{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:53:32Z","timestamp":1743022412404,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840777"},{"type":"electronic","value":"9783031840784"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84078-4_29","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:55Z","timestamp":1741806415000},"page":"421-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Agile Audit Proposal for\u00a0ISO IEC 27001 Standard Implementation in\u00a0Higher Education Faculties"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7100-9737","authenticated-orcid":false,"given":"David Ruete","family":"Z\u00fa\u00f1iga","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6981-1491","authenticated-orcid":false,"given":"Pilar L\u00f3pez","family":"Lira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1191-687X","authenticated-orcid":false,"given":"Alejandro Caroca","family":"Navarro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0528-0120","authenticated-orcid":false,"given":"Maili\u00fa D\u00edaz","family":"Pe\u00f1a","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4414-8843","authenticated-orcid":false,"given":"Nicol\u00e1s Caselli","family":"Benavente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6651-2322","authenticated-orcid":false,"given":"Danilo Leal","family":"Moraga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3248-8843","authenticated-orcid":false,"given":"Marcelo Reyes","family":"Rogget","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2690-1638","authenticated-orcid":false,"given":"Jean Paul Maidana","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"29_CR1","unstructured":"Sapsford, R.: Data Collection and Analysis, pp. 1\u201324. Sage, Open University (1998)"},{"key":"29_CR2","unstructured":"Agesic. Agencia de Gobierno Electr\u00f3nico y Sociedad de la Informaci\u00f3n y del Conocimiento. Obtenido de (2012). https:\/\/www.agesic.gub.uy\/innovaportal\/file\/3696\/1\/res_005_anexo_sgsi.pdf"},{"key":"29_CR3","unstructured":"Inteco. Instituto Nacional de las Tecnolog\u00edas de Comunicacipon. Obtenido de (2014). https:\/\/www.incibe.es\/extfrontinteco\/img\/File\/intecocert\/sgsi\/img\/Guia_apoyo_SGSI.pdf"},{"key":"29_CR4","unstructured":"Pessolani, P.: Evaluaci\u00f3n de Riesgo en las Tecnolog\u00edas de Informaci\u00f3n y Comunicaciones orientada a Organismos P\u00fablicos. Ponencia presentada en el IV Congreso Iberoamericano de Seguridad de la Informaci\u00f3n., (p\u00e1gs, Mar del Plata, Argentina, pp. 245\u2013259 (2007)"},{"issue":"1","key":"29_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.im.2014.10.006","volume":"52","author":"F Wang","year":"2015","unstructured":"Wang, F., Zhang, Z.P.: The role of the internet in changing industry competition. Inf. Manag. 52(1), 71\u201381 (2015)","journal-title":"Inf. Manag."},{"issue":"10","key":"29_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcorpfin.2020.101641","volume":"64","author":"JL Callen","year":"2020","unstructured":"Callen, J.L., Fang, X., Zhang, W.: Protection of proprietary information and financial reporting opacity: evidence from a natural experiment. J. Corp. Finan. 64(10), 101641 (2020)","journal-title":"J. Corp. Finan."},{"issue":"2","key":"29_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcorpfin.2022.102166","volume":"72","author":"X Fei","year":"2022","unstructured":"Fei, X.: Nondisclosure and analyst behavior: evidence from redaction of proprietary information from public filings. J. Corp. Finan. 72(2), 102166 (2022)","journal-title":"J. Corp. Finan."},{"issue":"1","key":"29_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jfineco.2015.06.016","volume":"120","author":"AL Boone","year":"2016","unstructured":"Boone, A.L., Floros, I.V., Johnson, S.A.: Redacting proprietary information at the initial public offering. J. Finan. Econ. 120(1), 102\u201323 (2016)","journal-title":"J. Finan. Econ."},{"key":"29_CR9","unstructured":"Feng, X., Li, B., Du, Y.: Research on information security issues in the digital economy era. J. Comput. Netw. Commun. (2020)"},{"issue":"1","key":"29_CR10","doi-asserted-by":"publisher","first-page":"325","DOI":"10.2308\/tar-2017-0425","volume":"96","author":"Y Kim","year":"2021","unstructured":"Kim, Y., Su, L., Wang, Z., Wu, H.: The effect of trade secrets law on stock price synchronicity: evidence from the inevitable disclosure doctrine. Account. Rev. 96(1), 325\u201348 (2021)","journal-title":"Account. Rev."