{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:36:03Z","timestamp":1743060963100,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030971236"},{"type":"electronic","value":"9783030971243"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97124-3_22","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:16:56Z","timestamp":1648646216000},"page":"259-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Meta-modelling for\u00a0Ecosystems Security"],"prefix":"10.1007","author":[{"given":"Tristan","family":"Caulfield","sequence":"first","affiliation":[]},{"given":"Marius-Constantin","family":"Ilau","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"22_CR1","unstructured":"Ackermann, F., Eden, C., Cropper, S.: Getting started with cognitive mapping. Banxia Software (1992)"},{"key":"22_CR2","unstructured":"Andersen, D.F.: How differences in analytic paradigms can lead to differences in policy conclusions. In: Elements of the System Dynamics Method, pp. 61\u201375 (1980)"},{"issue":"7","key":"22_CR3","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1287\/mnsc.14.7.383","volume":"14","author":"HI Ansoff","year":"1968","unstructured":"Ansoff, H.I., Slevin, D.P.: An appreciation of industrial dynamics. Manag. Sci. 14(7), 383\u2013397 (1968)","journal-title":"Manag. Sci."},{"key":"22_CR4","unstructured":"Argyris, C.: Productive and counterproductive reasoning processes. The Executive Mind: New Insights on Managerial Thought and Action, Jossey-Bass, San Francisco, CA, pp. 25\u201358 (1983)"},{"issue":"1","key":"22_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1287\/inte.25.1.69","volume":"25","author":"BC Arntzen","year":"1995","unstructured":"Arntzen, B.C., Brown, G.G., Harrison, T.P., Trafton, L.L.: Global supply chain management at digital equipment corporation. Interfaces 25(1), 69\u201393 (1995)","journal-title":"Interfaces"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1002\/(SICI)1099-1727(199623)12:3<183::AID-SDR103>3.0.CO;2-4","volume":"12","author":"Y Barlas","year":"1996","unstructured":"Barlas, Y.: Formal aspects of model validity and validation in system dynamics. Syst. Dyn. Rev. 12, 183\u2013210 (1996)","journal-title":"Syst. Dyn. Rev."},{"issue":"2","key":"22_CR7","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1002\/sdr.4260060203","volume":"6","author":"Y Barlas","year":"1990","unstructured":"Barlas, Y., Carpenter, S.: Philosophical roots of model validation: two paradigms. Syst. Dyn. Rev. 6(2), 148\u2013166 (1990)","journal-title":"Syst. Dyn. Rev."},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behaviour in organisations. In: Proceedings of the 2008 New Security Paradigms Workshop, NSPW \u201908, pp. 47\u201358. Association for Computing Machinery, New York (2008). https:\/\/doi.org\/10.1145\/1595676.1595684","DOI":"10.1145\/1595676.1595684"},{"key":"22_CR9","unstructured":"Bell, J.A., Bell, J.F.: System dynamics and scientific method. In: Elements of the System Dynamics Method, pp. 3\u201322 (1980)"},{"issue":"1","key":"22_CR10","first-page":"61","volume":"14","author":"JA Bell","year":"1980","unstructured":"Bell, J.A., Senge, P.M.: Methods for enhancing refutability in system dynamics modeling. TIMS Stud. Manag. Sci. 14(1), 61\u201373 (1980)","journal-title":"TIMS Stud. Manag. Sci."},{"issue":"5","key":"22_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2015.97","volume":"13","author":"T Caulfield","year":"2015","unstructured":"Caulfield, T., Pym, D.: Improving security policy decisions with models. IEEE Secur. Priv. 13(5), 34\u201341 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR12","unstructured":"Caulfield, T., Fong, K., Pym, D.: Systems modelling for surge capacity in emergency medicine [working title] (2021, in preparation)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Caulfield, T., Pym, D.: Modelling and simulating systems security policy. In: SIMUTOOLS 2015: 8th EAI International Conference on Simulation Tools and Techniques, ICST (2015)","DOI":"10.4108\/eai.24-8-2015.2260765"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-07620-1_21","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"T Caulfield","year":"2014","unstructured":"Caulfield, T., Pym, D., Williams, J.: Compositional security modelling. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 233\u2013245. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_21"},{"issue":"4","key":"22_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.3233\/HSM-1989-8405","volume":"8","author":"PB Checkland","year":"1989","unstructured":"Checkland, P.B.: Soft systems methodology. Human Syst. Manag. 8(4), 273\u2013289 (1989)","journal-title":"Human Syst. Manag."