{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:13:52Z","timestamp":1765268032604,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","funder":[{"name":"NWO","award":["KICH1.VE01.20.004"],"award-info":[{"award-number":["KICH1.VE01.20.004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,10]]},"DOI":"10.1145\/3731443.3771351","type":"proceedings-article","created":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:02:51Z","timestamp":1765267371000},"page":"82-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TIDO: The Threat Intelligence Decision Ontology"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7843-6513","authenticated-orcid":false,"given":"Ritten","family":"Roothaert","sequence":"first","affiliation":[{"name":"Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, Noord Holland, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3282-1597","authenticated-orcid":false,"given":"Stefan","family":"Schlobach","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, Noord Holland, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1091-8486","authenticated-orcid":false,"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Noord Holland, Netherlands and Universit\u00e0 degli Studi di Trento, Trento, Trentino-Alto Adige, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2146-4803","authenticated-orcid":false,"given":"Lise","family":"Stork","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Amsterdam, Amsterdam, Noord Holland, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2025,12,10]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2017. Wet Op de Inlichtingen- En Veiligheidsdiensten 2017."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-385965-5.10014-7"},{"key":"e_1_3_3_2_4_2","volume-title":"Interaction Process Analysis; a Method for the Study of Small Groups.","author":"Bales R.\u00a0F.","year":"1950","unstructured":"R.\u00a0F. Bales. 1950. Interaction Process Analysis; a Method for the Study of Small Groups."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"R.\u00a0F. Bales and F.\u00a0L. Strodtbeck. 1951. Phases in Group Problem-Solving.46 4 (1951) 485\u2013495.","DOI":"10.1037\/h0059886"},{"key":"e_1_3_3_2_6_2","volume-title":"ISWC 2010","author":"Blomqvist E.","year":"2010","unstructured":"E. Blomqvist, M. Ceruti, J. Waters, and D. McGarry. 2010. A Decision-making Format for the Semantic Web. In ISWC 2010. The 2nd Workshop on Ontology Patterns (WOP 2010)."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2023-105"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.36334\/MODSIM.2017.C2.Car"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98379-021"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06981-920"},{"key":"e_1_3_3_2_11_2","unstructured":"D.\u00a0L. Costa M.\u00a0J. Albrethsen M.\u00a0L. Collins S.\u00a0J. Perl G.\u00a0J. Silowash and D.\u00a0L. Spooner. 2016. An Insider Threat Indicator Ontology. CERT Center and Carnegie Mellon University Software Engineering Institute (2016)."},{"key":"e_1_3_3_2_12_2","unstructured":"P. Costa A. Jousselme K.\u00a0B. Laskey E. Blasch V. Dragos and J. Ziegler. 2018. URREF: Uncertainty Representation and Reasoning Evaluation Framework for Information Fusion. (2018)."},{"key":"e_1_3_3_2_13_2","unstructured":"M. Dekkers E. Stani B. Wyns and F. Barth\u00e9lemy. 2017. D02.01: Specification of the Process and Methodology to Develop the eProcurement Ontology with Initial Draft of the eProcurement Ontology for 3 Use Cases."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1201\/b12461"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68204-49"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"R. Goel A. Kumar and J. Haddow. 2020. PRISM: A Strategic Decision Framework for Cybersecurity Risk Assessment. Information & Computer Security (2020). 10.1108\/ICS-11-2018-0131","DOI":"10.1108\/ICS-11-2018-0131"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70625-211"},{"key":"e_1_3_3_2_18_2","unstructured":"R. Guizzardi B.\u00a0G. Carneiro D. Porello and G. Guizzardi. 2020. A Core Ontology on Decision Making. (2020)."},{"key":"e_1_3_3_2_19_2","volume-title":"VLDB","author":"G\u00fcting R.\u00a0H.","year":"1994","unstructured":"R.\u00a0H. G\u00fcting. 1994. GraphDB: Modeling and Querying Graphs in Databases. In VLDB, Vol.