{“id”:“https://openalex.org/W2104315197“,”doi“:”https://doi.org/10.1007/978-3-540-30585-9_56“,”title“:”A Security Risk Analysis Model for Information Systems“,”display_name“:”I Security Rights Analysis Models for Information System“,”publication_year“:2005,”publiation_date“:”2005-01-01“,”ids“:{”openalex“:”https://openalex.org/W2104315197“,”doi“:”https://doi.org/10.1007/978-3-540-30585-9_56“,”mag“:”2104315197“},”language“:”en“,”primary_location“:{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1007/978-3-540-30585-9_56“,”pdf_url“:空,”源“:{”id“:”https://openalex.org/S106296714“,”display_name“:”计算机科学讲义“,”issn_l“:”0302-9743“,”isn“:[”0302-7743“、”1611-3349“],”is_oa“:false、”is_in_doaj“:false、”is_core“:true、”host_organization“:”https://openalex.org/P4310318900“,”“host_organization_name”:“Springer Science+Business Media”,“host_organization_lineage”:[“https://openalex.org/P431031965","https://openalex.org/P4310318900“],”host_organization_lineage_names“:[”Springer Nature“,”Springer-Science+Business Media“],“type”:“book-series”},“license”:null,“licence_id”:nul,“version”:null,“is_accepted”:false,“is_published”:false},”type“:”book-chapter“,”type_crossref“:“book-chapter”,”indexed_in“:[“crossref”],”open_access“:{”is_oa“:false”“,”oa_url“:空,”any_repository_has_fulltext“:false},”作者身份“:[{”作者位置“:”第一个“,”作者“:{”id“:”https://openalex.org/A5056381991“,”display_name“:”Hoh Peter In“,”orcid“:”https://orcid.org/0000-0003-4192-4122},“机构”:[{“id”:https://openalex.org/I197347611“,”display_name“:”韩国大学“,”ror“:”https://ror.org/047dqcg40“,”country_code“:”KR“,”type“:“教育”,”世系“:[”https://openalex.org/I197347611“]}],”国家“:[”KR“],”is_corresponding“:false,”raw_author_name“:”Hoh Peter In“,”raw _affiliation_strings“:[“韩国大学计算机科学与工程系,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea”],“afliations”:[{“raw_affilition_string”:“韩国大学计算机科学与工程系,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea“,”institution_ids“:[”https://openalex.org/I197347611“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5061277148“,”display_name“:”Young\u2010Gab Kim“,”orcid“:”https://orcid.org/0000-0001-985-8808},“机构”:[{“id”:https://openalex.org/I197347611“,”display_name“:”韩国大学“,”ror“:”https://ror.org/047dqcg40“,”country_code“:”KR“,”type“:“教育”,”世系“:[”https://openalex.org/I197347611“]}],”国家“:[”KR“],”is_corresponding“:false,”raw_author_name“:”Young-Gab Kim“,”raw _affiliation_strings“:[“韩国大学计算机科学与工程系,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea”],“afliations”:[{“raw_affilition_string”:“韩国大学计算机科学与工程系,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea“,”institution_ids“:[”https://openalex.org/I197347611“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5064167751“,”display_name“:”Taek Lee“,”orcid“:”https://orcid.org/0000-0003-2277-8211},“机构”:[{“id”:https://openalex.org/I197347611“,”display_name“:”韩国大学“,”ror“:”https://ror.org/047dqcg40“,”country_code“:”KR“,”type“:“教育”,”世系“:[”https://openalex.org/I197347611“]}],”国家“:[”KR“],”is_corresponding“:false,”raw_author_name“:”Taek