},{"key":"22_CR16","first-page":"311","volume":"298","author":"RM Cyert","year":"1963","unstructured":"Cyert, R.M., Grunberg, E.: Assumption, prediction, and explanation in economics. Behav. Theory Firm 298, 311 (1963)","journal-title":"Behav. Theory Firm"},{"key":"22_CR17","unstructured":"Dhrymes, P.J., et al.: Criteria for evaluation of econometric models. In: Annals of Economic and Social Measurement, vol. 1, no. 3, pp. 291\u2013324. NBER (1972)"},{"issue":"1","key":"22_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0377-2217(88)90002-1","volume":"36","author":"C Eden","year":"1988","unstructured":"Eden, C.: Cognitive mapping. Eur. J. Oper. Res. 36(1), 1\u201313 (1988)","journal-title":"Eur. J. Oper. Res."},{"volume-title":"Systems Modelling: Theory and Practice","year":"2004","key":"22_CR19","unstructured":"Pidd, M. (ed.): Systems Modelling: Theory and Practice. Wiley, Hoboken (2004)"},{"issue":"10","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1057\/palgrave.jors.2600946","volume":"48","author":"JW Forrester","year":"1997","unstructured":"Forrester, J.W.: Industrial dynamics. J. Oper. Res. Soc. 48(10), 1037\u20131041 (1997)","journal-title":"J. Oper. Res. Soc."},{"key":"22_CR21","unstructured":"Friedman, M.: The methodology of positive economics. Essays in Positive Economics (1953)"},{"issue":"1","key":"22_CR22","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s13347-012-0082-7","volume":"26","author":"P Grim","year":"2013","unstructured":"Grim, P., Rescher, N.: How modeling can go wrong: some cautions and caveats on the use of models. Philos. Technol. 26(1), 75\u201380 (2013). https:\/\/doi.org\/10.1007\/s13347-012-0082-7","journal-title":"Philos. Technol."},{"issue":"1","key":"22_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1057\/jors.1996.4","volume":"47","author":"L Hendry","year":"1996","unstructured":"Hendry, L., Fok, K., Shek, K.: A cutting stock and scheduling problem in the copper industry. J. Oper. Res. Soc. 47(1), 38\u201347 (1996). https:\/\/doi.org\/10.1057\/jors.1996.4","journal-title":"J. Oper. Res. Soc."},{"key":"22_CR24","volume-title":"Large-Scale Models for Policy Evaluation","author":"PW House","year":"1977","unstructured":"House, P.W., McLeod, J., McLeod, J.: Large-Scale Models for Policy Evaluation. Wiley, New York (1977)"},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"Inglesant, P.G., Sasse, M.A.: The true cost of unusable password policies: password use in the wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201910, pp. 383\u2013392. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1753326.1753384","DOI":"10.1145\/1753326.1753384"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Jachim, P., Sharevski, F., Treebridge, P.: Trollhunter [evader]: automated detection [evasion] of twitter trolls during the COVID-19 pandemic. In: New Security Paradigms Workshop 2020, NSPW \u201920, pp. 59\u201375. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3442167.3442169","DOI":"10.1145\/3442167.3442169"},{"key":"22_CR27","doi-asserted-by":"publisher","unstructured":"Kaczmarczyck, F., et al.: Spotlight: malware lead generation at scale. In: Annual Computer Security Applications Conference, ACSAC \u201920, pp. 17\u201327. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3427228.3427273","DOI":"10.1145\/3427228.3427273"},{"key":"22_CR28","unstructured":"Kelle, U.: \u201cEmergence\u201d vs. \u201cforcing\u201d of empirical data? A crucial problem of \u201cgrounded theory\u201d reconsidered. Historical Social Research\/Historische Sozialforschung. Supplement, pp. 133\u2013156 (2007)"},{"key":"22_CR29","unstructured":"Kolb, D.A.: Problem management: learning from experience. The executive mind 28 (1983)"},{"key":"22_CR30","unstructured":"Korzybski, A.: Science and Sanity: An Introduction to Non-Aristotelian Systems and General Semantics. Institute of GS (1958)"},{"key":"22_CR31","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226458144.001.0001","volume-title":"The Structure of Scientific Revolutions","author":"TS Kuhn","year":"2012","unstructured":"Kuhn, T.S.: The Structure of Scientific Revolutions. University of Chicago press, Chicago (2012)"},{"issue":"1","key":"22_CR32","first-page":"39","volume":"4","author":"MS Martis","year":"2006","unstructured":"Martis, M.S.: Validation of simulation based models: a theoretical outlook. Electron. J. Bus. Res. Methods 4(1), 39\u201346 (2006)","journal-title":"Electron. J. Bus. Res. Methods"},{"key":"22_CR33","volume-title":"Probability","author":"J McColl","year":"1995","unstructured":"McColl, J.: Probability. Butterworth-Heinemann\/Elsevier, Oxford (1995)"},{"key":"22_CR34","doi-asserted-by":"publisher","unstructured":"Michael, N., Mink, J., Liu, J., Gaur, S., Hassan, W.U., Bates, A.: On the forensic validity of approximated audit logs. In: Annual Computer Security Applications Conference, ACSAC \u201920, pp. 189\u2013202. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3427228.3427272","DOI":"10.1145\/3427228.3427272"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Mingers, J.: Multimethodology. In: Wiley Encyclopedia of Operations Research and Management Science (2010)","DOI":"10.1002\/9780470400531.eorms0973"},{"issue":"12","key":"22_CR36","doi-asserted-by":"publisher","first-page":"B-635","DOI":"10.1287\/mnsc.15.12.B635","volume":"15","author":"II Mitroff","year":"1969","unstructured":"Mitroff, I.I.: Fundamental issues in the simulation of human behavior: a case in the strategy of behavioral science. Manag. Sci. 15(12), B-635 (1969)","journal-title":"Manag. Sci."