{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:57:41Z","timestamp":1776113861838,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/softcom.2014.7039133","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:43:41Z","timestamp":1424202221000},"page":"211-216","source":"Crossref","is-referenced-by-count":2,"title":["User privacy risk calculator"],"prefix":"10.1109","author":[{"given":"Marin","family":"Vukovic","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Damjan","family":"Katusic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pavle","family":"Skocir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dragan","family":"Jevtic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luka","family":"Delonga","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniela","family":"Trutin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083998"},{"key":"ref11","article-title":"ISO\/IEC 27005:2011","year":"0","journal-title":"Internet"},{"key":"ref12","article-title":"ISO\/IEC 27001:2013","year":"0","journal-title":"Internet"},{"key":"ref13","article-title":"Cyber Threat Metrics","author":"mateski","year":"2012","journal-title":"Sandia National Laboratories"},{"key":"ref14","article-title":"Prolexic DDoS Downtime Calculator","year":"0","journal-title":"Internet"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2011.5953208"},{"key":"ref16","article-title":"Symantec Cyber Resilience Assessment","year":"0","journal-title":"Internet"},{"key":"ref17","article-title":"Symantec Severity Assessment: Threats, Events, Vulnerabilities, Risks","year":"0","journal-title":"Internet"},{"key":"ref18","article-title":"OWASP Risk Assessment Calculator","year":"0"},{"key":"ref19","article-title":"OWASP Risk Rating Methodology","year":"0","journal-title":"Internet"},{"key":"ref4","article-title":"An empirical analysis of the current state of phishing attack and defence","author":"moore","year":"2007","journal-title":"Workshop on the Economics of Information Security 2007"},{"key":"ref3","article-title":"The Economic Impact of Cybercrime and Cyber Espionage","year":"2013","journal-title":"Mcaffe's Center for Strategic and International Studies"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.302"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.126"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2012.2208392"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.21"},{"key":"ref2","article-title":"Internet Usage Statistics","year":"0","journal-title":"Internet"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.83"},{"key":"ref1","article-title":"2013 Cost of Cyber Crime Study: United States","year":"2013","journal-title":"Ponemon Institute"},{"key":"ref20","article-title":"University Unveils Cyber Threat Calculator","year":"0","journal-title":"Internet"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2007.4419521"},{"key":"ref21","first-page":"1","article-title":"Internet as a CII - A framework to measure awareness in the cyber sphere","author":"keren","year":"2012","journal-title":"Proc 4th International Conference on Cyber Conflict"},{"key":"ref24","article-title":"EUDirective 2002\/58\/EC","year":"0","journal-title":"Internet"},{"key":"ref23","article-title":"ENISA Threat Landscape 2013","year":"2013","journal-title":"European Union Agency for Network and Information Security (ENISA)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.15"}],"event":{"name":"2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","location":"Split, Croatia","start":{"date-parts":[[2014,9,17]]},"end":{"date-parts":[[2014,9,19]]}},"container-title":["2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027280\/7039053\/07039133.pdf?arnumber=7039133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:44:32Z","timestamp":1490381072000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7039133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/softcom.2014.7039133","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}