{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:59:42Z","timestamp":1729652382562,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890934","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"149-155","source":"Crossref","is-referenced-by-count":1,"title":["Quantifying the financial impact of it security breaches on business processes"],"prefix":"10.1109","author":[{"given":"Clemens","family":"Martin","sequence":"first","affiliation":[]},{"given":"Amina","family":"Kadry","sequence":"additional","affiliation":[]},{"given":"Ghada","family":"Abu-Shady","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Printed Wiring Board Cleaner Technologies Substitutes Assessment Making Holes Conductive","year":"1997","author":"kincaid","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78238-4_8"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-007-0018-4"},{"year":"0","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415120103"},{"journal-title":"Business Process Simulation How to Get It Right","year":"2008","author":"aalst der van","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2009.5394145"},{"year":"0","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1636-5_6"},{"journal-title":"Rope A Methodology for Enabling the Risk-aware Modelling and Simulation of Business Processes","year":"2007","author":"jakoubi","key":"13"},{"key":"14","article-title":"Deriving resource requirements applying risk-aware business process modeling and simulation","author":"jakoubi","year":"2008","journal-title":"Proceedings of the 18th European Conference on Information Systems"},{"year":"0","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2011.6147804"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44530.13.3.20040701\/83067.5"},{"key":"21","article-title":"Towards a flexible approach for business process modeling and simulation environment","author":"mason","year":"2008","journal-title":"Proceedings of the 2008 Winter Simulation Conference"},{"key":"20","first-page":"13","article-title":"The impact of information security breaches on financial performance of the breached firms: An empirical investigation","volume":"17","author":"ko","year":"2006","journal-title":"Information Technology and Management"},{"key":"22","first-page":"311","article-title":"Simulation modeling of business processes","author":"paul","year":"1998","journal-title":"Proceedings of the 3rd UK Academy of Information Systems Conference"},{"key":"23","first-page":"879","article-title":"Analysing and determining return on investment for information security","author":"pekos","year":"2008","journal-title":"Proceedings of International Conference on Applied Economics"},{"journal-title":"Information Security Breaches Survey-A Technical Report","year":"2013","key":"24"},{"journal-title":"12th Annual Computer Crime and Security Survey","year":"2007","author":"richardson","key":"25"},{"key":"26","first-page":"1","article-title":"CSI computer crime and security survey","volume":"1","author":"richardson","year":"2008","journal-title":"Computer Security Institute"},{"key":"27","article-title":"14th annual CSI computer crime and security survey","author":"richardson","year":"2009","journal-title":"Computer Security Institute"},{"key":"28","article-title":"15th annual 2010\/2011 computer crime and security survey","author":"richardson","year":"2011","journal-title":"Computer Security Institute"},{"key":"29","article-title":"Return on security investment (ROSI)-A practical quantitative model","volume":"38","author":"sonnenreich","year":"2006","journal-title":"Journal of Research &Practice in Information Technology"},{"key":"3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/10864415.2004.11044320","article-title":"The effect of Internet security breach announcements on market value: Capital market reactions for breached firms and Internet security developers","volume":"9","author":"cavusoglu","year":"2004","journal-title":"International Journal of Electronic Commerce"},{"key":"2","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3233\/JCS-2003-11308","article-title":"The economic cost of publicly announced information security breaches: Empiricet al.vidence from the stock market","volume":"11","author":"campbell","year":"2003","journal-title":"Journal of Computer Security"},{"key":"10","article-title":"2006 CSI\/FBI computer crime and security survey","volume":"22","author":"gordon","year":"2006","journal-title":"Computers and Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.58"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.206"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.06.005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43325.12.1.20030301\/41478.5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2003.10.001"},{"journal-title":"Introduction to Return on Security Investment-Helping CERTs Assessing the Cost of (Lack Of) Security","year":"2012","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2008.81"},{"key":"4","first-page":"25","article-title":"Simulation: An enabling technology in software engineering","volume":"12","author":"christie","year":"1999","journal-title":"Journal of Defense Software Engineering"},{"journal-title":"2005 CSI\/FBI Computer Crime and Security Survey","year":"2005","author":"gordon","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.211"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890934.pdf?arnumber=6890934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T17:33:59Z","timestamp":1565804039000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890934","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}