},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Naylor, T.H., Finger, J.M., McKenney, J.L., Schrank, W.E., Holt, C.C.: Verification of computer simulation models. Manag. Sci. 14(2), B92\u2013B106 (1967). http:\/\/www.jstor.org\/stable\/2628207","DOI":"10.1287\/mnsc.14.2.B104"},{"issue":"332","key":"22_CR38","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.2307\/2230846","volume":"83","author":"WD Nordhaus","year":"1973","unstructured":"Nordhaus, W.D.: World dynamics: measurement without data. Econ. J. 83(332), 1156\u20131183 (1973)","journal-title":"Econ. J."},{"issue":"11","key":"22_CR39","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1057\/palgrave.jors.2600969","volume":"48","author":"M Pidd","year":"1997","unstructured":"Pidd, M.: Tools for thinking\u2013modelling in management science. J. Oper. Res. Soc. 48(11), 1150\u20131150 (1997)","journal-title":"J. Oper. Res. Soc."},{"key":"22_CR40","doi-asserted-by":"publisher","DOI":"10.4324\/9780203994627","volume-title":"The Logic of Scientific Discovery","author":"K Popper","year":"2005","unstructured":"Popper, K.: The Logic of Scientific Discovery. Routledge, London (2005)"},{"issue":"3","key":"22_CR41","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1080\/00213624.1988.11504801","volume":"22","author":"MJ Radzicki","year":"1988","unstructured":"Radzicki, M.J.: Institutional dynamics: an extension of the institutionalist approach to socioeconomic analysis. J. Econ. Issues 22(3), 633\u2013665 (1988)","journal-title":"J. Econ. Issues"},{"key":"22_CR42","doi-asserted-by":"publisher","unstructured":"Ralph, N., Birks, M., Chapman, Y.: The methodological dynamism of grounded theory. Int. J. Qual. Methods 14(4), 1609406915611576 (2015). https:\/\/doi.org\/10.1177\/1609406915611576","DOI":"10.1177\/1609406915611576"},{"issue":"11","key":"22_CR43","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1057\/palgrave.jors.2600961","volume":"48","author":"GP Richardson","year":"1997","unstructured":"Richardson, G.P., Pugh, A.L., III.: Introduction to system dynamics modeling with DYNAMO. J. Oper. Res. Soc. 48(11), 1146\u20131146 (1997)","journal-title":"J. Oper. Res. Soc."},{"key":"22_CR44","first-page":"209","volume":"14","author":"PM Senge","year":"1980","unstructured":"Senge, P.M., Forrester, J.W.: Tests for building confidence in system dynamics models. Syst. Dyn. TIMS Stud. Manag. Sci. 14, 209\u2013228 (1980)","journal-title":"Syst. Dyn. TIMS Stud. Manag. Sci."},{"issue":"2","key":"22_CR45","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0040-1625(85)90009-5","volume":"28","author":"JD Sterman","year":"1985","unstructured":"Sterman, J.D.: The growth of knowledge: testing a theory of scientific revolutions with a formal model. Technol. Forecast. Soc. Chang. 28(2), 93\u2013122 (1985)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"9","key":"22_CR46","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1057\/palgrave.jors.2601192","volume":"52","author":"L Thomas","year":"2001","unstructured":"Thomas, L., Banasik, J., Crook, J.: Recalibrating scorecards. J. Ope. Res. Soc. 52(9), 981\u2013988 (2001)","journal-title":"J. Ope. Res. Soc."},{"issue":"01","key":"22_CR47","doi-asserted-by":"publisher","first-page":"69","DOI":"10.4236\/jsea.2011.41008","volume":"4","author":"AS White","year":"2011","unstructured":"White, A.S., et al.: Qualitative system dynamics as a tool in accessible design. J. Softw. Eng. Appl. 4(01), 69 (2011)","journal-title":"J. Softw. Eng. Appl."},{"key":"22_CR48","doi-asserted-by":"publisher","unstructured":"Xiao, Y., Shi, S., Zhang, N., Lou, W., Hou, Y.T.: Session key distribution made practical for CAN and CAN-FD message authentication. In: Annual Computer Security Applications Conference, ACSAC \u201920, pp. 681\u2013693. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3427228.3427278","DOI":"10.1145\/3427228.3427278"},{"key":"22_CR49","doi-asserted-by":"publisher","unstructured":"Yeo, G.T., Pak, J.Y., Yang, Z.: Analysis of dynamic effects on seaports adopting port security policy. Transp. Res. Part A: Pol. Pract. 49, 285\u2013301 (2013). https:\/\/doi.org\/10.1016\/j.tra.2013.01.039. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0965856413000463","DOI":"10.1016\/j.tra.2013.01.039"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97124-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:48:01Z","timestamp":1648648081000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97124-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030971236","9783030971243"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97124-3_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/simutools.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}