TY - STD TI - Alert, D (2016) Cyber-Attack Against Ukrainian Critical Infrastructure. February. ID - ref1 ER - TY - STD TI - Ali, A, Zhiyuan S, Antonios G, Syed AAN, Paolo G, Massimiliano T (2017) HyRiM Deliverable 4.3: How to Enhance Perimeter Security Using New Surveillance Technologies. https://hyrim.net/wp-content/uploads/2017/12/HyRiM-D4.3-How-to-Enhance-Perimeter-Security-using-new-Surveillance-Technologies.pdf. Accessed Feb 2018. UR - https://hyrim.net/wp-content/uploads/2017/12/HyRiM-D4.3-How-to-Enhance-Perimeter-Security-using-new-Surveillance-Technologies.pdf ID - ref2 ER - TY - CHAP AU - Alshawish, A. AU - Amine Abid, M. AU - de Meer, H. AU - Schauer, S. AU - König, S. AU - Gouglidis, A. AU - Hutchison, D. PY - 2018 DA - 2018// TI - G-DPS: A game-theoretical decision-making framework for physical surveillance games BT - Game Theory for Security and Risk Management: From Theory to Practice. Static & Dynamic Game Theory: Foundations and Applications PB - Springer Birkhäuser CY - Basel ID - Alshawish2018 ER - TY - JOUR AU - Amin, M. PY - 2002 DA - 2002// TI - Security challenges for the electricity infrastructure JO - Computer VL - 35 UR - https://doi.org/10.1109/MC.2002.1012423 DO - 10.1109/MC.2002.1012423 ID - Amin2002 ER - TY - JOUR AU - Antonello, R. AU - Fernandes, S. AU - Kamienski, C. AU - Sadok, D. AU - Kelner, J. AU - GóDor, I. AU - Szabó, G. AU - Westholm, T. PY - 2012 DA - 2012// TI - Deep packet inspection tools and techniques in commodity platforms: Challenges and trends JO - J Netw Comput Appl VL - 35 UR - https://doi.org/10.1016/j.jnca.2012.07.010 DO - 10.1016/j.jnca.2012.07.010 ID - Antonello2012 ER - TY - STD TI - Automation, R (2011) Converged Plantwide Ethernet (CPwE) Design and Implementation Guide. Document Reference Number: ENET-TD001E-EN-P. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.352.6198&rep=rep1&type=pdf. UR - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.352.6198&rep=rep1&type=pdf ID - ref6 ER - TY - JOUR AU - Bankston, K. S. AU - Soltani, A. PY - 2013 DA - 2013// TI - Tiny constables and the cost of surveillance: Making cents out of united states v. jones JO - Yale LJF VL - 123 ID - Bankston2013 ER - TY - STD TI - Bellanova, R, Vermeulen M, Gutwirth S, Finn R, McCarthy P, Wright D, Wadhwa K, Hallinan D, Friedewald M, Langheinrich M, Coroama V, Jeandesboz J, Bigo D, Frost M, Venier S (2012) Deliverable 1.1: Smart Surveillance – State of the Art, Public Report, SAPIENT Project number: 261698. https://sapientproject.eu/. UR - https://sapientproject.eu/ ID - ref8 ER - TY - JOUR AU - Bonifati, A. AU - Cattaneo, F. AU - Ceri, S. AU - Fuggetta, A. AU - Paraboschi, S. PY - 2001 DA - 2001// TI - Designing data marts for data warehouses JO - ACM Trans Softw Eng Methodol VL - 10 UR - https://doi.org/10.1145/384189.384190 DO - 10.1145/384189.384190 ID - Bonifati2001 ER - TY - STD TI - Bourne, V (2015) Critical Infrastructure Readiness Report: Holding the line against cyberthreats, The Aspen Institute; Intel Security. Available at: https://aspensecurityforum.org/wpcontent/uploads/2015/08/Aspen-Institute-Intel-Security-Cyber-Report.pdf. UR - https://aspensecurityforum.org/wpcontent/uploads/2015/08/Aspen-Institute-Intel-Security-Cyber-Report.pdf ID - ref10 ER - TY - BOOK PY - 2009 DA - 2009// TI - Technical Challenges in Location-Aware Video Surveillance Privacy PB - Springer CY - London