{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:19:52Z","timestamp":1730222392467,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/fskd.2014.6980967","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T16:43:41Z","timestamp":1419957821000},"page":"947-955","source":"Crossref","is-referenced-by-count":2,"title":["A strategic framework for managing internet security"],"prefix":"10.1109","author":[{"given":"Elena","family":"Sitnikova","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Asgarkhani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information Security Breaches Survey - Technical Report","year":"2012","author":"pwc","key":"19"},{"key":"17","first-page":"339","article-title":"Information Systems Security Management (ISSM) success factors: Retrospection from the scholars","volume":"1","author":"norman","year":"2013","journal-title":"Proc of European Conference of Information Warfare and Security"},{"journal-title":"The Impact of Cybercrime on Business","year":"2012","author":"ponemon institute","key":"18"},{"journal-title":"Network Security - A Global Look at Network Security Technologies","year":"2012","author":"mimoso","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.009"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.12.049"},{"key":"14","article-title":"An overview of current information systems security - Challenges and innovations","volume":"18","author":"mellado","year":"2012","journal-title":"Journal of Universal Computer Science"},{"journal-title":"Cloud Computing Business Benefits with Security Governance and Assurance Perspective","year":"2009","author":"isaca","key":"11"},{"journal-title":"R10 ISBS 2012 Information Security Breaches Survey","year":"2012","key":"12"},{"journal-title":"Building Honeypots for Industrial Networks","year":"2003","author":"scada honeynet project","key":"21"},{"key":"20","first-page":"14","author":"recommended practice","year":"2009","journal-title":"Improving Industrial Control Systems Cyber Security with Defence-in-depth Strategies"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02312-5_9"},{"journal-title":"Hacker Jailed for Revenge Sewage Attacks","year":"2001","author":"smith","key":"24"},{"key":"25","article-title":"Information security management system standards: A comparative study of the big five","volume":"11","author":"susanto","year":"2011","journal-title":"International Journal of Electrical & Computer Sciences IJECS-IJENS"},{"key":"26","first-page":"286","article-title":"Building an Antology for Cyberterrorism","volume":"1","author":"veerasamy","year":"2013","journal-title":"Proc of European Conference of Information Warfare and Security"},{"key":"3","first-page":"45","volume":"1","author":"aslangoglu","year":"2013","journal-title":"Recent Cyberwar Spectrum and its Analysis Proceedings of the 11th European Conference on Information Warfare and Security"},{"key":"2","first-page":"1","article-title":"Corporate ICT governance: A tool for ICT best practice","volume":"1","author":"asgarkhani","year":"2013","journal-title":"International Conference on Management Leadership and Governance"},{"key":"10","article-title":"The changing face of cyber security","volume":"6","author":"hayes","year":"2012","journal-title":"ISACA Journal"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2008.68"},{"journal-title":"The Use of Attack Trees in Assessing VulnerabilIties in SCADA Systems","year":"2006","author":"franz","key":"7"},{"year":"2010","author":"critical infrastructure resilience strategy attorney general's department","key":"6"},{"key":"5","first-page":"70","article-title":"Cloud computing and security","volume":"1","author":"cardoso","year":"2013","journal-title":"Proc of European Conference of Information Warfare and Security"},{"journal-title":"The Chernobyl Disaster","year":"2004","author":"bbc","key":"4"},{"journal-title":"Pro-palestine Vandals Deface Army Nato Sites The Register","year":"2008","author":"goodin","key":"9"},{"journal-title":"Generic SCADA Risk Management Framework for Australian Critical Infrastructure","year":"2012","key":"8"}],"event":{"name":"2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen, China","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6962871\/6980796\/06980967.pdf?arnumber=6980967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:20:48Z","timestamp":1490314848000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6980967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/fskd.2014.6980967","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}