{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:12Z","timestamp":1750307952563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,12,10]],"date-time":"2007-12-10T00:00:00Z","timestamp":1197244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,12,10]]},"DOI":"10.1145\/1328057.1328067","type":"proceedings-article","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T19:27:58Z","timestamp":1199388478000},"page":"40-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Formal threat descriptions for enhancing governmental risk assessment"],"prefix":"10.1145","author":[{"given":"Andreas","family":"Ekelhart","sequence":"first","affiliation":[{"name":"Secure Business Austria, Vienna, Austria"}]},{"given":"Stefan","family":"Fenz","sequence":"additional","affiliation":[{"name":"Secure Business Austria, Vienna, Austria"}]},{"given":"Thomas","family":"Neubauer","sequence":"additional","affiliation":[{"name":"Secure Business Austria, Vienna, Austria"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2007,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"January","author":"CC.","year":"2007","unstructured":"CERT\/ CC. Cert\/cc statistics 1988-2006. http:\/\/www.cert.org\/stats\/ , January 2007 . CERT\/CC. Cert\/cc statistics 1988-2006. http:\/\/www.cert.org\/stats\/, January 2007."},{"key":"e_1_3_2_1_2_1","unstructured":"Commission of the European Communities. Communication from the commission to the council the european parliament the european economic and social committee and the committee of the regions 'i2010 -- a european information society for growth and employment'. COM(2005) 229 final June 2005  Commission of the European Communities. Communication from the commission to the council the european parliament the european economic and social committee and the committee of the regions ' i2010 -- a european information society for growth and employment '. COM(2005) 229 final June 2005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.478"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.45"},{"key":"e_1_3_2_1_5_1","unstructured":"Hewlett-Packard Development Company. JENA semantic web framework. http:\/\/jena.sourceforge.net\/ August 2007.  Hewlett-Packard Development Company. JENA semantic web framework. http:\/\/jena.sourceforge.net\/ August 2007."},{"key":"e_1_3_2_1_6_1","unstructured":"International Organization for Standardization and International Electrotechnical Commission. Iso\/iec 27001:2005 information technology -- security techniques - information security management systems requirements.  International Organization for Standardization and International Electrotechnical Commission. Iso\/iec 27001:2005 information technology -- security techniques - information security management systems requirements."},{"key":"e_1_3_2_1_7_1","unstructured":"I. LLC. Nmap security scanner. http:\/\/insecure.org\/nmap\/ June 2007.  I. LLC. Nmap security scanner. http:\/\/insecure.org\/nmap\/ June 2007."},{"key":"e_1_3_2_1_8_1","unstructured":"Microsoft Corporation. Windows server update services. http:\/\/www.microsoft.com\/germany\/windowsserver2003\/technologien\/updateservices\/default.mspx June 2007.  Microsoft Corporation. Windows server update services. http:\/\/www.microsoft.com\/germany\/windowsserver2003\/technologien\/updateservices\/default.mspx June 2007."},{"key":"e_1_3_2_1_9_1","volume-title":"Technical report","author":"ST.","year":"1995","unstructured":"NI ST. An introduction to computer security - the nist handbook. Technical report , NIST (National Institute of Standards and Technology) , October 1995 . Special Publication 800-12. NIST. An introduction to computer security - the nist handbook. Technical report, NIST (National Institute of Standards and Technology), October 1995. Special Publication 800-12."}],"event":{"name":"ICEGOV '07: International conference on theory and practice in electronic governance","acronym":"ICEGOV '07","location":"Macao China"},"container-title":["Proceedings of the 1st international conference on Theory and practice of electronic governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1328057.1328067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1328057.1328067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:51Z","timestamp":1750258671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1328057.1328067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,10]]},"references-count":9,"alternative-id":["10.1145\/1328057.1328067","10.1145\/1328057"],"URL":"https:\/\/doi.org\/10.1145\/1328057.1328067","relation":{},"subject":[],"published":{"date-parts":[[2007,12,10]]},"assertion":[{"value":"2007-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}