{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:19:36Z","timestamp":1743121176968,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312316"},{"type":"electronic","value":"9783319312323"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31232-3_36","type":"book-chapter","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T01:32:02Z","timestamp":1456795922000},"page":"379-388","source":"Crossref","is-referenced-by-count":1,"title":["A Framework to Assess Information Security Quality of Service Based on a Communicative Action Way of Thinking"],"prefix":"10.1007","author":[{"given":"Ant\u00f3nio","family":"Gon\u00e7alves","sequence":"first","affiliation":[]},{"given":"Anacleto","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Fragoso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,2]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Fenz, S., Goluch, G., Ekelhart, A., Riedl, B., Weippl, E.: Information security fortification by ontological mapping of the ISO\/IEC 27001 standard. In: Dependable Computing, 2007. PRDC 2007. 13th Pacific Rim International Symposium on. pp. 381\u2013388. IEEE (2007).","DOI":"10.1109\/PRDC.2007.29"},{"issue":"1","key":"36_CR2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0022-4359(05)80006-5","volume":"69","author":"Tom J. Brown","year":"1993","unstructured":"Brown, T.J., Churchill, G.A., Peter, J.P.: Improving the measurement of service quality. J. Retail. 69, 127\u2013139 (1993).","journal-title":"Journal of Retailing"},{"key":"36_CR3","unstructured":"Goncalves, A., Correia, A., Fernandes, J.: Service elicitation of non-functional requirements: An approach using activity theory. In: Information Systems and Technologies (CISTI), 2015 10th Iberian Conference on. pp. 1\u20137. IEEE (2015)."},{"issue":"1","key":"36_CR4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSP.2007.11","volume":"5","author":"Wade Baker","year":"2007","unstructured":"Baker, W.H., Wallace, L.: Is information security under control?: Investigating quality in information security management. Secure. Privacy, IEEE. 5, 36\u201344 (2007).","journal-title":"IEEE Security and Privacy Magazine"},{"issue":"4","key":"36_CR5","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1016\/S0378-7206(04)00073-4","volume":"42","author":"Zhilin Yang","year":"2005","unstructured":"Yang, Z., Cai, S., Zhou, Z., Zhou, N.: Development and validation of an instrument to measure user perceived service quality of information presenting Web portals. Inf. Manag. 42, 575\u2013589 (2005).","journal-title":"Information & Management"},{"issue":"4","key":"36_CR6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1177\/002224298504900403","volume":"49","author":"A. Parasuraman","year":"1985","unstructured":"Parasuraman, A., Zeithaml, V.A., Berry, L.L.: A conceptual model of service quality and its implications for future research. J. Mark. 41\u201350 (1985).","journal-title":"Journal of Marketing"},{"key":"36_CR7","first-page":"130","volume-title":"Lecture Notes in Business Information Processing","author":"Jos Geskus","year":"2009","unstructured":"Geskus, J., Dietz, J.: Developing Quality Management Systems with DEMO. In: Aalst, W., Mylopoulos, J., Rosemann, M., Shaw, M., Szyperski, C., Albani, A., Barjis, J., and Dietz, J. (eds.) Advances in Enterprise Engineering III SE - Lecture Notes in Business Information Processing. pp. 130\u2013142. Springer Berlin Heidelberg, Berlin, Heidelberg (2009)."},{"issue":"2","key":"36_CR8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.2307\/249687","volume":"19","author":"Leyland F. Pitt","year":"1995","unstructured":"Pitt, L.F., Watson, R.T., Kavan, C.B.: Service quality: a measure of information systems effectiveness. MIS Q. 173\u2013187 (1995).","journal-title":"MIS Quarterly"},{"issue":"4","key":"36_CR9","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"Lawrence A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438\u2013457 (2002).","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"36_CR10","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2005.23","volume":"3","author":"B. Arkin","year":"2005","unstructured":"Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Secur. Priv. 3, 84\u201387 (2005).","journal-title":"IEEE Security and Privacy Magazine"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Dietz, J.: Enterprise Ontology: Theory and Methodology. Springer (2006).","DOI":"10.1007\/3-540-33149-2"},{"key":"36_CR12","unstructured":"Correia, A.C. e: Quality of process modeling using BPMN: a model-driven approach, http:\/\/run.unl.pt\/handle\/10362\/12205, (2014)."},{"key":"36_CR13","unstructured":"Basili, V.R.: Software modeling and measurement: the Goal\/Question\/Metric paradigm. (1992)."},{"key":"36_CR14","unstructured":"Polanyi, M.: Tacit Dimension. Peter Smith Publisher Inc (1983)."},{"issue":"1","key":"36_CR15","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/291224.291229","volume":"6","author":"Hugh Beyer","year":"1999","unstructured":"Beyer, H., Holtzblatt, K.: Contextual design. interactions. 6, 32\u201342 (1999).","journal-title":"interactions"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Boone, H.N., Boone, D.A.: Analyzing likert data. J. Ext. 50, 1\u20135 (2012).","DOI":"10.34068\/joe.50.02.48"}],"container-title":["Advances in Intelligent Systems and Computing","New Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31232-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T02:26:15Z","timestamp":1692239175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31232-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312316","9783319312323"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31232-3_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}