{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:34:31Z","timestamp":1768523671495,"version":"3.49.0"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersecpods.2019.8884963","type":"proceedings-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:28:15Z","timestamp":1572568095000},"page":"1-11","source":"Crossref","is-referenced-by-count":18,"title":["Does the NIS implementation strategy effectively address cyber security risks in the UK?"],"prefix":"10.1109","author":[{"given":"Meha","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Shane D.","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Jones","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Table view of principles and related guidance"},{"key":"ref38","article-title":"Of Com","year":"2018","journal-title":"GUIDANCE Of com's interim guidance for Operators of Essential Services in the digital infrastructure subsector under the Network and Information Systems Regulations 2018"},{"key":"ref33","article-title":"DoH","year":"2018","journal-title":"Title The Network and Information Systems Regulations 2018 Guide for the health sector in England"},{"key":"ref32","article-title":"DfT","year":"2018","journal-title":"Implementation of the NIS Directive Moving Britain Ahead"},{"key":"ref31","article-title":"CAA","year":"2017","journal-title":"CAP 1574 Version 1 0"},{"key":"ref30","year":"0","journal-title":"Oral evidence - Cyber Security Critical National Infrastructure"},{"key":"ref37","article-title":"BEIS","year":"2018","journal-title":"SECURITY OF NIS REGULATION"},{"key":"ref36","article-title":"DCMS-b","year":"2018","journal-title":"Security of Network and Information Systems Department for Digital Culture Media and Sport"},{"key":"ref35","article-title":"Defra","year":"2017","journal-title":"Water Sector Cyber Security Strategy"},{"key":"ref34","article-title":"House of Commons","year":"2018","journal-title":"Cyber-attack on the NHS Thirty-Second Report of Session 2017&#x2013;19"},{"key":"ref28","year":"2017","journal-title":"Regulating Cyber the UK's plans for the NIS Directive"},{"key":"ref27","year":"0","journal-title":"Table view of principles and related guidance"},{"key":"ref29","article-title":"BoE","year":"2016","journal-title":"CBEST Intelligence-Led Testing CBEST Implementation Guide"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.015"},{"key":"ref1","author":"cerrudo","year":"2016","journal-title":"Cyber Security Guidelines for Smart City Technology Adoption"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4541031"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.12.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bwu048"},{"key":"ref24","article-title":"DCMS","year":"2017","journal-title":"UK Finance response to Department for Digital Culture Media and Sport consultation on the implementation of the NIS Directive"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1xhr7hq.10"},{"key":"ref26","year":"0","journal-title":"Welcome to GCHQ"},{"key":"ref25","year":"0","journal-title":"Introduction to the NIS Directive"},{"key":"ref50","year":"0","journal-title":"Security for ICS - Framework Overview"},{"key":"ref51","year":"0","journal-title":"Security for Industrial Control Systems"},{"key":"ref58","article-title":"President signs NIST Small Business Cybersecurity Act into law","author":"barth","year":"2018","journal-title":"SC Media"},{"key":"ref57","year":"2015","journal-title":"BSI"},{"key":"ref56","author":"government","year":"2018","journal-title":"EXPLANATORY MEMORANDUM TO THE NIS REGULATIONS 2018 No 506"},{"key":"ref55","author":"house","year":"2018","journal-title":"William Smart Chief Information Officer for Health and Social Care Lessons learned review of the WannaCry Ransomware Cyber Attack"},{"key":"ref54","year":"2017","journal-title":"Security by design"},{"key":"ref53","article-title":"BSI","year":"2014","journal-title":"Smart cities-Vocabulary BSI Standards Publication Bio- based products-PAS 600 2013 Part 0"},{"key":"ref52","year":"2017","journal-title":"The Key Principles of Cyber Security for CAV"},{"key":"ref10","year":"0","journal-title":"Implementation of the NIS Directive in Germany ? Digital Single Market"},{"key":"ref11","article-title":"H.M. Government","year":"2016","journal-title":"National Cyber Security Strategy 2016-2021"},{"key":"ref40","year":"0","journal-title":"Data Security and Protection Toolkit - NHS Digital"},{"key":"ref12","article-title":"DCMS-d","year":"2018","journal-title":"Security of Network and Information Systems Guidance for Competent Authorities"},{"key":"ref13","article-title":"GLA","year":"2018","journal-title":"Smarter London Together"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-016-0083-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/10357718.2017.1320972"},{"key":"ref16","article-title":"NIST","year":"2018","journal-title":"Framework for Improving Critical Infrastructure Cybersecurity Version 1 1"},{"key":"ref17","author":"maglaras","year":"2018","journal-title":"NIS directive The case of Greece"},{"key":"ref18","article-title":"Department of Homeland Security","year":"2015","journal-title":"The Cybersecurity Act of 2015"},{"key":"ref19","author":"bada","year":"2016","journal-title":"About the Global Cybersecurity Capacity Centre Lead Editor and Author Contact details"},{"key":"ref4","author":"piggin","year":"2018","journal-title":"Protecting our critical infrastructure Understanding new cyber security laws"},{"key":"ref3","first-page":"4","article-title":"Cybersecurity and healthcare: how safe are we?","volume":"358","author":"guy","year":"2017","journal-title":"BMJ"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/0894439310392197"},{"key":"ref5","article-title":"Microsoft","year":"2018","journal-title":"Risk Management for Cybersecurity Security Baselines Risk Management for Cybersecurity"},{"key":"ref8","article-title":"DCMS-c","year":"2018","journal-title":"The Network and Information Systems Regulation 2018"},{"key":"ref7","author":"parliament","year":"0","journal-title":"Official Journal of the European Union"},{"key":"ref49","author":"government-a","year":"2018","journal-title":"National Security Capability Review - March 2018"},{"key":"ref9","article-title":"EECSP","year":"2017","journal-title":"EECSP Report Cyber Security in the Energy Sector"},{"key":"ref46","year":"0","journal-title":"Financial services code"},{"key":"ref45","author":"treasury","year":"2016","journal-title":"G7 Fundamental Elements of Cybersecurity for the Financial Sector"},{"key":"ref48","article-title":"NCSC","year":"2017","journal-title":"Introduction"},{"key":"ref47","article-title":"UKRN","year":"2015","journal-title":"Cross-sector Resilience - Phase 1 report"},{"key":"ref42","article-title":"BSI","year":"2017","journal-title":"Smart cities-Guide to establishing a decision-making framework for sharing data and information services BSI Standards Pnblication"},{"key":"ref41","author":"cpni","year":"2017","journal-title":"PAS 185 2017 Smart Cities - Specification for establishing and implementing a security-minded approach"},{"key":"ref44","author":"simon","year":"0","journal-title":"Cyber Security Critical National Infrastructure Inquiry"},{"key":"ref43","article-title":"CPNI","year":"2018","journal-title":"PROTECTIVE SECURITY MANAGEMENT SYSTEMS (PSEMS) CHECKLIST"}],"event":{"name":"2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","location":"Oxford, United Kingdom","start":{"date-parts":[[2019,6,3]]},"end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871248\/8884876\/08884963.pdf?arnumber=8884963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:36Z","timestamp":1658155536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2019.8884963","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}