ID - ref11 ER - TY - CHAP AU - Budgen, D. AU - Brereton, P. PY - 2006 DA - 2006// TI - Performing systematic literature reviews in software engineering BT - Proceedings of the 28th International Conference on Software Engineering PB - ACM CY - New York ID - Budgen2006 ER - TY - JOUR AU - Carlson, R. PY - 2002 DA - 2002// TI - Sandia scada program high-security scada ldrd final report JO - SANDIA Rep SAND VL - 729 ID - Carlson2002 ER - TY - JOUR AU - Clarke, R. PY - 1988 DA - 1988// TI - Information technology and dataveillance JO - Commun ACM VL - 31 UR - https://doi.org/10.1145/42411.42413 DO - 10.1145/42411.42413 ID - Clarke1988 ER - TY - JOUR AU - Clarke, R. PY - 1993 DA - 1993// TI - Profiling: A hidden challenge to the regulation of data surveillance JO - JL Inf Sci VL - 4 ID - Clarke1993 ER - TY - STD TI - Dawson, R, Boyd C, Dawson E, Nieto JMG (2006) Skma: a key management architecture for scada systems In: Proceedings of the 2006 Australasian Workshops on Grid Computing and e-research-Volume 54, 183–192.. Australian Computer Society, Inc. ID - ref16 ER - TY - JOUR AU - Degli Esposti, S. PY - 2014 DA - 2014// TI - When big data meets dataveillance: The hidden side of analytics JO - Surveill Soc VL - 12 UR - https://doi.org/10.24908/ss.v12i2.5113 DO - 10.24908/ss.v12i2.5113 ID - Degli Esposti2014 ER - TY - STD TI - Dodge, M, Batty M, Kitchin R (2004) No longer lost in the crowd: Prospects of continuous geosurveillance In: Association of American Geographers Annual Conference. Available at: https://personalpages.manchester.ac.uk/staff/m.dodge/cv_files/aag_geosurveillance.pdf. UR - https://personalpages.manchester.ac.uk/staff/m.dodge/cv_files/aag_geosurveillance.pdf ID - ref18 ER - TY - STD TI - Esposito, C, Gouglidis A, Hutchison D, Gurtov A, Helvik B, Heegaard P, Rizzo G, Rak J (2018) On the disaster resiliency within the context of 5g networks: The recodis experience. ID - ref19 ER - TY - STD TI - FBI (2006) Combined DNA Index System Operational and Laboratory Vulnerabilities. https://oig.justice.gov/reports/FBI/a0632/final.pdf. Accessed Feb 2018. UR - https://oig.justice.gov/reports/FBI/a0632/final.pdf ID - ref20 ER - TY - STD TI - FBI (2011) Combined DNA Index System (CODIS). https://www.fbi.gov/services/laboratory/biometric-analysis/codis. Accessed February 2018. UR - https://www.fbi.gov/services/laboratory/biometric-analysis/codis ID - ref21 ER - TY - CHAP AU - Gong, S. h. a. o. g. a. n. g. AU - Loy, C. h. e. n. C. h. a. n. g. e. AU - Xiang, T. a. o. PY - 2011 DA - 2011// TI - Security and Surveillance BT - Visual Analysis of Humans PB - Springer London CY - London UR - https://doi.org/10.1007/978-0-85729-997-0_23 DO - 10.1007/978-0-85729-997-0_23 ID - Gong2011 ER - TY - STD TI - Gouglidis, A, Green B, Busby JS, Rouncefield MF, Hutchison D, Schauer S (2016a) Threat awareness for critical infrastructures resilience In: Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on, 196–202.. IEEE. 9781467390248. ISBN 9781467390231. ID - ref23 ER - TY - STD TI - Gouglidis, A, Shirazi SN, Simpson S, Smith P, Hutchison D (2016b) A multi-level approach to resilience of critical infrastructures and services In: 23rd International Conference on Telecommunications (ICT), Thessaloniki, 1–5. https://doi.org/10.1109/ICT.2016.7500410. ID - ref24 ER - TY - CHAP AU - Gouglidis, A. AU - Hu, V. C. AU - Busby, J. S. AU - Hutchison, D. PY - 2017 DA - 2017// TI - Verification of resilience policies that assist attribute based access control BT - Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control PB - ACM CY - New York UR - https://doi.org/10.1145/3041048.3041049 DO - 10.1145/3041048.3041049 ID - Gouglidis2017 ER - TY - BOOK PY - 2018 DA - 2018// TI - Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study PB - Springer CY - Cham ID - ref26 ER - TY - STD TI - Greenfield, A (2010) Everyware: The dawning age of ubiquitous computing. Voices That Matter. Pearson Education, Berkeley, CA 94710. https://books.google.co.uk/books?id=noMNgMcZvL0C. Accessed Feb 2018. UR - https://books.google.co.uk/books?id=noMNgMcZvL0C ID - ref27 ER - TY - STD TI - Guelke, J, Sorell T, Hadjimatheou K, Scheinin M, Andrew J, Lavapuro J, Ojanen T, Grazia Porcedda M, Vermeulen M, McNeill B, et al. (2013) Surveille deliverable 2.6: Matrix of surveillance technologies. Seventh Framework Programme. Surveillance: Ethical Issues, Legal Limitations, and Efficiency, FP7-SEC-2011- 284725 uuid:dd2eddf3-ca3d-4883-8a6d-d541bed030a6. ID - ref28 ER - TY - CHAP AU - Gulzar, N. i. k. k. i. AU - Abbasi, B. a. s. r. a. AU - Wu, E. d. d. i. e. AU - Ozbal, A. n. i. l. AU - Yan, W. e. i. Q. i. PY - 2013 DA - 2013// TI - Surveillance Privacy Protection BT - Intelligent Multimedia Surveillance PB - Springer Berlin Heidelberg CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-41512-8_5 DO - 10.1007/978-3-642-41512-8_5 ID - Gulzar2013 ER - TY - CHAP AU - Hampapur, A. AU - Brown, L. AU - Connell, J. AU - Pankanti, S. AU - Senior, A. AU - Tian, Y. PY - 2003 DA - 2003// TI - Smart surveillance: applications, technologies and implications BT - Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia PB - Proceedings of the 2003 Joint CY - Singapore UR - https://doi.org/10.1109/ICICS.2003.1292637 DO - 10.1109/ICICS.2003.1292637 ID - Hampapur2003 ER - TY - JOUR AU - Hightower, J. AU - Borriello, G. PY - 2001 DA - 2001// TI - Location systems for ubiquitous computing JO - Computer VL - 34 UR - https://doi.org/10.1109/2.940014 DO - 10.1109/2.940014 ID - Hightower2001 ER - TY - STD TI - Hu, W-F, Chen Y-S, Hsieh J-W (2005) Vehicle occlusion identification system by perceptive roadway modeling In: MVA, 392–397. ID - ref32 ER - TY - JOUR AU - Hu, W. AU - Tan, T. AU - Wang, L. AU - Maybank, S. PY - 2004 DA - 2004// TI - A survey on visual surveillance of object motion and behaviors JO - IEEE Trans Syst Man Cybern Part C Appl Rev VL - 34 UR - https://doi.org/10.1109/TSMCC.2004.829274 DO - 10.1109/TSMCC.2004.829274 ID - Hu2004 ER - TY - STD TI - Hutchison, D, Kammenhuber N, Karaliopoulos M, Kheir N, Kooij R, Schoeller M, Sifalakis M, Smith P, Sterbenz J, Taleb T (2009) Resilience and Survivability for future networking: framework, mechanisms, and experimental evaluation. ResumeNet Project number: FP7 - 224619. Available at: http://www.resumenet.eu/downloads/deliverables/d-5-2a.pdf. UR - http://www.resumenet.eu/downloads/deliverables/d-5-2a.pdf ID - ref34 ER - TY - JOUR AU - Jungert, E. AU - Hallberg, N. AU - Wadströmer, N. PY - 2014 DA - 2014// TI - A system design for surveillance systems protecting critical infrastructures JO - J Vis Lang Comput VL - 25 UR - https://doi.org/10.1016/j.jvlc.2014.10.007 DO - 10.1016/j.jvlc.2014.10.007 ID - Jungert2014 ER - TY - STD TI - Machuca, CM, Secci S, Vizarreta P, Kuipers