{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:26:34Z","timestamp":1759091194248,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3140241.3140251","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T14:58:58Z","timestamp":1509461938000},"page":"103-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["\"How Long is a Piece of String\":"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Green","sequence":"first","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"given":"Daniel","family":"Prince","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"given":"Jerry","family":"Busby","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781849209335"},{"key":"e_1_3_2_1_2_1","unstructured":"British Standards Institute. 2010. BS ISO\/IEC 31010 - Risk Management - Risk Assessment Techniques. (2010).  British Standards Institute. 2010. BS ISO\/IEC 31010 - Risk Management - Risk Assessment Techniques. (2010)."},{"key":"e_1_3_2_1_3_1","unstructured":"Jeremy Simon Busby Benjamin Green and David Hutchison. 2017. Analysis of Affordance Time and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk. Risk Analysis (2017).  Jeremy Simon Busby Benjamin Green and David Hutchison. 2017. Analysis of Affordance Time and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk. Risk Analysis (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"Donald Thomas Campbell and Julian C. Stanley. 1963. Experimental and quasiexperimental designs for research on teaching. Ravenio Books.  Donald Thomas Campbell and Julian C. Stanley. 1963. Experimental and quasiexperimental designs for research on teaching. Ravenio Books."},{"key":"e_1_3_2_1_5_1","unstructured":"David Canter Jennifer Brown and Michael Brenner. 1985. The research interview: Uses and approaches. Academic Press New York.  David Canter Jennifer Brown and Michael Brenner. 1985. The research interview: Uses and approaches. Academic Press New York."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Yulia Cherdantseva Pete Burnap Andrew Blyth Peter Eden Kevin Jones Hugh Soulsby and Kristan Stoddart. 2016. A review of cyber security risk assessment methods for SCADA systems. computers & security 56 (2016) 1--27.  Yulia Cherdantseva Pete Burnap Andrew Blyth Peter Eden Kevin Jones Hugh Soulsby and Kristan Stoddart. 2016. A review of cyber security risk assessment methods for SCADA systems. computers & security 56 (2016) 1--27.","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"e_1_3_2_1_7_1","unstructured":"CPNI. 2017. Critical National Infrastructure. (2017). https:\/\/www.cpni.gov.uk\/critical-national-infrastructure-0  CPNI. 2017. Critical National Infrastructure. (2017). https:\/\/www.cpni.gov.uk\/critical-national-infrastructure-0"},{"volume-title":"CRASHOVERRIDE: Analysis of the Threat to Electric Grid Operations. Technical Report. https:\/\/dragos.com\/blog\/crashoverride\/CrashOverride-01.pdf","year":"2017","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"James H. Frey. 1983. Survey Research by Telephone. SAGE Publications Beverly Hills.  James H. Frey. 1983. Survey Research by Telephone. SAGE Publications Beverly Hills."},{"key":"e_1_3_2_1_10_1","volume-title":"Forum Qualitative Sozialforschung\/Forum: Qualitative Social Research","volume":"7","author":"Ganga Deianira","year":"2006"},{"key":"e_1_3_2_1_11_1","first-page":"27","article-title":"Grounded theory: the discovery of grounded theory","volume":"12","author":"Glaser Barney","year":"1967","journal-title":"Sociology The Journal Of The British Sociological Association"},{"key":"e_1_3_2_1_12_1","unstructured":"Benjamin Green Sylvain Andre Francis Frey Awais Rashid and David Hutchison. 2016. Testbed diversity as a fundamental principle for effective ICS security research. In SERECIN.  Benjamin Green Sylvain Andre Francis Frey Awais Rashid and David Hutchison. 2016. Testbed diversity as a fundamental principle for effective ICS security research. In SERECIN."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994498"},{"volume-title":"10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17)","year":"2017","author":"Green Benjamin","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808717"},{"key":"e_1_3_2_1_16_1","unstructured":"Benjamin Green Daniel Prince Jerry Busby and David Hutchison. 2017. Interview Protocol\/Guide. (2017). https:\/\/tinyurl.com\/ybo9r9bk  Benjamin Green Daniel Prince Jerry Busby and David Hutchison. 2017. Interview Protocol\/Guide. (2017). https:\/\/tinyurl.com\/ybo9r9bk"},{"key":"e_1_3_2_1_19_1","unstructured":"Nigel King C. Cassell and G. Symon. 1994. Qualitative methods in organizational research: A practical guide. The Qualitative Research Interview 17 (1994).  Nigel King C. Cassell and G. Symon. 1994. Qualitative methods in organizational research: A practical guide. The Qualitative Research Interview 17 (1994)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.02.002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412986229"},{"key":"e_1_3_2_1_22_1","unstructured":"Ben Paske Benjamin Green Daniel Prince and David Hutchison. 2014. Design and Construction of an Industrial Control System Testbed. In PGNET. 151--156.  Ben Paske Benjamin Green Daniel Prince and David Hutchison. 2014. Design and Construction of an Industrial Control System Testbed. In PGNET. 151--156."},{"key":"e_1_3_2_1_23_1","unstructured":"Michael Quinn Patton. 1990. Qualitative evaluation and research methods. SAGE London.  Michael Quinn Patton. 1990. Qualitative evaluation and research methods. SAGE London."},{"key":"e_1_3_2_1_24_1","unstructured":"Janet Powney and Mike Watts. 1987. Interviewing in educational research. Routledge & Kegan Paul Ablingdon.  Janet Powney and Mike Watts. 1987. Interviewing in educational research. Routledge & Kegan Paul Ablingdon."},{"key":"e_1_3_2_1_25_1","unstructured":"Herbert J. Rubin and Irene S. Rubin. 2011. Qualitative interviewing: The art of hearing data. Sage London.  Herbert J. Rubin and Irene S. Rubin. 2011. Qualitative interviewing: The art of hearing data. Sage London."},{"key":"e_1_3_2_1_26_1","unstructured":"Robert Philip Weber. 1985. Basic Content Analysis (first ed.). Sage Publications Beverly Hill  Robert Philip Weber. 1985. Basic Content Analysis (first ed.). Sage Publications Beverly Hill"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140251","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140241.3140251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:20Z","timestamp":1750212680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140251"}},"subtitle":["Defining Key Phases andObserved Challenges within ICS Risk Assessment"],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":24,"alternative-id":["10.1145\/3140241.3140251","10.1145\/3140241"],"URL":"https:\/\/doi.org\/10.1145\/3140241.3140251","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}