{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:25:06Z","timestamp":1725809106786},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116280"},{"type":"electronic","value":"9783319116297"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11629-7_32","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T05:24:01Z","timestamp":1415942641000},"page":"215-221","source":"Crossref","is-referenced-by-count":1,"title":["Security Metrics: Relevance in Securing Educational Institutions"],"prefix":"10.1007","author":[{"given":"Pooja","family":"Tripathi","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Ward, J., Peppard, J.: Strategic Planning for Information System, 3rd edn. John Wiley and Sans Ltd., Chichestor (2002)"},{"key":"32_CR2","unstructured":"http:\/\/net.edu0cause .edu\/ir\/library\/pdf\/eqmo337.pdf"},{"key":"32_CR3","unstructured":"Tonich, D.: An Overview of University Performance metrics and Rankings,12, http:\/\/www.My Universty.Australlia.org"},{"key":"32_CR4","unstructured":"Payne, S.C.: A guide to security metrics. SANS Institue (2006)"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Jafari, S., Metenzi, F., Fitzpatrick, R., Shea, B.O.: Security metrics for e-health care Information Systems.A Domain soecific Metrics Approach. IJDS\u00a01(4) (December 2010)","DOI":"10.20533\/ijds.2040.2570.2010.0029"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Cuilhong, W.: 2010 2nd International Conference on The problems in Campus network information security and its solutions in industrial and information system (IIS) (2010)","DOI":"10.1109\/INDUSIS.2010.5565862"},{"key":"32_CR7","unstructured":"AI-Akhras, M.A.: Wireless Network Security Implementation in Universities. In: 2nd Information and Communication Technologies, ICTTA 2006 (2006)"},{"key":"32_CR8","unstructured":"Zhu, J., Liu, L.: University network security risk assesment based on fuzzy analytic hierarchy process. In: 2010 International Conference on Computer Application and System Modelling, ICCASM (2010)"},{"key":"32_CR9","unstructured":"Kvavik, R.B.: Information Techonology Security: Goverance, Strategy, and Practice in higher education. Educause Centre for Applied Research (October 2004)"},{"key":"32_CR10","unstructured":"Rathbun, D., Homsher, L.: Gathering Security Metrics and Repairing the Rewards. SANs Institute (2009)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Beres, Y., Mont, M.C., Griffin, J., Shin, S.: Using Security metrics Coupled with Predictive Modeling and Simulation to assess Security Process. Hewlett-Packard Development Company (2009)","DOI":"10.1109\/ESEM.2009.5314213"},{"key":"32_CR12","unstructured":"Kyobe, M.: Towards a frame work to guide compliance with IS Security policies and Regulations in a university. IEEE (2010) 978-1-4244-5494-5"},{"key":"32_CR13","unstructured":"McCoy, J.: Are we ready for a chief Information Security Officers (2005), \n \n http:\/\/www.docstoc.com\/docs\/18364711\/Are-we-ready-for-a-chief"},{"key":"32_CR14","unstructured":"Sckimkowitch, S.E.: Key components of information Security Metric Program plan (2009), http\/\/webcache.googleusercontent.com\/search?q=cache%3AJolzW7iux3"},{"key":"32_CR15","unstructured":"Lane, T.: Information Security management in Australian Universities: An Exploratory analysis (2007), \n \n eprints.qut.edu.au\/16486\/\/"},{"key":"32_CR16","unstructured":"Jones, H., Soltern, J.: Facebook:Threats to privacy (2005), \n \n http:\/\/swiss.ai.mit.edu\/6095\/student-papers\/fall05-papers\/facebook.pdf"},{"key":"32_CR17","unstructured":"Stango, A., Prasad, N.R., Kyriazanos, D.M.: A Threat Analysis Methodlogy for Security Evalution and Enhacement Planning."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Jonsson, E.: Towards an integrated conceptual model of security and dependability. In: The First International Conference on Availability, Reliability and Security, ARES 2006, p. 8 (April 2006)","DOI":"10.1109\/ARES.2006.138"},{"key":"32_CR19","unstructured":"Almgren, M., Fu, Z., Jonsson, E., Kleberger, P., Larsson, A., Moradi, F., Oovsson, T., Papatriantafilou, M., Pirzadeh, L., Tsigas, P.: Mapping Systems SecurityReasearch at Chalmers."},{"key":"32_CR20","unstructured":"Cole, E.: Network Security Bible, p. 61"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Signal Processing and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11629-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T10:55:22Z","timestamp":1559040922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11629-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116280","9783319116297"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11629-7_32","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]}}}