{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:38:46Z","timestamp":1769733526209,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679492","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"186-192","source":"Crossref","is-referenced-by-count":2,"title":["The Danger Within: Insider Threat Modeling Using Business Process Models"],"prefix":"10.1109","author":[{"given":"Jan","family":"von der Assen","sequence":"first","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Jasmin","family":"Hochuli","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Thomas","family":"Gr\u00fcbl","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group,Department of Informatics,Z&#x00FC;rich,Switzerland,CH-8050"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The Mitre Corporation","year":"2023"},{"key":"ref2","year":"2022","journal-title":"Reducing the impact of unauthorised high-risk customer transactions"},{"key":"ref3","article-title":"NIST SP 800-37, Revision 2","author":"Ross","journal-title":"Guide for Applying the Risk Management Framework to Federal Information Systems, 2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-016-9210-8"},{"key":"ref5","volume-title":"Results of the COVID-19 certificate security tests","year":"2021"},{"key":"ref6","volume-title":"Thousands of fake Covid-19 certificates un-covered in Switzerland","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850283"},{"key":"ref8","volume-title":"Threat Modeling Manifesto","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.091119"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2694737.2694740"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781420046601"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.94"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.40"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app10144981"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-015-0499-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2023.2284645"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC52215.2021.00029"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-33523-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7133-3_10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7133-3_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAECC43874.2019.8995088"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/c2010-0-64926-1"},{"key":"ref23","volume-title":"Network Security Essentials: Applications and Standards","author":"Stallings","year":"2016"},{"key":"ref24","volume-title":"Web-based tooling for BPMN, DMN and Forms"},{"key":"ref25","volume-title":"[Online]","author":"Hochuli","year":"2024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41612-023-00388-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1370\/afm.2717"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.133"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30625-0_9"},{"key":"ref30","volume-title":"Local election official found guilty of fraud"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679492.pdf?arnumber=10679492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:22:51Z","timestamp":1727241771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679492","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}