iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.COSE.2008.05.006
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:38:37Z","timestamp":1725979117692},"reference-count":38,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1016\/j.cose.2008.05.006","type":"journal-article","created":{"date-parts":[[2008,6,8]],"date-time":"2008-06-08T04:25:06Z","timestamp":1212899106000},"page":"224-231","source":"Crossref","is-referenced-by-count":51,"title":["Information security management: An information security retrieval and awareness model for industry"],"prefix":"10.1016","volume":"27","author":[{"given":"E.","family":"Kritzinger","sequence":"first","affiliation":[]},{"given":"E.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.cose.2008.05.006_bib1","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/S0167-4048(03)00305-5","article-title":"International legal aspects of cryptography","volume":"22","author":"Aljifri","year":"2003","journal-title":"Computers & Security"},{"issue":"3","key":"10.1016\/j.cose.2008.05.006_bib2","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/S1363-4127(01)00309-0","article-title":"Information security governance","volume":"6","author":"Andersen","year":"2001","journal-title":"Information Security Technical Report"},{"issue":"3","key":"10.1016\/j.cose.2008.05.006_bib3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1363-4127(01)00303-X","article-title":"Information security risk management \u2013 when should it be manged?","volume":"6","author":"Broderick","year":"2001","journal-title":"Information Security Technical Report"},{"key":"10.1016\/j.cose.2008.05.006_bib4","series-title":"Governance, control and audit for information and related technology (COBIT)","isbn-type":"print","author":"COBIT","year":"2001","ISBN":"http:\/\/id.crossref.org\/isbn\/189320913X"},{"key":"10.1016\/j.cose.2008.05.006_bib5","doi-asserted-by":"crossref","unstructured":"Crowley E. Information systems security curricula development. In: Proceedings of the fourth conference on IT curriculum on IT education. 2003.","DOI":"10.1145\/947121.947178"},{"key":"10.1016\/j.cose.2008.05.006_bib6","unstructured":"CSI\/FBI. Computer crime and security survey. Available at: GoCSI.com. 2005."},{"key":"10.1016\/j.cose.2008.05.006_bib7","unstructured":"Deloitte, Touche, Tohmatsu. Global security survey. Available at: www.deloitte.com. 2005."},{"issue":"8","key":"10.1016\/j.cose.2008.05.006_bib8","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/S0167-4048(01)00813-6","article-title":"Computer crimes: theorizing about the enemy within","volume":"20","author":"Dhillon","year":"2001","journal-title":"Computers & Security"},{"issue":"3","key":"10.1016\/j.cose.2008.05.006_bib9","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/S0167-4048(00)88612-5","article-title":"Information systems risk management: key concepts and business processes","volume":"19","author":"Finne","year":"2000","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2008.05.006_bib10","doi-asserted-by":"crossref","unstructured":"Fraser HSF, Kohane IS, Long WL. Using the technology of the world wide web to manage clinical information. Available at: http:\/\/bmj.bmjjournals.com\/archive\/7094ip1.htm. 314 (No\u00a07094). 1997.","DOI":"10.1136\/bmj.314.7094.1600"},{"key":"10.1016\/j.cose.2008.05.006_bib11","unstructured":"GMITS. GMITS: guidelines for the management of IT security, part 1: concepts and models for managing and planning IT security, ISO\/IEC JTC1\/SC27, PDTR 13335\u20131 (revision), version 28-11-2001. 2001."},{"key":"10.1016\/j.cose.2008.05.006_bib12","unstructured":"International Federation of Accountants. Managing security of information. 2000."},{"key":"10.1016\/j.cose.2008.05.006_bib13","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/2.735847","article-title":"Integrating security into curriculum","author":"Irvine","year":"1998","journal-title":"Computer"},{"key":"10.1016\/j.cose.2008.05.006_bib14","unstructured":"ISO\/IEC177799. Information security management \u2013 part 1: code of practice for information security management. 2000."},{"key":"10.1016\/j.cose.2008.05.006_bib15","unstructured":"IT Governance Institute. Information security governance: guidance for boards of directors and executive management, ISBN 1-893209-27-X. 2001a."},{"key":"10.1016\/j.cose.2008.05.006_bib16","unstructured":"IT Governance Institute. Board briefing on IT governance. ISBN 1-893209-27-X. 2001b."