{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:43:53Z","timestamp":1725893033870},"publisher-location":"Boston, MA","reference-count":32,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_7","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"73-84","source":"Crossref","is-referenced-by-count":12,"title":["Improving the Information Security Model by using TFI"],"prefix":"10.1007","author":[{"given":"Rose-Mharie","family":"\u00c5hlfeldt","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Spagnoletti","sequence":"additional","affiliation":[]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Bj\u00f6rck, F., 2005a. Knowledge Security [on line]. Available from: http:\/\/vww.bjorck.com\/3.htm [Accessed 1 November, 2005]."},{"key":"7_CR2","unstructured":"Oscarsson, P., 2002. Information Security, Data Security, IT Security, Computer Security, IS Security... \u2014 What Makes the Difference? In Proceedings of Promote IT, pp. 649\u2013655. Sk\u00f6vde, Sweden. 22-24 April 2002."},{"key":"7_CR3","unstructured":"NE 2005. National Encyclopedia [on-line]. Available from: http:\/\/www.ne.se [Accessed 28 October 2005]."},{"key":"7_CR4","unstructured":"U.S. National Information Systems Security Glossary, 2006. Available from: http:\/\/security.isu.edu\/pdf\/4009.pdf [Accessed 25 October 2006]."},{"key":"7_CR5","unstructured":"Wikipedia, 2006. Information Security. Available from: http:\/\/www.wikipedia.com [Accessed 29 May, 2006]."},{"key":"7_CR6","unstructured":"SIS, 2003. SIS Handbok 550. Terminologi f\u00f6r informationss\u00e4kerhet. SIS F\u00f6rlag AB. Stockholm (in Swedish)."},{"key":"7_CR7","unstructured":"\u00c5hlfeldt, R-M., 2006. Information Security in a Distributed Healthcare Domain \u2014 Exploring the Problems and Needs of Different Healthcare Providers. Licentiate Dissertation. Report series No. 06-003. ISSN 1101-8526."},{"key":"7_CR8","volume-title":"Analyzing the Security Significance of System Requirements,\u201d Requirements Engineering\u20192005 (RE\u201905) Symposium on Requirements Engineering for Information Security (SREIS)","author":"D.G. Firesmith","year":"2005","unstructured":"Firesmith D.G., 2005. \u201cAnalyzing the Security Significance of System Requirements,\u201d Requirements Engineering\u20192005 (RE\u201905) Symposium on Requirements Engineering for Information Security (SREIS), IEEE Computer Society, Washington, D.C., September 2005."},{"key":"7_CR9","unstructured":"Jain, A. & Raja, M K 2006. An Exploratory Assessment of Information Security Principles & Practices: An Insight from a Financial Services company, Proceedings of the 5th Security Conference, Las Vegas."},{"key":"7_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-11948-6","volume-title":"Understanding Information: an Introduction","author":"Liebenau and Backhouse","year":"1990","unstructured":"Liebenau and Backhouse 1990 Understanding Information: an Introduction, Macmillan, London"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/014492900118768","volume":"19","author":"R. Stamper","year":"2000","unstructured":"Stamper R., Liu K., Hafkamp M. and Ades Y. 2000 Understanding the Roles of Signs and Norms in Organisations \u2014 A semiotic approach to information systems design. Journal of Behaviour & Information Technology, vol. 19(1), pp 15\u201327.","journal-title":"Journal of Behaviour & Information Technology"},{"key":"7_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-14454-9","volume-title":"Managing information system security","author":"G. Dhillon","year":"1997","unstructured":"Dhillon, G. 1997. Managing information system security. London: Macmillan."},{"key":"7_CR13","unstructured":"Harris, M. & Mishra, S. 2006 Human Behavior Aspects in Information Systems Security. Proceedings of the 5th Security Conference, Las Vegas."},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"v","DOI":"10.2307\/249407","volume":"23","author":"A.S. Lee","year":"1999","unstructured":"Lee, A.S. (1999). Inaugural Editor\u2019s Comments, MIS Quarterly, 23(1), v\u2013xi.","journal-title":"MIS Quarterly"},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1046\/j.1365-2575.2001.00099.x","volume":"11","author":"G. Dhillon","year":"2001","unstructured":"Dhillon, G. and Backhouse J. 2001 Current Directions in IS Security Research: Toward Socio-Organisational Perspectives. Information Systems Journal 11(2): 127\u2013153.","journal-title":"Information Systems Journal"},{"issue":"1","key":"7_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"11","author":"M.T. Siponen","year":"2000","unstructured":"Siponen M.T. 2000 \u201cA Conceptual Foundation for Organizational Information Security Awareness\u201d, Information Management & Computer Security, 11(1), pp. 31\u201341.","journal-title":"Information Management & Computer Security"},{"issue":"8","key":"7_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/859670.859675","volume":"46","author":"M. Whitman","year":"2003","unstructured":"Whitman, M. 2003. \u201cEnemy at the Gate: Threats to Information Security.