\u00a094."},{"key":"e_1_3_3_2_20_2","unstructured":"Bret Jordan Rich Piazza and Trey Darley. 2025. STIX Version 2.1. https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/stix-v2.1.html"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-77792-98"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203810088"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16373-98"},{"key":"e_1_3_3_2_24_2","unstructured":"T. Lebo S. Sahoo D. McGuinness K. Belhajjame J. Cheney D. Corsar D. Garijo S. Soiland-Reyes S. Zednik and J. Zhao. 2013. PROV-O: The PROV Ontology."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119636113.ch6"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2003.177494"},{"key":"e_1_3_3_2_27_2","unstructured":"S. Matsumoto. 2019. PR-OWL DECISION: A Framework for decision making with probabilistic ontologies. Ph.\u00a0D. Dissertation. George Mason University."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003106449-3"},{"key":"e_1_3_3_2_29_2","unstructured":"N.\u00a0F. Noy and D.\u00a0L. McGuinness. 2001. Ontology Development 101: A Guide to Creating Your First Ontology."},{"key":"e_1_3_3_2_30_2","unstructured":"Object Management Group. 2014. Business Process Model and Notation Specification."},{"key":"e_1_3_3_2_31_2","unstructured":"Object Management Group. 2023. Decision Model and Notation Specification."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"M. Poveda-Villal\u00f3n A. Fern\u00e1ndez-Izquierdo M. Fern\u00e1ndez-L\u00f3pez and R. Garc\u00eda-Castro. 2022. LOT: An Industrial Oriented Ontology Engineering Framework. EAAI (2022). 10.1016\/j.engappai.2022.104755","DOI":"10.1016\/j.engappai.2022.104755"},{"key":"e_1_3_3_2_33_2","first-page":"83","volume-title":"Proc. Works. on Ontology Patterns","author":"Presutti V.","year":"2009","unstructured":"V. Presutti, E. Daga, A. Gangemi, and E. Blomqvist. 2009. eXtreme Design with Content Ontology Design Patterns. In Proc. Works. on Ontology Patterns. 83\u201397."},{"key":"e_1_3_3_2_34_2","volume-title":"International Conference on Machine Learning","author":"Radford A.","year":"2023","unstructured":"A. Radford, J.\u00a0W. Kim, T. Xu, G. Brockman, C. McLeavey, and I. Sutskever. 2023. Robust Speech Recognition via Large-Scale Weak Supervision. In International Conference on Machine Learning."},{"key":"e_1_3_3_2_35_2","unstructured":"L. Rasker. 2021. De Dienst Podcast. https:\/\/podcastluisteren.nl\/pod\/De-Dienst"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"R. Roothaert. 2025. Results Domain Expert Focus Group 15-11-2024. 10.5281\/ZENODO.15400461","DOI":"10.5281\/ZENODO.15400461"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"R. Roothaert. 2025. Supplementary Materials Used for the Development of the TIDO Ontology. 10.5281\/ZENODO.15400486","DOI":"10.5281\/ZENODO.15400486"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593235"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00847-511"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"C.\u00a0C. Schermuly and W. Scholl. 2012. The Discussion Coding System (DCS)\u2014A New Instrument for Analyzing Communication Processes. Communication Methods and Measures (Jan. 2012). 10.1080\/19312458.2011.651346","DOI":"10.1080\/19312458.2011.651346"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"P. Thagard. 1989. Explanatory Coherence. Behavioral and Brain Sciences (1989). 10.1017\/S0140525X00057046","DOI":"10.1017\/S0140525X00057046"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57452-84"}],"event":{"name":"K-CAP '25: Knowledge Capture Conference 2025","location":"Dayton OH USA","acronym":"K-CAP '25","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the Knowledge Capture Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731443.3771351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:05:36Z","timestamp":1765267536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731443.3771351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,10]]},"references-count":41,"alternative-id":["10.1145\/3731443.3771351","10.1145\/3731443"],"URL":"https:\/\/doi.org\/10.1145\/3731443.3771351","relation":{},"subject":[],"published":{"date-parts":[[2025,12,10]]},"assertion":[{"value":"2025-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}