{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T15:19:39Z","timestamp":1767453579337,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,23]]},"DOI":"10.1145\/3357419.3357450","type":"proceedings-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:16:45Z","timestamp":1570807005000},"page":"142-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Integrated Model of Technical and Non-Technical Perspectives on Managing IoT Security"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Suryanegara","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"given":"Nur","family":"Hayati","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"21","volume-title":"The 2018 SANS Industrial IoT Security Survey: Shaping IIoT Security Concerns","author":"Filkins B.","year":"2018","unstructured":"B. Filkins and D. Wylie, \"The 2018 SANS Industrial IoT Security Survey: Shaping IIoT Security Concerns,\" p. 21, 2018."},{"key":"e_1_3_2_1_2_1","unstructured":"\"Abdul-Ghani H.A.; Konstantas D. A \"Comprehensive Study of Security and Privacy Guidelines Threats and Countermeasures.\""},{"key":"e_1_3_2_1_3_1","volume-title":"Available: https:\/\/www.kaspersky.com\/about\/press-releases\/2018_new-iot-malware-grew-three-fold-in-h1-2018 [Accessed","author":"New","year":"2019","unstructured":"\"New IoT-malware grew three-fold in H1 2018,\" Kaspersky, September 18, 2018. [Online], Available: https:\/\/www.kaspersky.com\/about\/press-releases\/2018_new-iot-malware-grew-three-fold-in-h1-2018 [Accessed June 14, 2019]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_3_2_1_6_1","volume-title":"Available: https:\/\/breachlevelindex.com\/assets\/Breach-Level-Index-Report-2017-Gemalto.pdf [Accessed","author":"The BREACH LEVEL INDEX","year":"2019","unstructured":"BREACH LEVEL INDEX, \"2017 - The Year of Internal Threats and Accidental Data Breaches\", 2017. [Online], Available: https:\/\/breachlevelindex.com\/assets\/Breach-Level-Index-Report-2017-Gemalto.pdf [Accessed June 14, 2019]."},{"key":"e_1_3_2_1_7_1","volume-title":"Comput. Syst.","author":"Tewari A.","year":"2018","unstructured":"A. Tewari and B. B. Gupta, \"Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,\" Future Gener. Comput. Syst., May 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.026"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100050"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.038"},{"key":"e_1_3_2_1_14_1","first-page":"20","article-title":"A system engineering approach to the implementation of the Internet of Things (IoT) in a country,\" in 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","author":"Suryanegara M.","year":"2017","unstructured":"M. Suryanegara, A. S. Arifin, M. Asvial, and G. Wibisono, \"A system engineering approach to the implementation of the Internet of Things (IoT) in a country,\" in 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, 2017, pp. 20--23.","journal-title":"Semarang"},{"key":"e_1_3_2_1_15_1","unstructured":"IEEE Standards Association \"Internet of Things- IEEE standards enabling products with real-world applications\" [Online] Available: https:\/\/standards.ieee.org\/initiatives\/iot\/stds.html"},{"key":"e_1_3_2_1_16_1","volume-title":"Available: https:\/\/www.nist.gov\/cyberframework [Accessed","author":"National Institute of Standards and Technology, \"CYBERSECURITY FRAMEWORK\", [Online]","year":"2019","unstructured":"National Institute of Standards and Technology, \"CYBERSECURITY FRAMEWORK\", [Online], Available: https:\/\/www.nist.gov\/cyberframework [Accessed June 14, 2019]."},{"key":"e_1_3_2_1_17_1","unstructured":"International Telecommunication Union \"SG17: Security\" [Online] Available: https:\/\/www.itu.int\/en\/ITU-T\/studygroups\/2017-2020\/17\/Pages\/default.aspx"},{"key":"e_1_3_2_1_18_1","unstructured":"International Organization for Standardization \"ISO\/IEC 27000 family - Information security management systems\" [Online] Available: https:\/\/www.iso.org\/isoiec-27001-information-security.html"},{"key":"e_1_3_2_1_19_1","unstructured":"International Organization for Standardization \"ISO\/IEC 15408-1:2009\" [Online] Available: https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:15408:-1:ed-3:v2:en"}],"event":{"name":"ICICM 2019: The 9th International Conference on Information Communication and Management","sponsor":["Chinese Academy of Sciences"],"location":"Prague Czech Republic","acronym":"ICICM 2019"},"container-title":["Proceedings of the 9th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357419.3357450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:21Z","timestamp":1750202601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,23]]},"references-count":19,"alternative-id":["10.1145\/3357419.3357450","10.1145\/3357419"],"URL":"https:\/\/doi.org\/10.1145\/3357419.3357450","relation":{},"subject":[],"published":{"date-parts":[[2019,8,23]]},"assertion":[{"value":"2019-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}