F, Gouglidis A, Hutchison D, Jouet S, Pezaros D, Elmokashfi A, Heegaard P, et al. (2016) Technology-related disasters: A survey towards disaster-resilient software defined networks In: Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop On, 35–42.. IEEE. ID - ref36 ER - TY - STD TI - Marinos, L (2013) Enisa threat landscape 2013: Overview of current and emerging cyber-threats. Heraklion: European Union Agency for Network and Information Security Publishing. Available at: https://www.enisa.europa.eu/publications/enisathreat-landscape-2013-overview-of-current-and-emerging-cyberthreats. UR - https://www.enisa.europa.eu/publications/enisathreat-landscape-2013-overview-of-current-and-emerging-cyberthreats ID - ref37 ER - TY - STD TI - Mawilmada, PK (2011) Impact of a data warehouse model for improved decision-making process in healthcare. Queensland University of Technology. Available at: https://eprints.qut.edu.au/47532/. UR - https://eprints.qut.edu.au/47532/ ID - ref38 ER - TY - STD TI - Mayer, P (2009) Guidelines for writing a review article. Zurich-Basel: Plant Science Center. Dostupné z. http://www.plantscience.ethz.ch/education/Masters/courses/Scientific_Writing. Accessed Feb 2018. UR - http://www.plantscience.ethz.ch/education/Masters/courses/Scientific_Writing ID - ref39 ER - TY - CHAP AU - Meggitt, D. J. AU - Roderick, D. K. AU - Cooke, K. P. PY - 1999 DA - 1999// TI - Advanced technologies for undersea surveillance of modern threats BT - Oceans’99. MTS/IEEE. Riding the Crest into the 21st Century. Conference and Exhibition. Conference Proceedings (IEEE Cat. No.99CH37008) PB - IEEE CY - Seattle. UR - https://doi.org/10.1109/OCEANS.1999.799755 DO - 10.1109/OCEANS.1999.799755 ID - Meggitt1999 ER - TY - JOUR AU - Mordini, E. AU - Petrini, C. PY - 2007 DA - 2007// TI - Ethical and social implications of biometric identification technology JO - Annali dell’Istituto superiore di sanita VL - 43 ID - Mordini2007 ER - TY - STD TI - Mueller, M, Kuehn A (2013) Einstein on the breach: Surveillance technology, cybersecurity and organizational change In: 12th Workshop on the Economics of Information Security (WEIS 2013), Georgetown University, Washington, DC June, 11–12.. WEIS 2013 workshop. ID - ref42 ER - TY - CHAP AU - Nguyen, D. H. AU - Marcu, G. AU - Hayes, G. R. AU - Truong, K. N. AU - Scott, J. AU - Langheinrich, M. AU - Roduner, C. PY - 2009 DA - 2009// TI - Encountering sensecam: personal recording technologies in everyday life BT - Proceedings of the 11th International Conference on Ubiquitous Computing PB - ACM CY - New York ID - Nguyen2009 ER - TY - STD TI - nidirect (2014) Using ePassport gates at airport border control. https://www.nidirect.gov.uk/articles/using-epassport-gates-airport-border-control. Accessed Feb 2018. UR - https://www.nidirect.gov.uk/articles/using-epassport-gates-airport-border-control ID - ref44 ER - TY - STD TI - Norris, C (2002) Surveillance as social sorting: Privacy, risk, and digital discrimination. 1st ed.