{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:36:01Z","timestamp":1776411361400,"version":"3.51.2"},"reference-count":8,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T00:00:00Z","timestamp":1207008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2008,4]]},"abstract":"<jats:p>Use the new PCR risk metric to find ways to enhance security, avoiding one-dimensional metrics like ALE that could risk an organization's survivability.<\/jats:p>","DOI":"10.1145\/1330311.1330325","type":"journal-article","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T16:08:32Z","timestamp":1207066112000},"page":"64-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Information security and risk management"],"prefix":"10.1145","volume":"51","author":[{"given":"Lawrence D.","family":"Bodin","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Lawrence A.","family":"Gordon","sequence":"additional","affiliation":[{"name":"University of Maryland Institute for Advanced Computer Studies"}]},{"given":"Martin P.","family":"Loeb","sequence":"additional","affiliation":[{"name":"University of Maryland Institute for Advanced Computer Studies"}]}],"member":"320","published-online":{"date-parts":[[2008,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042091.1042094"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107465"},{"key":"e_1_2_1_3_1","volume-title":"Managing Cybersecurity Resources: A Cost-Benefit Analysis","author":"Gordon L.","year":"2006","unstructured":"Gordon , L. and Loeb , M . Managing Cybersecurity Resources: A Cost-Benefit Analysis . McGraw-Hill , New York , 2006 . Gordon, L. and Loeb, M. Managing Cybersecurity Resources: A Cost-Benefit Analysis. McGraw-Hill, New York, 2006."},{"key":"e_1_2_1_4_1","volume":"22","author":"Gordon L.","unstructured":"Gordon , L. , Loeb , M. , and Lucyshyn , W. Sharing information on computer systems: An economic analysis. Journal of Accounting and Public Policy 22 , 6 (Nov.-Dec. 2003), 461--485. Gordon, L., Loeb, M., and Lucyshyn, W. Sharing information on computer systems: An economic analysis. Journal of Accounting and Public Policy 22, 6 (Nov.-Dec. 2003), 461--485.","journal-title":"Journal of Accounting and Public Policy"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/636772.636774"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/383694.383709"},{"key":"e_1_2_1_8_1","volume-title":"The Analytic Hierarchy Process","author":"Saaty T.","year":"1980","unstructured":"Saaty , T. The Analytic Hierarchy Process . McGraw-Hill , New York , 1980 . Saaty, T. The Analytic Hierarchy Process. McGraw-Hill, New York, 1980."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1330311.1330325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1330311.1330325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:31Z","timestamp":1750258051000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1330311.1330325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,4]]}},"alternative-id":["10.1145\/1330311.1330325"],"URL":"https:\/\/doi.org\/10.1145\/1330311.1330325","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,4]]},"assertion":[{"value":"2008-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}