{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T10:30:58Z","timestamp":1743330658345},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2000,12]]},"DOI":"10.1109\/2.889092","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T18:17:23Z","timestamp":1030213043000},"page":"43-51","source":"Crossref","is-referenced-by-count":57,"title":["Are we forgetting the risks of information technology?"],"prefix":"10.1109","volume":"33","author":[{"given":"T.A.","family":"Longstaff","sequence":"first","affiliation":[]},{"given":"C.","family":"Chittister","sequence":"additional","affiliation":[]},{"given":"R.","family":"Pethia","sequence":"additional","affiliation":[]},{"given":"Y.Y.","family":"Haimes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibrz0432","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1981.4308759"},{"key":"bibrz0433","author":"haimes","year":"1998","journal-title":"Risk Modeling Assessment and Management"},{"key":"bibrz0431","author":"feynman","year":"1989","journal-title":"The Feynman Lectures on Physics"},{"key":"bibrz0436","author":"covey","year":"1992","journal-title":"Principle-Centered Leadership"},{"key":"bibrz0437","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00020"},{"key":"bibrz0434","doi-asserted-by":"publisher","DOI":"10.1109\/21.281419"},{"key":"bibrz04310","article-title":"information assurance via hierarchical holographic modeling","author":"lamm","year":"2000"},{"key":"bibrz0435","doi-asserted-by":"publisher","DOI":"10.1109\/3468.531900"},{"key":"bibrz04311","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"key":"bibrz04312","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1991.tb00589.x"},{"key":"bibrz0438","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1076-0342(1998)4:4(164)"},{"key":"bibrz0439","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1076-0342(1998)4:4(164)"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/2\/19227\/00889092.pdf?arnumber=889092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:04:39Z","timestamp":1638216279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/889092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12]]},"references-count":12,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/2.889092","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[2000,12]]}}}