(Lyon D, ed.). Routledge. ISBN-13: 978-0415278737. ID - ref45 ER - TY - STD TI - Nwatu, GU (2011) Biometrics Technology: Understanding dynamics influencing adoption for control of identification deception within Nigeria. Walden University, PhD Thesis. Available at: https://scholarworks.waldenu.edu/dissertations/921/. UR - https://scholarworks.waldenu.edu/dissertations/921/ ID - ref46 ER - TY - STD TI - Obregon, L (2015) Secure Architecture for Industrial Control Systems, The SANS Institute. Available at: https://www.sans.org/reading-room/whitepapers/ICS/securearchitecture-industrial-control-systems-36327. UR - https://www.sans.org/reading-room/whitepapers/ICS/securearchitecture-industrial-control-systems-36327 ID - ref47 ER - TY - CHAP AU - Oulasvirta, A. AU - Pihlajamaa, A. AU - Perkiö, J. AU - Ray, D. AU - Vähäkangas, T. AU - Hasu, T. AU - Vainio, N. AU - Myllymäki, P. PY - 2012 DA - 2012// TI - Long-term effects of ubiquitous surveillance in the home BT - Proceedings of the 2012 ACM Conference on Ubiquitous Computing PB - ACM CY - New York ID - Oulasvirta2012 ER - TY - JOUR AU - Qiu, D. AU - Li, B. AU - Ji, S. AU - Leung, H. PY - 2015 DA - 2015// TI - Regression testing of web service: a systematic mapping study JO - ACM Comput Surv (CSUR) VL - 47 ID - Qiu2015 ER - TY - JOUR AU - Rachana, S. AU - Guruprasad, H. PY - 2014 DA - 2014// TI - Virtual machine introspection JO - Compusoft VL - 3 ID - Rachana2014 ER - TY - JOUR AU - Rass, S. AU - Alshawish, A. AU - Abid, M. A. AU - Schauer, S. AU - Zhu, Q. AU - De Meer, H. PY - 2017 DA - 2017// TI - Physical intrusion games—optimizing surveillance by simulation and game theory JO - IEEE Access VL - 5 UR - https://doi.org/10.1109/ACCESS.2017.2693425 DO - 10.1109/ACCESS.2017.2693425 ID - Rass2017 ER - TY - STD TI - Ross, A, Jain AK (2004) Multimodal biometrics: An overview In: 2004 12th European Signal Processing Conference, Vienna. pp 1221–1224. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7080214&isnumber=7079654. UR - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7080214&isnumber=7079654 ID - ref52 ER - TY - JOUR AU - Scarfone, K. AU - Mell, P. PY - 2007 DA - 2007// TI - Guide to intrusion detection and prevention systems (idps) JO - NIST Spec Publ VL - 800 ID - Scarfone2007 ER - TY - CHAP AU - Senior, A. ED - Senior, A. PY - 2009 DA - 2009// TI - An introduction to automatic video surveillance BT - Protecting Privacy in Video Surveillance PB - Springer CY - London UR - https://doi.org/10.1007/978-1-84882-301-3 DO - 10.1007/978-1-84882-301-3 ID - Senior2009 ER - TY - STD TI - Smith, R (2014) Assault on california power station raises alarm on potential for terrorism. Wall Str J 5. ID - ref55 ER - TY - JOUR AU - Smith, P. AU - Hutchison, D. AU - Sterbenz, J. P. AU - Schöller, M. AU - Fessi, A. AU - Karaliopoulos, M. AU - Lac, C. AU - Plattner, B. PY - 2011 DA - 2011// TI - Network resilience: a systematic approach JO - IEEE Commun Mag VL - 49 UR - https://doi.org/10.1109/MCOM.2011.5936160 DO - 10.1109/MCOM.2011.5936160 ID - Smith2011 ER - TY - JOUR AU - Sterbenz, J. P. AU - Hutchison, D. AU - Çetinkaya, E. K. AU - Jabbar, A. AU - Rohrer, J. P. AU - Schöller, M. AU - Smith, P. PY - 2010 DA - 2010// TI - Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines JO - Comput Netw VL - 54 UR - https://doi.org/10.1016/j.comnet.2010.03.005 DO - 10.1016/j.comnet.2010.03.005 ID - Sterbenz2010 ER - TY - JOUR AU - Such, J. M. AU - Gouglidis, A. AU - Knowles, W. AU - Misra, G. AU - Rashid, A. PY - 2016 DA - 2016// TI - Information assurance techniques: Perceived cost effectiveness JO - Comput Secur VL - 60 UR - https://doi.org/10.1016/j.cose.2016.03.009 DO - 10.1016/j.cose.2016.03.009 ID - Such2016 ER - TY - STD TI - Sutor, S, Reda R (2008) Multi sensor technologies augmenting