Lee“,”raw_affiliation_strings“:[“韩国大学计算机科学与工程系,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea”],“afliations”:[{“raw_affilition_string”:“韩国大学计算机科学与工程系,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea“,”institution_ids“:[”https://openalex.org/I197347611“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5011705778“,”display_name“:”嫦娥月“,”兽人“:”https://orcid.org/0000-0003-2200-0020},“机构”:[{“id”:https://openalex.org/I197347611“,”display_name“:”韩国大学“,”ror“:”https://ror.org/047dqcg40“,”country_code“:”KR“,”type“:“教育”,”世系“:[”https://openalex.org/I197347611“]}],”国家“:[”KR“],”is_corresponding“:false,”raw_author_name“:”Chang-Joo Moon“,”raw _ afiliation_strings“:[“韩国大学信息安全技术中心,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea”],“afliations”:[{“raw_affiliation_strong”:“韩国大学信息安全技术中心,1,5-ga,Anam-dong,SungBuk-gu,136-701,Seoul,Korea“,”institution_ids“:[”https://openalex.org/I197347611“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A506600276“,”display_name“:”Yoonjung Jung“,”orcid“:null},”institutions“:[],”countries“:[”KR“],”is_corresponding“:false,”raw_author_name“:”Yoon Jung“,“raw_affiliation_strings”:[“国家安全研究所,62-1 HwaAm-dong,YuSeong-gu,305-718,Daejeon,Korea”],“afliations”:[{”raw_affiliation_string“:”国家安全研究所,62-1 HwaAm-dong,YuSeong-gu,305-718,Daejeon,Korea“,“institution_ids”:[]}]},{“author_position”:“last”,“author”:{“id”:“https://openalex.org/A5009028758“,”display_name“:”In Jung Kim“,”orcid“:”https://orcid.org/0000-0001-5797-8235“},”机构“:[],”国家“:[”KR“],”is_corresponding“:false,”raw_author_name“:”Injung Kim“,”raw _ afiliation_strings“:[“国家安全研究所,62-1 HwaAm-dong,YuSeong-gu,305-718,Daejeon,Korea”],”从属关系“:[{”raw_ afiliation _string“:”国家安全研究所,62-1 HwaAm-dong,YuSeong-gu,305-718,大田,韩国:null,“fwci“:3.246,”has_fulltext“:true,”fulltext_origin“:”ngrams“,”cited_by_count“:15,”ciped_by_percentile_year“:{”min“:86,”max“:87},”biblio“:{volume“:null,”issue“:nully,”first_page“:”505“,”last_page“:“513”},“is_retracted”:false,“is_paratext”:false,“primary_topic”:{“id”:“https://openalex.org/T10734“,”display_name“:”信息安全策略合规性和意识“,”score“:0.9928,”subfield“:{”id“:”https://openalex.org/subfields/1710“,”display_name“:”Information Systems“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T10734“,”“display_name”:“信息安全策略合规性和意识”,“score”:0.9928,“subfield”:{“id”:“https://openalex.org/subfields/1710“,”display_name“:”Information Systems“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T12423“,”display_name“:”软件可靠性评估与预测“,”score“:0.9534,”subfield“:{”id“:”https://openalex.org/subfields/1712“,”display_name“:”软件“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T10260“,”“display_name”:“软件工程实证研究”,“score”:0.9216,“subfield”:{“id”:“https://openalex.org/subfields/1710“,”display_name“:”Information Systems“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”Physical