":"ref24","article-title":"Directive concerning measures for a high common level of security of network and information systems across the Union, (EU) 2016\/1148"},{"journal-title":"Directive concerning measures for a high common level of security of network and information systems across the Union (EU) 2016\/1148","year":"0","key":"ref23"},{"year":"0","key":"ref26","article-title":"SWIFT Customer Security Controls Framework"},{"year":"0","author":"kreditwesen","key":"ref25"},{"year":"2021","key":"ref20","article-title":"09. ISO Survey of certifications to management system standards &#x2013; full results"},{"journal-title":"(EU) 2016\/679","article-title":"Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data","year":"0","key":"ref22"},{"journal-title":"FOR-2003-05-21-630","article-title":"Forskrift om bruk av informasjons- og kommunikasjonsteknologi","year":"0","key":"ref21"},{"article-title":"Deutschlands firmendatenbank","year":"0","author":"wem","key":"ref28"},{"year":"0","key":"ref27","article-title":"What is TIBER-EU?"},{"year":"0","key":"ref29","article-title":"Kreditt- og Markedsverkt&#x00F8;y"},{"article-title":"Typical ISO 27001 Certification Costs","year":"0","author":"governance","key":"ref8"},{"year":"2021","key":"ref7","article-title":"IT-grundschutz-compendium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93511-5_1"},{"journal-title":"ISO Standard No 19011 2018","article-title":"Guidelines for auditing management systems","year":"0","key":"ref4"},{"year":"0","key":"ref3","article-title":"Framework Guideline on sector-specific rules for cybersecurity aspects of crossborder electricity flows"},{"article-title":"Implementering af politik","year":"2008","author":"winter","key":"ref6"},{"first-page":"17","article-title":"Statlig tilsyn med kommunesektoren","year":"2004","key":"ref5"},{"article-title":"P&#x00E5;virkning - Teori og praksis","year":"2003","author":"cialdini","key":"ref40"}],"event":{"name":"2022 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2022,12,17]]},"location":"Osaka, Japan","end":{"date-parts":[[2022,12,20]]}},"container-title":["2022 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10020192\/10020156\/10020529.pdf?arnumber=10020529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T17:07:48Z","timestamp":1676912868000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10020529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/bigdata55660.2022.10020529","relation":{},"subject":[],"published":{"date-parts":[[2022,12,17]]}}}