video surveillance: Security and data fusion aspects In: 2008 23rd International Symposium on Computer and Information Sciences, Istanbul, 1–4. https://doi.org/10.1109/ISCIS.2008.4717972. ID - ref59 ER - TY - STD TI - Sveinsdottir, T, Finn R, Rodrigues R, Wadhwa K, Fritz F, Kreissl R, Hert AT, van Brakel R (2014) Taxonomy of security products, systems and services. ID - ref60 ER - TY - STD TI - Thalmann, D, Salamin P, Ott R, Gutiérrez M, Vexo F (2006) Advanced mixed reality technologies for surveillance and risk prevention applications In: International Symposium on Computer and Information Sciences, 13–23.. Springer. ID - ref61 ER - TY - STD TI - TheGuardian (2013) NSA collecting phone records of millions of Verizon customers daily. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order. Accessed Feb 2018. UR - https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order ID - ref62 ER - TY - STD TI - TheGuardian (2015) Snowden leak: governments’ hostile reaction fuelled public’s distrust of spies. https://www.theguardian.com/world/2015/jun/15/snowden-files-us-uk-government-hostile-reaction-distrust-spies. Accessed Feb 2018. UR - https://www.theguardian.com/world/2015/jun/15/snowden-files-us-uk-government-hostile-reaction-distrust-spies ID - ref63 ER - TY - STD TI - ULD, ES, ULD MH, Sterbik-Lamina J (2013) D 3.1–report on surveillance technology and privacy enhancing design. ID - ref64 ER - TY - STD TI - Uslar, M, Rosinger C, Schlegel S (2014) Security by Design for the Smart Grid: Combining the SGAM and NISTIR 7628 In: 2014 IEEE 38th International Computer Software and Applications Conference Workshops, Vasteras. pp 110–115. https://doi.org/10.1109/COMPSACW.2014.23. ID - ref65 ER - TY - CHAP AU - Uteck, A. ED - Kerr, I. ED - Steeves, V. ED - Lucock, C. PY - 2009 DA - 2009// TI - Ubiquitous Computing and Spatial Privacy BT - Lessons from the Identity Trail PB - Oxford University Press CY - Oxford ID - Uteck2009 ER - TY - STD TI - van Gulijk, C, Vagts H, Höhn S, Yaroyvi O (2012) Surveille Deliverable 2.1: Survey of surveillance technologies, including their specific identification for further work. Surveille Project number 284725. Available at: https://surveille.eui.eu/wp-content/uploads/sites/19/2015/04/D2.1-Survey-of-surveillance-technologies.pdf. UR - https://surveille.eui.eu/wp-content/uploads/sites/19/2015/04/D2.1-Survey-of-surveillance-technologies.pdf ID - ref67 ER - TY - STD TI - van Rest, J (2015) Surveillance use cases: focus on video analytics. Technical report, European Commission. ID - ref68 ER - TY - JOUR AU - Weber, K. PY - 2006 DA - 2006// TI - The next step: privacy invasions by biometrics and ict implants JO - Ubiquity VL - 2006 UR - https://doi.org/10.1145/1195937.1187567 DO - 10.1145/1195937.1187567 ID - Weber2006 ER - TY - JOUR AU - Wigan, M. R. AU - Clarke, R. PY - 2013 DA - 2013// TI - Big data’s big unintended consequences JO - Computer VL - 46 UR - https://doi.org/10.1109/MC.2013.195 DO - 10.1109/MC.2013.195 ID - Wigan2013 ER - TY - STD TI - Williams, E, Eyo B (2012) Ubiquitous computing: The technology for boundless surveillance. ID - ref71 ER - TY - JOUR AU - Wright, D. AU - Raab, C. D. PY - 2012 DA - 2012// TI - Constructing a surveillance impact assessment JO - Comput Law Secur Rev VL - 28 UR - https://doi.org/10.1016/j.clsr.2012.09.003 DO - 10.1016/j.clsr.2012.09.003 ID - Wright2012 ER -