Sciences“}}],”keywords“:[{”id“:”https://openalex.org/keywords/software-reliability建模“,”display_name“:”软件可靠性建模“,”score“:0.548409},{”id“:”https://openalex.org/keywords/information-security网站“,”display_name“:”信息安全“,”score“:0.529551},{”id“:”https://openalex.org/keywords/风险管理“,”display_name“:”风险管理“,”score“:0.503351}],”concepts“:[{”id“:”https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198“,”display_name“:”计算机科学“,”level“:0,”score“:0.81761134},{”id“:”https://openalex.org/C76178495,“wikidata”:https://www.wikidata.org/wiki/Q4808784“,”display_name“:”资产(计算机安全)“,”级别“:2,”分数“:0.7049895},{”id“:”https://openalex.org/C112930515,“wikidata”:https://www.wikidata.org/wiki/Q4389547“,”display_name“:”风险分析(工程)“,”level“:1,”score“:0.69552386},{”id“:”https://openalex.org/C95713431,“wikidata”:https://www.wikidata.org/wiki/Q631425“,”display_name“:”漏洞(计算)“,”level“:2,”score“:0.66278005},{”id“:”https://openalex.org/C527648132,“wikidata”:https://www.wikidata.org/wiki/Q189900“,”display_name“:”信息安全“,”level“:2,”score“:0.6444795},{”id“:”https://openalex.org/C148976360,“wikidata”:https://www.wikidata.org/wiki/Q1662500“,”display_name“:”信息安全管理“,”level“:5,”score“:0.63347536},{”id“:”https://openalex.org/C83163435,“wikidata”:https://www.wikidata.org/wiki/Q3954104“,”display_name“:”安全管理“,”level“:2,”score“:0.5901053},{”id“:”https://openalex.org/C103377522,“wikidata”:https://www.wikidata.org/wiki/Q3493999“,”display_name“:”安全信息和事件管理“,”level“:4,”score“:0.56136817},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.5531972},{”id“:”https://openalex.org/C32896092,“wikidata”:https://www.wikidata.org/wiki/Q189447“,”display_name“:”风险管理“,”level“:2,”score“:0.53017974},{”id“:”https://openalex.org/C95609273,“wikidata”:https://www.wikidata.org/wiki/Q5975208“,”display_name“:”IT风险管理“,”level“:3,”score“:0.48561683},{”id“:”https://openalex.org/C17520342,“wikidata”:https://www.wikidata.org/wiki/Q7797190“,”display_name“:”威胁“,”等级“:5,”分数“:0.46675634},{”id“:”https://openalex.org/C168785665,“wikidata”:https://www.wikidata.org/wiki/Q5428720“,”display_name“:”信息风险因素分析“,”level“:5,”score“:0.46366954},{”id“:”https://openalex.org/C12174686,“wikidata”:https://www.wikidata.org/wiki/Q1058438“,”display_name“:”风险评估“,”级别“:2,”分数“:0.39709014},{”id“:”https://openalex.org/C180198813,“wikidata”:https://www.wikidata.org/wiki/Q121182“,”display_name“:”信息系统“,”level“:2,”score“:0.38562837},{”id“:”https://openalex.org/C81146079,“wikidata”:https://www.wikidata.org/wiki/Q7336283“,”display_name“:”风险管理信息系统“,”level“:4,”score“:0.36250803},{”id“:”https://openalex.org/C2989905,“wikidata”:https://www.wikidata.org/wiki/Q7445066“,”display_name“:”Security service“,”level“:3,”score“:0.28165773},{”id“:”https://openalex.org/C184842701,“wikidata”:https://www.wikidata.org/wiki/Q370563“,”display_name“:”云计算安全“,”level“:3,”score“:0.25360605},{”id“:”https://openalex.org/C29848774,“wikidata”:https://www.wikidata.org/wiki/Q61905“,”display_name“:”管理信息系统“,”level“:3,”score“:0.22485095},{”id“:”https://openalex.org/C144133560,“wikidata”:https://www.wikidata.org/wiki/Q4830453“,”display_name“:”Business“,”level“:0,”score“:0.11833346},{”id“:”https://openalex.org/C117110713,“wikidata”:https://www.wikidata.org/wiki/Q3394676“,”display_name“:”网络安全策略“,”level“:4,”score“:0.11173043},{”id“:”https://openalex.org/C10138342,“wikidata”:https://www.wikidata.org/wiki/Q43015“,”display_name“:”Finance“,”level“:1,”score“:0.07274687},{”id“:”https://openalex.org/C79974875,“wikidata”:https://www.wikidata.