{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:58:47Z","timestamp":1730224727310,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265445","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":1,"title":["Method for insuring IT risks"],"prefix":"10.1109","author":[{"given":"C.","family":"Magnusson","sequence":"first","affiliation":[]},{"given":"L.","family":"Yngstrom","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ITSEC DG XIII\/F","article-title":"Information Technology Security Evaluation Criteria","year":"1991","key":"ref10"},{"key":"ref11","article-title":"Hedging Shareholder Value in an IT dependent Business Society - the Framework BRITS","author":"magnusson","year":"1999","journal-title":"report serie 99&#x2013;015"},{"journal-title":"Digital Security in a Networked World","year":"2000","author":"schneier","key":"ref12"},{"journal-title":"Management Systems Conceptual Considerations","year":"1985","author":"schoderbeck","key":"ref13"},{"journal-title":"CSC-STD 011&#x2013;83 DOD","article-title":"Trusted Computer Systems Evaluation","year":"1983","key":"ref14"},{"journal-title":"DoD 5200 28-STD","article-title":"Trusted Computer Systems Evaluation","year":"1985","key":"ref15"},{"journal-title":"A Code of Practice for Information Security Management","year":"1993","key":"ref4"},{"key":"ref3","volume":"25","author":"baskerville","year":"1993","journal-title":"Information System security Designs Methods Implications for Information Systems Development ACM Computing Surveys"},{"key":"ref6","article-title":"Information security management","volume":"7799","year":"1998","journal-title":"Part 2 Specification for information security management systems BS"},{"volume":"7799","journal-title":"Information security management Part 1 Code of practice for information security management systems BS","year":"1995","key":"ref5"},{"journal-title":"Valuation Measuring and Managing the Value of Companies","year":"1995","author":"copeland","key":"ref8"},{"key":"ref7","article-title":"Evolution of a Model for Computer Integrity","author":"clark","year":"1988","journal-title":"11 th National Computer Security Conference"},{"key":"ref2","article-title":"Security Engineering","author":"andersson","year":"2001","journal-title":"A Guide to Building Dependable Distributed Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168615"},{"journal-title":"Ericssons's Security Policy and Directives Telefonaktiebolaget LM Ericsson Corporate Security","year":"1992","key":"ref9"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265445.pdf?arnumber=1265445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T14:21:41Z","timestamp":1489501301000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265445","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}