{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:31Z","timestamp":1750307491439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T00:00:00Z","timestamp":1289520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000396","name":"Technology Strategy Board","doi-asserted-by":"publisher","award":["P0007E"],"award-info":[{"award-number":["P0007E"]}],"id":[{"id":"10.13039\/501100000396","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007302","name":"HP Labs","doi-asserted-by":"publisher","award":["ID 2009-1052-1-A"],"award-info":[{"award-number":["ID 2009-1052-1-A"]}],"id":[{"id":"10.13039\/100007302","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,12]]},"DOI":"10.1145\/1873561.1873566","type":"proceedings-article","created":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T14:07:20Z","timestamp":1289916440000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A collaborative ontology development tool for information security managers"],"prefix":"10.1145","author":[{"given":"John C.","family":"Mace","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Simon","family":"Parkin","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2010,11,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11926078_53"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Mensch &amp; Computing 2008 and DeLFI Cognitive Design 2008","author":"Bai F.","year":"2008","unstructured":"Bai , F. and El Jerroudi, Z. Interactive and Collaborative Ontology Development . In Proceedings of Mensch &amp; Computing 2008 and DeLFI Cognitive Design 2008 , (Berlin, 2008 ), Logos Verlag, 174--179. Bai, F. and El Jerroudi, Z. Interactive and Collaborative Ontology Development. In Proceedings of Mensch &amp; Computing 2008 and DeLFI Cognitive Design 2008, (Berlin, 2008), Logos Verlag, 174--179."},{"key":"e_1_3_2_1_3_1","unstructured":"British Standards Institution BS ISO\/IEC 27001:2005 -- Information Technology -- Security Techniques -- Information Security Management Systems -- Requirements 2005.  British Standards Institution BS ISO\/IEC 27001:2005 -- Information Technology -- Security Techniques -- Information Security Management Systems -- Requirements 2005."},{"key":"e_1_3_2_1_4_1","unstructured":"British Standards Institution BS ISO\/IEC 27002:2005 -- Information Technology -- Security Techniques -- Code of Practice for Information Security Management 2005.  British Standards Institution BS ISO\/IEC 27002:2005 -- Information Technology -- Security Techniques -- Code of Practice for Information Security Management 2005."},{"key":"e_1_3_2_1_5_1","unstructured":"Buraga S. B. Cojocaru L. and Nichifor O. C. 2006. Survey on Web Ontology Editing Tools. Technical Report. University of Iasi Romania.  Buraga S. B. Cojocaru L. and Nichifor O. C. 2006. Survey on Web Ontology Editing Tools . Technical Report. University of Iasi Romania."},{"key":"e_1_3_2_1_6_1","volume-title":"R. CmapTools: A Knowledge Modeling and Sharing Environment. In Proceedings of the 1st International Conference on Concept Mapping","author":"Canas J.","year":"2004","unstructured":"Canas , J. , Hill , G. , Carff , R. , Suri , N. , Lott , J. , Gomez , G. , Eskridge , T. C. , Arroyo , M. And Carvajal , R. CmapTools: A Knowledge Modeling and Sharing Environment. In Proceedings of the 1st International Conference on Concept Mapping , ( Pamplona, Spain , 2004 ), IHMC, 125--133. Canas, J., Hill, G., Carff, R., Suri, N., Lott, J., Gomez, G., Eskridge, T. C., Arroyo, M. And Carvajal, R. CmapTools: A Knowledge Modeling and Sharing Environment. In Proceedings of the 1st International Conference on Concept Mapping, (Pamplona, Spain, 2004), IHMC, 125--133."},{"volume-title":"Towards a Security Ontology","author":"Donner M.","key":"e_1_3_2_1_7_1","unstructured":"Donner , M. Towards a Security Ontology , IEEE Security and Privacy , 1(3). 6--7. Donner, M. Towards a Security Ontology, IEEE Security and Privacy, 1(3). 6--7."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533084"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.45"},{"key":"e_1_3_2_1_10_1","unstructured":"Financial Services Authority (FSA). Retrieved 10 November 2009 from the Financial Services Authority: http:\/\/www.fsa.gov.uk\/.  Financial Services Authority (FSA). Retrieved 10 November 2009 from the Financial Services Authority: http:\/\/www.fsa.gov.uk\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1088622.1088641"},{"issue":"4","key":"e_1_3_2_1_12_1","first-page":"1","volume":"1","author":"Herzog A.","unstructured":"Herzog , A. , Shahmehri , N. and Duma , C. An Ontology of Information Security, International Journal of Information Security and Privacy , 1 ( 4 ), 1 -- 23 . Herzog, A., Shahmehri, N. and Duma, C. An Ontology of Information Security, International Journal of Information Security and Privacy, 1(4), 1--23.","journal-title":"Privacy"},{"key":"e_1_3_2_1_13_1","unstructured":"I-4. Retrieved 27 January 2010 from the International Information Integrity Institute: https:\/\/i4online.com\/.  