org/wiki/Q483639“,”display_name“:”云计算“,”level“:2,”score“:0.0},{”id“:”https://openalex.org/C127413603,“wikidata”:https://www.wikidata.org/wiki/Q11023“,”display_name“:”工程“,”级别“:0,”分数“:0.0},{”id“:”https://openalex.org/C119599485,“wikidata”:https://www.wikidata.org/wiki/Q43035“,”display_name“:”电气工程“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C111919701,“wikidata”:https://www.wikidata.org/wiki/Q9135“,”display_name“:”操作系统“,”level“:1,”score“:0.0}],”mesh“:[],”locations_count“:1.”locations“:[{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1007/978-3-540-30585-9_56“,”pdf_url“:空,”源“:{”id“:”https://openalex.org/S106296714“,”display_name“:”计算机科学讲义“,”issn_l“:”0302-9743“,”isn“:[”0302-7743“、”1611-3349“],”is_oa“:false、”is_in_doaj“:false、”is_core“:true、”host_organization“:”https://openalex.org/P4310318900“,”“host_organization_name”:“Springer Science+Business Media”,“host_organization_lineage”:[“https://openalex.org/P431031965","https://openalex.org/P4310318900“],”host_organization_lineage_names“:[”Springer Nature“,”Springer-Science+Business Media“],“type”:“book-series”},“license”:null,“licence_id”:nul,“version”:nuld,“is_accepted”:false,“is_published”:false}],“best_oa_location”:null,“sustainable_development_goals”:[{“id”:”https://metadata.un.org/sdg/16“,”score“:0.46,”display_name“:”Peace,justice,and strong institutions“}],”grants“:[],”datasets“:【】,”versions“:【],”referenced_works_count“:2,”referrenced_works“:[”https://openalex.org/W2369295637","https://openalex.org/W4298421370“],”related_works“:[”https://openalex.org/W4205382715","https://openalex.org/W3003573127网址","https://openalex.org/W2527211267","https://openalex.org/W2496445682","https://openalex.org/W2493753605","https://openalex.org/W2358390340","https://openalex.org/W2132746796","https://openalex.org/W2098014028","https://openalex.org/W201042542","https://openalex.org/W1241755873“],”ngrams_url“:”https://api.openalex.org/works/W2104315197/ngrams网站“,”abstract_inverted_index“:{”Information“:[0],”security“:[1,23,65],”is“:[2,16,46,61],”a“:[3],”critical“:[4],”technique“:[5],”for“:[6],”an“:[7,40],”organization“:[8,32],”to“:[9,20,30,63,71],”生存“:[10],”in“:[11],”these“:[12],”days.“:[13],”然而,“:[14],”有”:[15],“没有”:[17],“综合”:[18],“模型”:[19,45],“评估”:[21],“the”:[22,73],“风险:[24,43,57,66],“定量”:[25],“和”:[26,34,51,68],“优化”:[27,69],“其”:[28],“资源”:[29,70],“保护”:[31],“信息”:[33],“资产”:[35],“有效”。“:[36],“In”:[37],“this”:[38],“paper”:[39],“integrated”:[41],“quantitative”:【42】,“analysis”:【44】,“proposed”:【47】,“including”:【48】,“asset”:【49】,“threat”:【50】,“visibility”:【52】,“evaluations”:【53】,“by”:【54】,“adapting”:[55】,“software”:【56】,“management”:【58】,“technologies”。“:[59],“It”:[60],“expected”:[62],“analyze”:[64],“effectively”:[67],“release”:[72],“risk”。“:[74]},”cited_by_api_url“:”https://api.openalex.org/works?filter=cites:W2104315197“,”counts_by_year“:[{”year“:2020,”cited_by_count“:1},{”year“:2019,”cited_by_count”:1},{“year”:2018,”citecd_by_count“:1},”{“year”:2015,”citesd_by_count“:1},“year“:2014,”citted_by-count“:2}],”updated_date“:”2024-06-29T01:27:08.976524“,”created_dated“:”2016-06-24“}