\u201d Communications of the ACM 46(8): 91\u201395.","journal-title":"Communications of the ACM"},{"issue":"6","key":"7_CR18","first-page":"50","volume":"44","author":"N. Bottom","year":"2000","unstructured":"Bottom, N. 2000. \u201cThe human face of information loss.\u201d Security Management 44(6):50\u201356.","journal-title":"Security Management"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2004.10.003","volume":"24","author":"G. Magklaras","year":"2005","unstructured":"Magklaras, G. and S. Furnell 2005. \u201cA preliminary model of end user sophistication for insider threat prediction in IT systems.\u201d Computers & Security 24:371\u2013380.","journal-title":"Computers & Security"},{"key":"7_CR20","volume-title":"A framework for understanding and predicting insider attacks","author":"E. Schultz","year":"2002","unstructured":"Schultz, E. 2002. A framework for understanding and predicting insider attacks. Compsec, London."},{"key":"7_CR21","unstructured":"Dhillon, G., & Backhouse, J. 1997. Managing for secure organizations: a review of information systems security research approaches. In D. Avison (Ed.), Key issues in information systems: McGraw Hill."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Dhillon, G. 2000 Challenges in Managing IS Security in the new Millennium, Chapter 1 of Challenges in Managing Information Security, Idea Group Publishing.","DOI":"10.4018\/978-1-878289-78-0.ch001"},{"key":"7_CR23","unstructured":"Jones, C. 2003 The Social Engineering: Understanding and Auditing [Online]. SANS Institute. Available from: http:\/\/www.sans.org\/rr\/whitepapers\/engineering\/1332.php [Accessed Nov 01 2005]."},{"key":"7_CR24","unstructured":"Bj\u00f6rck, F. 2005b Discovering Information Security Management. PhD Dissertation. University of Stockholm. Report series No. 05-010, Stockholm."},{"key":"7_CR25","unstructured":"\u00c5hlfeldt, R. 2002. Information Security in Home Healthcare: A Case Study, In the Conference Proceedings of the Third International Conference of the Australian Institute of Computer Ethics (AiCE) 2002. Sydney, Australia, 30 September 2002, pp. 1\u201310. Eds. M. Warren and J. Barlow. Australian Institute of Computer Ethics. ISBN 0-7300-2560-8."},{"key":"7_CR26","unstructured":"\u00c5hlfeldt, R. and Ask, L. 2004. Information Security in Electronic Medical Records: A case study with the user in focus. In Proceedings of the 2004 Information Resources Management Association International Conference, New Orleans, USA, May, pp 345\u2013347."},{"key":"7_CR27","unstructured":"\u00c5hlfeldt, R. and Nohlberg, M. 2005. System and Network Security in a Heterogeneous Healthcare Domain: A Case Study. In CD-ROM Proceedings of the 4th Security Conference, Las Vegas, USA, 30-31 March 2005. ISBN 0-9729562-5-5."},{"key":"7_CR28","unstructured":"Perjons, E., Wangler, B., W\u00e4yrynen, J. and \u00c5hlfeldt, R. 2005a. Introducing a process manager in healthcare: an experience report, Health Informatics Journal, Vol 11(1), 45\u201361, March 2005. ISSN 1460-4582."},{"key":"7_CR29","unstructured":"Johannesson, P., Perjons, E., Wangler, B. and \u00c5hlfeldt, R-M. 2005. Design Solutions for Interoperability using a Process Manager. In Proceedings of the 1th International Conference on Interoperability of Enterprise Software and Applications (INTEROP-ESA\u20192005), Geneva, Switzerland, 23 \u2014 25 February 2005, pp 397\u2013408. ISBN 13-978-1-84628-151-8"},{"key":"7_CR30","unstructured":"ISO\/IEC 17799 Part 1: Code of practice for information security management."},{"key":"7_CR31","unstructured":"Nationell IT-strategi for v\u00e5rd och omsorg. 2006. ISBN 91-631-8541-5 (in Swedish)."},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Valentine, A., 2006 \u201cEnhancing the employee security awareness model\u201c, Computer Fraud & Security, June 2006, pp 17\u201319.","DOI":"10.1016\/S1361-3723(06)70370-0"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:58:43Z","timestamp":1556960323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_7","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}