I-4. Retrieved 27 January 2010 from the International Information Integrity Institute: https:\/\/i4online.com\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Welcome to ISF. Retrieved","author":"Information Security Forum Ltd","year":"2010","unstructured":"Information Security Forum Ltd . : Welcome to ISF. Retrieved 27 January , 2010 , from Information Security Forum Ltd .: https:\/\/www.securityforum.org\/. Information Security Forum Ltd.: Welcome to ISF. Retrieved 27 January, 2010, from Information Security Forum Ltd.: https:\/\/www.securityforum.org\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Information Technology Infrastructure Library (ITIL). Retrieved 24 March 2010 from APM Group Ltd.: http:\/\/www.itil-officialsite.com\/home\/home.asp.  Information Technology Infrastructure Library (ITIL). Retrieved 24 March 2010 from APM Group Ltd.: http:\/\/www.itil-officialsite.com\/home\/home.asp."},{"key":"e_1_3_2_1_16_1","unstructured":"Joint Information Systems Committee (JISC). Retrieved 24 March 2010 from Joint Information Systems Committee: http:\/\/www.jisc.ac.uk\/.  Joint Information Systems Committee (JISC). Retrieved 24 March 2010 from Joint Information Systems Committee: http:\/\/www.jisc.ac.uk\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Knoodl","year":"2009","unstructured":"Knoodl : Welcome to Knoodl . Retrieved November 30, 2009 , from Revelytix, Inc.: http:\/\/knoodl.com\/ui\/home.html. Knoodl: Welcome to Knoodl. Retrieved November 30, 2009, from Revelytix, Inc.: http:\/\/knoodl.com\/ui\/home.html."},{"key":"e_1_3_2_1_18_1","volume-title":"Valencia, Spain","author":"Mace J. C.","year":"2010","unstructured":"Mace , J. C. , Parkin , S. and van Moorsel , A. 2009. Ontology Editing Tool for Information Security and Human Factors Experts. To appear in Proceedings of the 2nd International Conference on Knowledge Sharing and Information Sharing , Valencia, Spain , 2010 Mace, J. C., Parkin, S. and van Moorsel, A. 2009. Ontology Editing Tool for Information Security and Human Factors Experts. To appear in Proceedings of the 2nd International Conference on Knowledge Sharing and Information Sharing, Valencia, Spain, 2010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/351144"},{"volume-title":"AI Laboratory","author":"Ontolingua 0","key":"e_1_3_2_1_21_1","unstructured":"Ontolingua . Retrieved November 3 0 , 2009 , from Knowledge Systems , AI Laboratory , Stanford University : http:\/\/www.ksl.stanford.edu\/software\/ontolingua\/. Ontolingua. Retrieved November 30, 2009, from Knowledge Systems, AI Laboratory, Stanford University: http:\/\/www.ksl.stanford.edu\/software\/ontolingua\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626209"},{"key":"e_1_3_2_1_23_1","unstructured":"PCI Security Standards Council. Retrieved 27 January 2010 from the PCI Security Standards Council: https:\/\/www.pcisecuritystandards.org\/.  PCI Security Standards Council. Retrieved 27 January 2010 from the PCI Security Standards Council: https:\/\/www.pcisecuritystandards.org\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sure Y. Angele J. And Staab S. OntoEdit: Multifaceted Inferencing for Ontology Engineering Journal on Data Semantics 1(1). 128--152.  Sure Y. Angele J. And Staab S. OntoEdit: Multifaceted Inferencing for Ontology Engineering Journal on Data Semantics 1(1). 128--152.","DOI":"10.1007\/978-3-540-39733-5_6"},{"key":"e_1_3_2_1_25_1","unstructured":"The Law Society. Retrieved 24 March 2010 from The Law Society: http:\/\/www.lawsociety.org.uk\/home.law.  The Law Society. Retrieved 24 March 2010 from The Law Society: http:\/\/www.lawsociety.org.uk\/home.law."},{"key":"e_1_3_2_1_26_1","unstructured":"TechRepublic. Retrived 24 March 2010 from CBS Interactive Inc.: http:\/\/techrepublic.com.com\/.  TechRepublic. Retrived 24 March 2010 from CBS Interactive Inc.: http:\/\/techrepublic.com.com\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 5th OWL Experiences and Directions Workshop","author":"Tudorache T.","year":"2008","unstructured":"Tudorache , T. , Vendetti , J. And Noy , N. F. 2008 . Web-Protege: A lightweight OWL ontology Editor for the Web . In Proceedings of the 5th OWL Experiences and Directions Workshop , ( Karlsruhe, Germany , 2008), CEUR-WS. Tudorache, T., Vendetti, J. And Noy, N. F. 2008. Web-Protege: A lightweight OWL ontology Editor for the Web. In Proceedings of the 5th OWL Experiences and Directions Workshop, (Karlsruhe, Germany, 2008), CEUR-WS."}],"event":{"name":"CHiMiT '10: Computer Human Interaction for the Management of Information Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","USENIX Assoc USENIX Assoc"],"location":"San Jose California","acronym":"CHiMiT '10"},"container-title":["Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873561.1873566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1873561.1873566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:33Z","timestamp":1750249053000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873561.1873566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,12]]},"references-count":26,"alternative-id":["10.1145\/1873561.1873566","10.1145\/1873561"],"URL":"https:\/\/doi.org\/10.1145\/1873561.1873566","relation":{},"subject":[],"published":{"date-parts":[[2010,11,12]]},"assertion":[{"value":"2010-11-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}