{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:01:52Z","timestamp":1746331312435,"version":"3.40.4"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_2","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"11-19","source":"Crossref","is-referenced-by-count":3,"title":["Information Security Management for Higher Education Institutions"],"prefix":"10.1007","author":[{"given":"Simon K. S.","family":"Cheung","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Bishop, M.: Computer Security, Art and Science. Addison-Wesley (2003)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Raggad, B.G.: Information Security Management: Concepts and Practices. CRC Press (2010)","DOI":"10.1201\/9781439882634"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Peltier, T.: Information Security Policies and Procedures: A Practitioner\u2019s Reference. CRC Press (2004)","DOI":"10.1201\/9780203488737"},{"key":"2_CR4","unstructured":"Parker, D.B.: Toward a New Framework for Information Security. In: Kabay, M.E. (ed.) The Computer Security Handbook. John Wiley (2002)"},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/S0167-4048(03)00407-3","volume":"22","author":"J.M. Anderson","year":"2003","unstructured":"Anderson, J.M.: Why We Need a New Definition of Information Security. Computer and Security\u00a022(4), 308\u2013313 (2003)","journal-title":"Computer and Security"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Matbouli, H., Gao, Q.: An Overview on Web Security Threats and Impact to e-Commerce Success. In: Proceedings of the International Conference on Information Technology and e-Services, pp. 1\u20136. IEEE Press (2012)","DOI":"10.1109\/ICITeS.2012.6216645"},{"key":"2_CR7","unstructured":"Singh, S., Karaulia, D.S.: E-Governance: Information Security Issues. In: Proceedings of the International Conference on Computer Science and Information Technology, pp. 120\u2013124. IEEE Press (2011)"},{"issue":"1","key":"2_CR8","first-page":"9","volume":"15","author":"M.S. Hwang","year":"2004","unstructured":"Hwang, M.S., Li, C.T., Shen, J.J., Chu, Y.P.: Challenges in e-Government and Security of Information. Information & Security\u00a015(1), 9\u201320 (2004)","journal-title":"Information & Security"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Barth, A., Lam, P.E., Mitchell, J.: Towards a Formal Foundation of Web Security. In: Proceedings of the IEEE Symposium on Computer Security Foundations, pp. 290\u2013304. IEEE Press (2010)","DOI":"10.1109\/CSF.2010.27"},{"key":"2_CR10","unstructured":"Pansa, D., Chomsiri, T.: Web Security Improvement by using Dynamic Password Authentication. In: Proceedings of the International Conference on Network and Electronic Engineering, pp. 32\u201336. IACSIT Press (2011)"},{"issue":"8","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1109\/TIFS.2013.2270106","volume":"8","author":"C.M. Chen","year":"2013","unstructured":"Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices. IEEE Transactions on Information Forensics and Security\u00a08(8), 1318\u20131330 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.eswa.2013.07.068","volume":"41","author":"C.M. Chen","year":"2014","unstructured":"Chen, C.M., Chen, Y.H., Lin, Y.H., Sun, H.M.: Eliminating Rouge Femtocells based on Distance Bounding Protocol and Geographic Information. Expert Systems with Applications\u00a041(2), 426\u2013433 (2014)","journal-title":"Expert Systems with Applications"},{"key":"2_CR13","unstructured":"Cheung, K.S.: Development of Organizational Information Security Policies. In: Proceedings of the International Conference on Intelligent Computing and Intelligent Systems, pp. 753\u2013756. IEEE Press (2011)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Cheung, K.S.: A Comparison of WebCT, Blackboard and Moodle for the Teaching and Learning of Continuing Education Courses. In: Tsang, P., et al. (eds.) Enhancing Learning Through Technology, pp. 219\u2013228. World Scientific (2006)","DOI":"10.1142\/9789812772725_0018"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-03697-2_20","volume-title":"Hybrid Learning and Education","author":"J. Yau","year":"2009","unstructured":"Yau, J., Lam, J., Cheung, K.S.: A Review of E-Learning Platforms in the Age of E-Learning 2.0. In: Wang, F.L., Fong, J., Zhang, L., Lee, V.S.K. (eds.) ICHL 2009. LNCS, vol.\u00a05685, pp. 208\u2013217. Springer, Heidelberg (2009)"},{"issue":"1","key":"2_CR16","first-page":"103","volume":"2","author":"K.S. Cheung","year":"2009","unstructured":"Cheung, K.S., Lam, J., Yau, J.: A Review of Functional Features of E-Learning Platform in the Continuing Education Context. International Journal of Continuing Education and Lifelong Learning\u00a02(1), 103\u2013116 (2009)","journal-title":"International Journal of Continuing Education and Lifelong Learning"},{"issue":"7","key":"2_CR17","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.cose.2008.07.008","volume":"27","author":"Y. Rezgui","year":"2008","unstructured":"Rezgui, Y., Marks, A.: Information Security Awareness in Higher Education: An Exploratory Study. Computers & Security\u00a027(7), 241\u2013253 (2008)","journal-title":"Computers & Security"},{"key":"2_CR18","unstructured":"Kvavik, R.B.: Information Technology Security: Governance, Strategy and Practice in Higher Education, Center for Applied Research, EDUCAUSE (2004)"},{"key":"2_CR19","unstructured":"Kam, H.J., Katerattanakul, P., Gogolin, G., Hong, S.: Information Security Policy Compliance in Higher Education: A Neo-Institutional Perspective. In: Proceedings of the Pacific Asia Conference on Information Systems. Association for Information Systems (2013)"},{"key":"2_CR20","unstructured":"OGCIO, Baseline IT Security Policy, The Office of the Government Chief Information Officer, The Government of the Hong Kong Special Administrative Region, Hong Kong (2009)"},{"key":"2_CR21","unstructured":"ISO, ISO 27000 : Information Security Management System : Family of Standards, Joint Technical Committee, International Organization for Standardization and International Electrotechnical Commission (2005)"},{"key":"2_CR22","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-04062-7_2","volume-title":"Global Security, Safety, and Sustainability","author":"C. Onwubiko","year":"2009","unstructured":"Onwubiko, C.: A Security Audit Framework for Security Management in the Enterprise. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds.) ICGS3 2009. CCIS, vol.\u00a045, pp. 9\u201317. Springer, Heidelberg (2009)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Lo, E.C., Marchand, M.: Security Audit: A Case Study. In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 193\u2013196. IEEE Press (2004)","DOI":"10.1109\/CCECE.2004.1344989"},{"key":"2_CR24","unstructured":"Kelson, N.: Information Security Management Audit and Assurance Programme. In: ISACA (2010)"},{"key":"2_CR25","unstructured":"ISO, ISO 27007 : Guidelines for Information Security Management Systems Auditing, Joint Technical Committee, International Organization for Standardization and International Electrotechnical Commission (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T03:22:20Z","timestamp":1746242540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}