{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2024,6,29]],“日期时间”:“2024-06-29T22:51:39Z”,“时间戳”:1719701499712},“引用计数”:26,“发布者”:“IEEE”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“published-print“:{”日期部分“:[2009]]},”DOI“:“10.1109\/icons.2009.8”,“type”:“proceedings-article”,“created”:{“date-parts”:[[2009,5,27]],“date-time”:“2009-05-27T15:20:11Z”,“timestamp”:1243437611000},“source”:”Crossref“,“is-referenced-by-count”:18,“title”:[“基于Ontology-Based Decision Support for Information Security Risk Management”],“prefix”:“10.1107”,“author”:[{“given”::“Andreas”,“family”:“Ekelhart”,“sequence”:“first”,“affiliation”:[]},{“given”:“Stefan”,“family”:“Fenz”,“序列”:“additional”,“从属关系”:[]},}“giving”:“Thomas”,“家族”:“Neubauer”,“sequence”:“additionable”,“atfiliation“:[]2]”,“member”:“263”,“reference”:[{“key”:”19“,“doi-asserted-by”:”publisher“,“doi”:“10.1016\/016 7-4048(91)90051-E“},{“key”:“17”,“doi-asserted-by”:“publisher”,“DOI”:“10.1145\/1005817.1005828”},{“key”:“18”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1145\/133031330325“},}“key”:”15“,”DOI-assert-by“:”publisher“,”DOI“:”10.1016\/S0167-4048(98)80010-2“}274“},{”键“:”13“,”卷“:”65“,”年份“:”1975“,”新闻标题“:“自动数据处理风险分析指南”},{“key”:“14”,“doi-asserted-by”:“crossref”,“首页”:“129”,”doi“:”10.1080\/0742122.1991.11517914“,”article-title“:”信息技术风险分析“,”volume“:”8“,”author“:”rainer“,”year“1991”,“journal-title”:“journal of Management information Systems”}“,{”key“:“11”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/S1062-9769(99)80089-1”},{“key”:“12”,“author”:“stallinger”,“year”:“2007”,“journal-title”:“IT-Governance im Kontext Risikomanagement”}:“10.21236\/ADA634134”},{“键”:“20”,“author”:“stoneburner”,“year”:“2002”,“journal-title”:“Information Technology Systems风险管理指南”},{“key”:“22”,“年份”:“2007”,“journal-titel”:“ISO\/IEC\”27005 2007信息技术-安全技术-信息安全风险管理“”}、{“密钥”:“23”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1328057.1328067”}和{“key”:“24”,“文章标题”:“多目标下iso 27001控件的交互式选择”,“作者”:“neubauer”,“年份”:“0”,“期刊标题”:“2008年第23届国际信息安全会议论文集”},{“密钥”:“25”,“doi断言”:“crossref”,“作者”:“pellier”,“年份”:“2005”,“期刊标题”:“Information Security Risk Analysis 2nd Ed”,“DOI”:“10.1201\/9781420031195”},{“key”:“26”,“DOI-asserted-by”:“crossref”,《DOI》:“10.1109\/HICSS.2007.283”,“article-title”:“交互式决策支持多目标cots选择”,“author”:“neubauer”,“year”:“2007”,“journal title”:“第40届夏威夷国际系统科学年会论文集”},{“key”:“3”,“year”:“2004”,“期刊标题”:“IT Grundschutz Manual”},{“key”:“2”,“doi断言”:“publisher”,“doi”:“10.1109\/MSSCP.2003.1176998”},{“key”:“10”,“文章标题”:“财务计量不足”,“volume”:“81”,“author”:“ittner”,“year”:“2003”,“journal-title”:“Havard business review”},{“key”:“1”,“author”:“gordon”,“year”:“2006”,“johnal-title:“CSI\/FFBI Computer Crime and Security Survey”}、{“key”:”7“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/162124.162127“},”{“密钥”:“6”,“doi-assert-by”:“crossref”,“首页”:“36”,“doi”:“10.1109\/MSP。2007.11“,”文章标题“:“信息安全受控吗?:调查信息安全管理质量”,“卷”:“5”,“作者”:“面包师”,“年份”:“2007年”,“新闻标题”:“IEEE安全与隐私”},{“密钥”:“五”,“doi-asserted-by”:“出版商”,“doi”:“10.2307\/249185”}:“Besoins et Identification des Objectives de Scurit(EBIOS)-Section 2-Approach”},{“key”:“9”,“doi asserted by”:“publisher”,“doi”:“10.1145\\1290958.1290969”},{“key”:“8”,“year”:“2005”,“journal title”:“ISO/IEC\”27001 2005 Information Technology-Security Techniques-Information Security Management Systems-Requirements”“}],“event”:{“name”:“2009年第四届国际系统大会”,“location”:“Gosier,Guadeloupe,France”,“start”:{“date-parts”:[[2009,3,1]]},“end”:}“date-parts”:[[209,3,6]]}},”container-title“:[”2009年第四季国际系统大会“],”original-title”:[],“link”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx5\/4976299\/4976322.pdf?arnumber=4976322”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[[2020,10,14],“date-time”:”2020-10-14T15:50:14Z“,“timestamp”:1600690614000},“score”:1,“资源“:{“主”:{”URL“:“https:\/\/ieeexplore.iee.org\/document\/4976322”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2009]]},”引用计数“:26,”URL“:”http://\/dx.doi.org\/10.109\/icons.2009.8“,”关系“:{}