},{"issue":"1","key":"10.1016\/j.cose.2008.05.006_bib17","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S0960-2593(00)80002-6","article-title":"IT security \u2013 implementing \u201cbest practice\u201d","author":"Kisin","year":"1996","journal-title":"Computer Audit Update"},{"issue":"1","key":"10.1016\/j.cose.2008.05.006_bib18","first-page":"28","article-title":"Time to elevate IT security to the boardroom","volume":"1","author":"Lewis","year":"2000","journal-title":"e Secure"},{"key":"10.1016\/j.cose.2008.05.006_bib19","series-title":"An introduction to computer security: the NIST handbook","year":"2000"},{"issue":"4","key":"10.1016\/j.cose.2008.05.006_bib20","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/S0167-4048(00)04021-9","article-title":"Implementing information security in the 21st century \u2013 do you have the balancing factors?","volume":"19","author":"Nosworthy","year":"2000","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2008.05.006_bib21","series-title":"Security in computing","author":"Pfhleeger","year":"1997"},{"issue":"8","key":"10.1016\/j.cose.2008.05.006_bib22","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1016\/j.cose.2004.10.006","article-title":"A framework for the governance of information security","volume":"23","author":"Posthumus","year":"2004","journal-title":"Computers & Security"},{"issue":"1","key":"10.1016\/j.cose.2008.05.006_bib23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2004.01.002","article-title":"Security training and awarness-fitting a square peg in around hole","volume":"23","author":"Schultz","year":"2004","journal-title":"Computers & Security"},{"issue":"1","key":"10.1016\/j.cose.2008.05.006_bib24","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09685220010371394","article-title":"A conceptual foundation for organizational information security awareness","volume":"8","author":"Siponen","year":"2000","journal-title":"Information Management & Computer Security"},{"issue":"2","key":"10.1016\/j.cose.2008.05.006_bib25","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/503345.503348","article-title":"Five dimensions of informstion security awareness","volume":"31","author":"Siponen","year":"2001","journal-title":"Computers and Society"},{"key":"10.1016\/j.cose.2008.05.006_bib26","unstructured":"Smith E, Kritzinger E, Oosthuizen HJ, Von Solms SH. Information security education. In: Proceedings of the WISE 4 conference, Moscow, Russia. 2004."},{"key":"10.1016\/j.cose.2008.05.006_bib27","unstructured":"Squara, D. LAN security will become a priority in the networks of tomorrow. Available at: http:\/\/itweb.co.za. 29 June 2000."},{"key":"10.1016\/j.cose.2008.05.006_bib28","unstructured":"Thomson M. Make information security awareness and training more effectve. In: Proceedings of the IFIP, TC 11.8 first world conference on information security education, Kista, Sweden. 1999."},{"issue":"4","key":"10.1016\/j.cose.2008.05.006_bib29","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1108\/09685229810227649","article-title":"Information security awareness: educating your users effectively","volume":"6","author":"Thomson","year":"1998","journal-title":"Information Management & Computer Security"},{"issue":"4","key":"10.1016\/j.cose.2008.05.006_bib30","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.cose.2004.01.013","article-title":"From policies to culture","volume":"23","author":"Von Solms","year":"2004","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2008.05.006_bib31","unstructured":"Von Solms SH. Information security managment through measurement. In: Proceedings of the SEC99 conference, Johannesburg, South Africa. 1999."},{"issue":"6","key":"10.1016\/j.cose.2008.05.006_bib32","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/S0167-4048(01)00608-3","article-title":"Information security \u2013 a multidemensional discipline","volume":"20","author":"Von Solms","year":"2001","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2008.05.006_bib33","series-title":"Principles of information security","author":"Whiteman","year":"2003"},{"key":"10.1016\/j.cose.2008.05.006_bib34","unstructured":"Wilson M, Hash J. Information technology security awareness, training, education and certification. Available at: http:\/\/www.itl.nist.gov\/lab\/bulletns\/bltnoct03.htm. 2005."},{"key":"10.1016\/j.cose.2008.05.006_bib35","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/0142-0496(95)80197-9","article-title":"Information security awareness raising methods","author":"Wood","year":"1995","journal-title":"Computer Fraud & Security"},{"issue":"1","key":"10.1016\/j.cose.2008.05.006_bib36","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1361-3723(04)00019-3","article-title":"Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature","author":"Wood","year":"2004","journal-title":"Computer Fraud & Security"},{"issue":"8","key":"10.1016\/j.cose.2008.05.006_bib37","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/S1361-3723(98)80019-5","article-title":"The need for information security education","author":"Wright","year":"1998","journal-title":"Computer Fraud & Security"},{"key":"10.1016\/j.cose.2008.05.006_bib38","unstructured":"Yngstrom L, Bjorck F. The value and assessment of information security education and training. In: Proceedings of WISE. 2004."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000321?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000321?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T21:23:55Z","timestamp":1557609835000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808000321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":38,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["S0167404808000321"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2008.05.006","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2008,10]]}}}