{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:00:12Z","timestamp":1725627612614},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,28]]},"DOI":"10.1109\/istas52410.2021.9629214","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T21:19:56Z","timestamp":1638825596000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["See something, say something? Coordinating the disclosure of security vulnerabilities in Canada\u2019s infrastructure"],"prefix":"10.1109","author":[{"given":"Yuan","family":"Stevens","sequence":"first","affiliation":[]},{"given":"Stephanie","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Atkinson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information technology &#x2014; Security techniques &#x2014; Vulnerability disclosure ISO\/IEC 29147 2018","year":"2018","key":"ref39"},{"journal-title":"Canadian centre for cyber security","article-title":"Contact Us","year":"2021","key":"ref38"},{"journal-title":"Copyright Act RSC 1985 c C-42 section 41 13","year":"0","key":"ref33"},{"journal-title":"Copyright Act RSC 1985 c C-42 section 41 13","year":"0","key":"ref32"},{"journal-title":"Copyright Act RSC 1985 c C-42","year":"0","key":"ref31"},{"key":"ref30","article-title":"Cybersecurity 2021: Canada","author":"wasser","year":"2020","journal-title":"International Comparative Legal Guide Cybersecurity 2021"},{"journal-title":"Canadian centre for cyber security","article-title":"Incident Management","year":"2021","key":"ref37"},{"journal-title":"Canadian centre for cyber security","article-title":"About the Cyber Centre","year":"2021","key":"ref36"},{"journal-title":"Government of Canada","article-title":"Canadian Centre for Cyber Security","year":"2021","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3111851"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.101418"},{"journal-title":"Information technology &#x2014; Security techniques &#x2014; Vulnerability handling processes International Standard ISO\/IEC 30111","year":"2019","key":"ref40"},{"journal-title":"National Cybersecurity Directorate","year":"2021","key":"ref11"},{"journal-title":"Australia Cyber Security Centre","article-title":"CERT Australia","year":"2021","key":"ref12"},{"journal-title":"Canadian centre for cyber security","article-title":"Report a cyber incident","year":"2021","key":"ref13"},{"journal-title":"Indonesia Computer Emergency Response Team","year":"2021","key":"ref14"},{"journal-title":"Official website of the South African National CSIRT","article-title":"Report an Incident","year":"2021","key":"ref15"},{"journal-title":"National Intelligence Service","article-title":"National Cyber Security Center","year":"2021","key":"ref16"},{"journal-title":"National Cyber Incidents Response Center","article-title":"National Cyber Incident Response Center","year":"2021","key":"ref17"},{"journal-title":"Canadian centre for cyber security","article-title":"Glossary","year":"2021","key":"ref18"},{"journal-title":"CTIR Gov","article-title":"Government Cyber Incident Treatment and Response Center","year":"2021","key":"ref19"},{"journal-title":"State Research and Testing Institute for Technical Information Protection Problems","article-title":"Information Security Threats Databank","year":"2021","key":"ref28"},{"journal-title":"Cybersecurity Infrastructure Security Agency","article-title":"Binding Operational Directive 20-01","year":"2020","key":"ref4"},{"key":"ref27","article-title":"CERT-MX","author":"de m\u00e9xico","year":"2021","journal-title":"Gobierno de M&#x00E9;xico"},{"key":"ref3","article-title":"The CERT Guide to Coordinated Vulnerability Disclosure","author":"householder","year":"2017","journal-title":"CMU\/SEI-2017-SR-022 Software Engineering Institute Carnegie Mellon University"},{"journal-title":"National Cyber Security Centre (NCSC)","article-title":"Vulnerability Reporting","year":"2021","key":"ref6"},{"journal-title":"Saudi CERT","article-title":"Home","year":"2021","key":"ref29"},{"journal-title":"European Commission","article-title":"EU-FOSSA 2&#x2014;Free and Open Source Software Auditing","year":"2021","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5018\/economics-ejournal.ja.2017-19"},{"key":"ref7","article-title":"&#x2018;Messenger always gets shot&#x2019;: Hackers say the Canadian government doesn&#x2019;t want their help","author":"braga","year":"2016","journal-title":"CBC"},{"journal-title":"Tech Checkup Dealing with Technology Change in Pandemic Recovery","year":"2021","key":"ref2"},{"key":"ref9","article-title":"Heightening cybersecurity to promise safety and fairness for citizens in the Post-Covid-19 Digital World","author":"khan","year":"2020","journal-title":"G20 Insights"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"journal-title":"National Computer Network Emergency Technology Coordination Center","article-title":"National Internet Emergency Centre","year":"2021","key":"ref20"},{"journal-title":"Government centre for monitoring alerting and responding to computer attacks","year":"2021","key":"ref22"},{"journal-title":"CERT-EU","article-title":"What is CERT-EU, what is its role?","year":"2021","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5325\/jinfopoli.7.2017.0372"},{"journal-title":"Ministry of Electronics & Information Technology Government of India","article-title":"Indian Computer Emergency Response Team","year":"2021","key":"ref24"},{"journal-title":"Framework for Improving Critical Infrastructure Cybersecurity Version 1 1 NIST CSWP 04162018 p NIST CSWP 04162018","year":"2018","key":"ref41"},{"journal-title":"CERT-Bund","year":"2021","key":"ref23"},{"key":"ref44","article-title":"Patching Our Digital Future Is Unsustainable and Dangerous","author":"hathaway","year":"2019","journal-title":"Centre for International Governance Innovation Security Surveillance & Privacy"},{"journal-title":"JPCERT","article-title":"Vulnerability Handling and related guidelines","year":"2021","key":"ref26"},{"key":"ref43","article-title":"See Something, Say Something: Coordinating the Disclosure of Vulnerabilities in Canada","author":"stevens","year":"2021","journal-title":"Cybersecure Policy Exchange"},{"journal-title":"Presidency of the Council of Minister - Information System for the Security of the Republic","article-title":"Computer Security Incident Response Team &#x2013; Italy","year":"2021","key":"ref25"}],"event":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2021,10,28]]},"location":"Waterloo, ON, Canada","end":{"date-parts":[[2021,10,31]]}},"container-title":["2021 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9628888\/9629117\/09629214.pdf?arnumber=9629214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:02Z","timestamp":1652201642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9629214\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/istas52410.2021.9629214","relation":{},"subject":[],"published":{"date-parts":[[2021,10,28]]}}}