},{"key":"29_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102183","volume":"55","author":"N Iivari","year":"2020","unstructured":"Iivari, N., Sharma, S., Vent\u00e4-Olkkonen, L.: Digital transformation of everyday life-how covid-19 pandemic transformed the basic education of the young generation and why information management research should care? Int. J. Inf. Manag. 55, 102183 (2020)","journal-title":"Int. J. Inf. Manag."},{"issue":"7","key":"29_CR12","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3390\/educsci10070180","volume":"10","author":"D Mhlanga","year":"2020","unstructured":"Mhlanga, D., Moloi, T.: Covid-19 and the digital transformation of education: what are we learning on 4IR in South Africa? Educ. Sci. 10(7), 180 (2020)","journal-title":"Educ. Sci."},{"key":"29_CR13","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.703","volume":"7","author":"I Almomani","year":"2021","unstructured":"Almomani, I., Ahmed, M., Maglaras, L.: Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Comput. Sci. 7, e703 (2021)","journal-title":"PeerJ Comput. Sci."},{"key":"29_CR14","unstructured":"Kaur, R.: Impact of covid-19 on higher education sector: challenges & solutions to university level faculties. Glob. J. Interdisc. Stud. (2020)"},{"issue":"3","key":"29_CR15","first-page":"51","volume":"7","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi, S., Alsaleh, M.: Information security maturity model for nist cyber security framework. Comput. Sci. Inf. Technol. (CS & IT) 7(3), 51\u201362 (2017)","journal-title":"Comput. Sci. Inf. Technol. (CS & IT)"},{"key":"29_CR16","unstructured":"Gerl, A., von der Heyde, M., Gro\u00df, R., Seck, R., Watkowski, L.: Applying cobit 2019 to it governance in higher education (2021)"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Makupi, D., Masese, N.: Determining information security maturity level of an organization based on iso 27001. Int. J. Comput. Sci. Eng. 7(1) (2019)","DOI":"10.24940\/theijbm\/2019\/v7\/i6\/BM1906-038"},{"key":"29_CR18","first-page":"1","volume-title":"Network Security and Its Impact on Business Strategy","author":"W Yaokumah","year":"2019","unstructured":"Yaokumah, W., Dawson, A.A.: Network and data transfer security management in higher educational institutions. In: Network Security and Its Impact on Business Strategy, pp. 1\u201319. IGI Global, Hershey (2019)"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/2547921","volume":"2020","author":"A Aliyu","year":"2020","unstructured":"Aliyu, A., Zubairu, M.B., Hamidu, S., Ameen, Y.M., Ahmed, M.S.: Towards holistic cybersecurity maturity assessment framework (HCYMAF) for higher education institutions. J. Comput. Netw. Commun. 2020, 1\u201315 (2020)","journal-title":"J. Comput. Netw. Commun."},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.25300\/MISQ\/2018\/13853","volume":"42","author":"GD Moody","year":"2018","unstructured":"Moody, G.D., Siponen, M., Pahnila, S.: Toward a unified model of information security policy compliance. MIS Q. 42, 285\u2013311 (2018)","journal-title":"MIS Q."},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Aljuryyed, A.: Cybersecurity issues in the Middle East: case study of the Kingdom of Saudi Arabia. In: Dawson, M., Tabona, O., Maupong, T. (eds.) Cybersecurity Capabilities in Developing Nations and its Impact on Global Security, pp. 62\u201382. IGI Global (2022)","DOI":"10.4018\/978-1-7998-8693-8.ch004"},{"issue":"1","key":"29_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1177\/13540661221115961","volume":"29","author":"MM Evers","year":"2022","unstructured":"Evers, M.M.: Discovering the prize: information, lobbying, and the origins of US-Saudi security relations. Eur. J. Int. Rel. 29(1), 104\u2013128 (2022)","journal-title":"Eur. J. Int. Rel."},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Hengstler, S., Nickerson, R.C., Trang, S.: Towards a taxonomy of information security policy non-compliance behavior. In: Proceedings of the 55th Hawaii International Conference on System Sciences, Maui, HI, USA (2022)","DOI":"10.24251\/HICSS.2022.588"},{"key":"29_CR24","unstructured":"ISOTOOLS. Software para administrar SGSI y otros sistemas (2015). https:\/\/www.isotools.org\/"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84078-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:07:01Z","timestamp":1741806421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84078-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840777","9783031840784"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84078-4_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}