{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:21:22Z","timestamp":1742937682668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319213828"},{"type":"electronic","value":"9783319213835"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21383-5_106","type":"book-chapter","created":{"date-parts":[[2015,7,19]],"date-time":"2015-07-19T22:42:15Z","timestamp":1437345735000},"page":"637-642","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Assurance Practices in Saudi Arabian Organizations"],"prefix":"10.1007","author":[{"given":"Abdulaziz","family":"Alarifi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"106_CR1","volume-title":"Database Security and Auditing: Protecting Data Integrity and Accessibility","author":"H Afyouni","year":"2006","unstructured":"Afyouni, H.: Database Security and Auditing: Protecting Data Integrity and Accessibility. Thomson Course, Canada (2006)"},{"key":"106_CR2","volume-title":"Network Security: The Complete Reference","author":"R Bragg","year":"2004","unstructured":"Bragg, R., Ousley, M., Strassberg, K.: Network Security: The Complete Reference. Coral Ventura, Newbury Park (2004)"},{"key":"106_CR3","volume-title":"Computer Security Fundamentals","author":"C Easttom","year":"2006","unstructured":"Easttom, C.: Computer Security Fundamentals. Pearson Prentice Hall, New York (2006)"},{"key":"106_CR4","volume-title":"Information Security Technology for Management: Improving Quality and Productivity","author":"E Turban","year":"1996","unstructured":"Turban, E., Wetherbe, J., McLean, E.: Information Security Technology for Management: Improving Quality and Productivity, 3rd edn. Wiley, Hoboken (1996)","edition":"3"},{"key":"106_CR5","volume-title":"Computer Security Principles and Practice","author":"W Stallings","year":"2008","unstructured":"Stallings, W., Brown, L.: Computer Security Principles and Practice. Pearson Education, New York (2008)"},{"key":"106_CR6","volume-title":"Management of Information Security","author":"M Whitman","year":"2008","unstructured":"Whitman, M., Mattord, H.: Management of Information Security. Thomson Course Technology, Canada (2008)"},{"key":"106_CR7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M Siponen","year":"2000","unstructured":"Siponen, M.: A conceptual foundation for organizational: information security awareness. Inf. Manage. Comput. Secur. 8, 31\u201341 (2000)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"106_CR8","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1108\/09685221011095236","volume":"18","author":"H Kruger","year":"2010","unstructured":"Kruger, H., Drvein, L., Steyn, T.: A vocabulary test to assess information security awareness. Inf. Manage. Comput. Secur. 18, 316\u2013327 (2010)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"106_CR9","unstructured":"Kaspersky Security Bulletin (2011). \n                    http:\/\/www.kaspersky.com\/reading_room?chapter=207716858\n                    \n                   Accessed 3 January 2012"},{"key":"106_CR10","volume-title":"Research design: Qualitative, Quantitative, and Mixed Method Approaches","author":"J Creswell","year":"2003","unstructured":"Creswell, J.: Research design: Qualitative, Quantitative, and Mixed Method Approaches. Sage Publications, California (2003)"},{"key":"106_CR11","volume-title":"Doing Case Study Research","author":"D Hancock","year":"2006","unstructured":"Hancock, D., Algozzine, B.: Doing Case Study Research. Teachers College Press, New York (2006)"},{"volume-title":"Securing Information and Communication Systems: Principles, Technologies, and Applications","year":"2008","key":"106_CR12","unstructured":"Furnell, S., Katsikas, S., Lopez, J., Patel, A. (eds.): Securing Information and Communication Systems: Principles, Technologies, and Applications. Artech House, Norwood (2008)"},{"key":"106_CR13","volume-title":"NSPW (National Secuirty Paradigms Workshop) Proceedings of the 2001 Workshop on New Security Paradigms","author":"D Weirich","year":"2001","unstructured":"Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Raskin, V., Greenwald, S.J., Timmerman, B., Kienzle, D.M. (eds.) NSPW (National Secuirty Paradigms Workshop) Proceedings of the 2001 Workshop on New Security Paradigms. Association for Computing Machinery (ACM), New York (2001). Cloudcroft, New Mexico, 10\u201313 September 2001"},{"key":"106_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNSM.2004.4623689","volume":"1","author":"ES Al-Shaer","year":"2004","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Modeling and management of firewall policies. IEEE Trans. Netw. Serv. Manage. 1, 2\u201310 (2004)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"106_CR15","volume-title":"Network\u00a0+\u00a0Fast Pass","author":"B Ferguson","year":"2005","unstructured":"Ferguson, B.: Network\u00a0+\u00a0Fast Pass. SYBEX, Alameda (2005)"},{"key":"106_CR16","volume-title":"The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity","author":"A Calder","year":"2006","unstructured":"Calder, A.: Information security training. In: Reuvid, J. (ed.) The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity. Kogan Page, Philadelphia (2006)"}],"container-title":["Communications in Computer and Information Science","HCI International 2015 - Posters\u2019 Extended Abstracts"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21383-5_106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:07:01Z","timestamp":1582409221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21383-5_106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319213828","9783319213835"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21383-5_106","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}