{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:50:55Z","timestamp":1757631055092,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,5]]},"DOI":"10.1145\/3460620.3460736","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T10:33:05Z","timestamp":1622802785000},"page":"82-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["OSINT Techniques Integration with Risk Assessment ISO\/IEC 27001"],"prefix":"10.1145","author":[{"given":"Hamzeh","family":"AlKilani","sequence":"first","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]},{"given":"Abdallah","family":"Qusef","sequence":"additional","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Anak Agung\u00a0Bagus Arya\u00a0Wiradarma and Gusti\u00a0Made Arya\u00a0Sasmita. 2019. IT Risk Management Based on ISO 31000 and OWASP Framework using OSINT at the Information Gathering Stage (Case Study: X Company).International Journal of Computer Network & Information Security 11 12(2019).","DOI":"10.5815\/ijcnis.2019.12.03"},{"volume-title":"Information security risk management for ISO27001\/ISO27002","author":"Calder Alan","key":"e_1_3_2_1_2_1","unstructured":"Alan Calder and Steve\u00a0G Watkins. 2010. Information security risk management for ISO27001\/ISO27002. It Governance Ltd."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.17234\/INFUTURE.2019.23"},{"key":"e_1_3_2_1_4_1","unstructured":"Cyrus Farivar. 2019. How online cloud buckets are exposing private photos and other sensitive data. https:\/\/www.nbcnews.com\/tech\/internet\/how-online-cloud-buckets-are-exposing-private-photos-other-sensitive-n1105056"},{"key":"e_1_3_2_1_5_1","volume-title":"Euromot 2008 conference, nice, france.","author":"Fomin V","year":"2008","unstructured":"Vladislav\u00a0V Fomin, H Vries, and Yves Barlette. 2008. ISO\/IEC 27001 information systems security management standard: exploring the reasons for low adoption. In Euromot 2008 conference, nice, france."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585519"},{"key":"e_1_3_2_1_7_1","unstructured":"Shon Harris Allen Harper Chris Eagle Jonathan Ness and Michael Lester. 2005. Gray Hat."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2018.02.001"},{"key":"e_1_3_2_1_9_1","unstructured":"India. 2019. shiprocket. https:\/\/360.shiprocket.in"},{"key":"e_1_3_2_1_10_1","unstructured":"Nick Ismail. 2020. What is digital transformation in business: everything you need to know. https:\/\/www.information-age.com\/what-is-digital-transformation-in-business-123477523\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTC.2016.7821730"},{"key":"e_1_3_2_1_12_1","unstructured":"Zoral Limited. 2018. HappyGrumpy. https:\/\/www.happygrumpy.com\/about"},{"key":"e_1_3_2_1_13_1","unstructured":"Steve Micallef. 2005. About SpiderFoot. https:\/\/www.spiderfoot.net\/about\/"},{"volume-title":"The art of deception: Controlling the human element of security","author":"Mitnick D","key":"e_1_3_2_1_14_1","unstructured":"Kevin\u00a0D Mitnick and William\u00a0L Simon. 2003. The art of deception: Controlling the human element of security. John Wiley & Sons."},{"key":"e_1_3_2_1_15_1","unstructured":"The\u00a0Hacker News. 2020. A New Free Monitoring Tool to Measure Your Dark Web Exposure. https:\/\/thehackernews.com\/2020\/05\/dark-web-monitoring-tool.html"},{"key":"e_1_3_2_1_16_1","unstructured":"Anne Oikarinen. 2020. OPEN-SOURCE INTELLIGENCE \u2013 IT\u2019S INCREDIBLE WHAT YOU CAN FIND FROM PUBLIC SOURCES. https:\/\/www.nixu.com\/blog\/open-source-intelligence-its-incredible-what-you-can-find-public-sources"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1383519.1383526"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_19_1","volume-title":"Insider threat report","author":"Schulze Holger","year":"2018","unstructured":"Holger Schulze. 2018. Insider threat report 2018. https:\/\/www.veriato.com\/resources\/whitepapers\/insider-threat-report-2018"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2021.3.MOBMU-045"}],"event":{"name":"DATA'21: International Conference on Data Science, E-learning and Information Systems 2021","acronym":"DATA'21","location":"Ma'an Jordan"},"container-title":["International Conference on Data Science, E-learning and Information Systems 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460620.3460736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:30:43Z","timestamp":1757543443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":20,"alternative-id":["10.1145\/3460620.3460736","10.1145\/3460620"],"URL":"https:\/\/doi.org\/10.1145\/3460620.3460736","relation":{},"subject":[],"published":{"date-parts":[[2021,4,5]]},"assertion":[{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}