{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:25Z","timestamp":1750306885912,"version":"3.41.0"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2013,6]]},"abstract":"<jats:p>Risk is a necessary consequence of dependence.<\/jats:p>","DOI":"10.1145\/2461256.2461273","type":"journal-article","created":{"date-parts":[[2013,5,23]],"date-time":"2013-05-23T15:23:31Z","timestamp":1369322611000},"page":"48-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Resolved"],"prefix":"10.1145","volume":"56","author":[{"given":"Dan","family":"Geer","sequence":"first","affiliation":[{"name":"MIT"}]}],"member":"320","published-online":{"date-parts":[[2013,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_2_1_2_1","unstructured":"Branigan S. and Cheswick B. The effects of war on the Yugoslavian Network 1999; http:\/\/www.cheswick.com\/ches\/map\/yu\/index.html.  Branigan S. and Cheswick B. The effects of war on the Yugoslavian Network 1999; http:\/\/www.cheswick.com\/ches\/map\/yu\/index.html."},{"key":"e_1_2_1_3_1","unstructured":"Geer D. People in the loop: Are they a fail-safe or a liability? Suits & Spooks (Feb. 8 2012); http:\/\/geer.tinho.net\/geer.suitsandspooks.8ii12.txt.  Geer D. People in the loop: Are they a fail-safe or a liability? Suits & Spooks (Feb. 8 2012); http:\/\/geer.tinho.net\/geer.suitsandspooks.8ii12.txt."},{"key":"e_1_2_1_4_1","unstructured":"Hathaway M. Securing our digital future. White House blog; http:\/\/www.whitehouse.gov\/blog\/2009\/05\/29\/securing-our-digital-future.  Hathaway M. Securing our digital future. White House blog; http:\/\/www.whitehouse.gov\/blog\/2009\/05\/29\/securing-our-digital-future."},{"key":"e_1_2_1_5_1","unstructured":"Index of Cyber Security; http:\/\/cybersecurityindex.org.  Index of Cyber Security; http:\/\/cybersecurityindex.org."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp030010"},{"key":"e_1_2_1_7_1","unstructured":"Kingsley P. How tiny Estonia stepped out of USSR's shadow to become an Internet titan. The Guardian; http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/15\/estonia-ussr-shadow-internet-titan.  Kingsley P. How tiny Estonia stepped out of USSR's shadow to become an Internet titan. The Guardian ; http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/15\/estonia-ussr-shadow-internet-titan."},{"key":"e_1_2_1_8_1","unstructured":"LANGSEC\n\n  \n  : Language-theoretic Security; http:\/\/langsec.org.  LANGSEC: Language-theoretic Security; http:\/\/langsec.org."},{"key":"e_1_2_1_9_1","unstructured":"National Institute of Standards and Technology. High Integrity Software System Assurance. Redundancy management (Sec. 4.2). A Conceptual Framework for System Fault Tolerance 1995; http:\/\/hissa.nist.gov\/chissa\/SEI_Framework\/framework_16.html.  National Institute of Standards and Technology. High Integrity Software System Assurance. Redundancy management (Sec. 4.2). A Conceptual Framework for System Fault Tolerance 1995; http:\/\/hissa.nist.gov\/chissa\/SEI_Framework\/framework_16.html."},{"key":"e_1_2_1_10_1","unstructured":"Palin P. Can you envision a \"successful failure?\" Homeland Security Watch; http:\/\/www.hlswatch.com\/2012\/07\/13\/can-you-envision-a-successful-failure\/.  Palin P. Can you envision a \"successful failure?\" Homeland Security Watch; http:\/\/www.hlswatch.com\/2012\/07\/13\/can-you-envision-a-successful-failure\/."},{"key":"e_1_2_1_11_1","unstructured":"Presidential Decision Directive 63. The Clinton Administration's Policy on Critical Infrastructure Protection (1998); http:\/\/www.fas.org\/irp\/offdocs\/paper598.htm.  Presidential Decision Directive 63. The Clinton Administration's Policy on Critical Infrastructure Protection (1998); http:\/\/www.fas.org\/irp\/offdocs\/paper598.htm."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.54"},{"key":"e_1_2_1_13_1","unstructured":"Zickuhr K. and Smith A. Digital differences. Pew Research Center; http:\/\/pewinternet.org\/~\/media\/\/Files\/Reports\/2012\/PIP_Digital_differences_041312.pdf.  Zickuhr K. and Smith A. Digital differences. Pew Research Center; http:\/\/pewinternet.org\/~\/media\/\/Files\/Reports\/2012\/PIP_Digital_differences_041312.pdf."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2461256.2461273","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2461256.2461273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:43Z","timestamp":1750234723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2461256.2461273"}},"subtitle":["the internet is no place for critical infrastructure"],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":13,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["10.1145\/2461256.2461273"],"URL":"https:\/\/doi.org\/10.1145\/2461256.2461273","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2013,6]]},"assertion":[{"value":"2013-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}