{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:30:54Z","timestamp":1730241054992,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/iceei59426.2023.10346964","type":"proceedings-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T19:23:50Z","timestamp":1702927430000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Design of Cyber Risk Calculation Methods Using Monte Carlo Simulation in Marketspace"],"prefix":"10.1109","author":[{"given":"Hafizh Fianto","family":"Putra","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"}]},{"family":"Suhardi","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50091-1"},{"key":"ref2","first-page":"141","article-title":"Managing in the Marketspace","volume":"72","author":"Rayport","year":"1994","journal-title":"Harvard Business Review"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/09600030010326055"},{"key":"ref4","first-page":"329","article-title":"Main human factors affecting information system security","volume":"5","author":"Soltanmohammadi","year":"2013","journal-title":"Interdiscip. J. Contemp. Res. Bus."},{"key":"ref5","article-title":"2023 Must-Know Cyber Attack Statistics and Trends","volume-title":"2023 Must-Know Cyber Attack Statistics and Trends| Embroker","author":"Mclean","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/ics-02-2018-0024"},{"volume-title":"Management of Information Security","year":"2019","author":"Whitman","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icm.2011.144"},{"key":"ref9","first-page":"1073","article-title":"IT Risk Assessment: Quantitative and Qualitative Approach","volume-title":"Proceedings of the World Congress on Engineering and Computer Science 2008","author":"Rot"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/aci-07-2022-0178"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1353\/wp.1996.0023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/00251740610656278"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/9781118593264"},{"key":"ref14","first-page":"2616","article-title":"The use of Monte Carlo simulation in quantitative risk assessment of IT projects","volume":"7","author":"Hojjati","year":"2015","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/wsc.2008.4736059"},{"volume-title":"ISO\/IEC 27005:2022 Information security, cybersecurity and privacy protection - Guidance on managing information security risks","year":"2022","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s40821-016-0044-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/17410380610648263"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2001.989497"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4324\/9780429439841-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/su14159455"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.927398"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2017.1476"},{"issue":"2","key":"ref24","first-page":"161","article-title":"A Fundamental Approach to Cyber Risk Analysis","volume":"12","author":"B\u00f6hme","year":"2019","journal-title":"Variance"},{"volume-title":"Risk quantification: management, diagnosis and hedging","year":"2006","author":"Condamin","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-39"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101600"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2014.11"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1314"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72206-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.25080\/majora-212e5952-024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2014.89"}],"event":{"name":"2023 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2023,10,10]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2023,10,11]]}},"container-title":["2023 International Conference on Electrical Engineering and Informatics (ICEEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10346236\/10346214\/10346964.pdf?arnumber=10346964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T03:13:43Z","timestamp":1705029223000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10346964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iceei59426.2023.10346964","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}