{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:26Z","timestamp":1725454226255},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387244853"},{"type":"electronic","value":"9780387244860"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/0-387-24486-7_21","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T18:15:45Z","timestamp":1128881745000},"page":"277-287","source":"Crossref","is-referenced-by-count":1,"title":["Five Non-Technical Pillars of Network Information Security Management"],"prefix":"10.1007","author":[{"given":"Elmarie","family":"Kritzinger","sequence":"first","affiliation":[]},{"given":"Prof S.H.","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"CCH Enterprises Solutions 2000: \u201cSecurity is a management issue, not a technology issue.\u201d Online: www.cch.za\/es\/news\/articles\/news59"},{"key":"21_CR2","unstructured":"CCTA-Championing Electronic Government, 1999: Online: http:\/\/www.ccta.gov.uk\/index.htm"},{"key":"21_CR3","unstructured":"Department of trade and industry, 2000: \u201cInformation Security Management Policy.\u201d Online: http:\/\/www.dti.gov.uk"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Finne T., 2000: \u201cInformation systems risk Management: Key concepts and business processes.\u201d Computer & Security, 19(3) 2000.","DOI":"10.1016\/S0167-4048(00)88612-5"},{"key":"21_CR5","unstructured":"Guidelines for Management of IT Security \u2014 GMITS, 2000 Online: http:\/\/www.cancert.ca\/Pages\/lSStandards.htm"},{"key":"21_CR6","unstructured":"IIA, AICPA 2000: \u201cA call to action for corporate governance.\u201d Online: http:\/\/www.nitc.state.ne.us\/tp\/workgroups\/security.htm"},{"key":"21_CR7","unstructured":"\u201cInformation Security Governance: Guide for Boards of Directors and Executive Management.\u201d IT Governance Institute"},{"key":"21_CR8","unstructured":"International Federation of Accountants, 1998: \u201cManaging Security of Information.\u201d"},{"key":"21_CR9","unstructured":"Katzke S., 2001: \u201cSecurity Metrics.\u201d Online: http:\/\/www.acsac.org\/measurement\/position-papers"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Kwok L. & Longley D., 1999; \u201cInformation Security Management and Modeling.\u201d Information Management & Computer Security. Vol 7, 1999.","DOI":"10.1108\/09685229910255179"},{"key":"21_CR11","unstructured":"Lewis A., 2002: \u201cTime to elevate IT security to the boardroom\u201d E-Secure, Volume 1, Issue 1."},{"key":"21_CR12","unstructured":"Lewis R. 2003: \u201cThe need for Establishing a Security Awareness Training Program,\u201d As part of GIAC practial respository. SANS Institute"},{"key":"21_CR13","unstructured":"National Institute of Standards and Technology 2000: \u201cAn Introduction to Computer Security.\u201d Online available: www.nist.gov"},{"key":"21_CR14","unstructured":"Netigy 2001: \u201cInformation security awareness program.\u201d Online: http:\/\/www.netigy.com\/solutions\/security\/sec_foundation\/infosec_aware.htm Author unknown."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Von Solms S.H., 2000: \u201cInformation Security-The third wave?\u201d Computer and Security, Volume 19, Issue 7.","DOI":"10.1016\/S0167-4048(00)07021-8"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T18:24:46Z","timestamp":1549218286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9780387244853","9780387244860"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_21","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2005]]}}}