{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:40:23Z","timestamp":1729662023153,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/icsmc.2012.6378164","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T16:52:04Z","timestamp":1355849524000},"page":"2751-2755","source":"Crossref","is-referenced-by-count":2,"title":["Approximation method for chance-constrained programming of social consensus formation concerning IT risk countermeasure"],"prefix":"10.1109","author":[{"given":"Masaki","family":"Samejima","sequence":"first","affiliation":[]},{"given":"Ryoichi","family":"Sasaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"284","article-title":"Application of \"multiple risk communicator\" to the personal information leakage problem","volume":"45","author":"taniyama","year":"2008","journal-title":"Proc Of World Academy of Science Engineering and Technology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-009-9523-6"},{"journal-title":"Convexity","year":"1995","author":"webstar","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2005.1571219"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1111\/1539-6924.00304"},{"journal-title":"Computer Security Art and Science","year":"2003","author":"bishop","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-003-0499-y"},{"journal-title":"Fault Tree Analysis for Reliability and Risk Assessment","year":"1998","author":"andrews","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4156\/ijipm.vol2.issue2.6","article-title":"Proposal for a social-mrc: Social consensus formation support system concerning it risk countermeasures","volume":"2","author":"sasaki","year":"2011","journal-title":"J Information Processing and Management"},{"key":"5","first-page":"301","article-title":"Guidelines for authoring comprehensible web pages and evaluating their success","volume":"47","author":"spyridakis","year":"2000","journal-title":"Technical Communication"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(98)00083-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s101070100286"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2010.5641872"}],"event":{"name":"2012 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2012,10,14]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2012,10,17]]}},"container-title":["2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362338\/6377652\/06378164.pdf?arnumber=6378164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T00:23:18Z","timestamp":1498004598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2012.6378164","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}