{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:40:40Z","timestamp":1725975640245},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_3","type":"book-chapter","created":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:02:48Z","timestamp":1524538968000},"page":"32-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development"],"prefix":"10.1007","author":[{"given":"Yeslam","family":"Al-Saggaf","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"3_CR1","unstructured":"Acumen Insurance Brokers. \nhttp:\/\/acumeninsurance.com.au\/2017\/03\/14\/cybercrime-costs-the-australian-economy-over-4-5-billion-annually-and-is-now-in-the-top-5-risks-faced-by-businesses\/"},{"key":"3_CR2","unstructured":"Australian Crime Commission. \nhttps:\/\/www.acic.gov.au\/sites\/g\/files\/net1491\/f\/2016\/06\/oca2015.pdf"},{"key":"3_CR3","unstructured":"Australian Cyber Security Centre. \nhttps:\/\/www.acsc.gov.au\/publications\/ACSC_Cyber_Security_Survey_2016.pdf"},{"key":"3_CR4","unstructured":"Juniper Research. \nhttps:\/\/www.juniperresearch.com\/press\/press-releases\/cybercrime-cost-businesses-over-2trillion"},{"key":"3_CR5","unstructured":"Australian Cybercrime Online Reporting Network. \nhttps:\/\/www.acorn.gov.au\/resources"},{"key":"3_CR6","unstructured":"Lucas, R., Weckert, J.: Regulation in the IT industry. Centre for Applied Philosophy and Public Ethics, Canberra (2008)"},{"issue":"2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s11948-005-0047-7","volume":"11","author":"D Sherratt","year":"2005","unstructured":"Sherratt, D., Rogerson, S., Fairweather, B.: The challenge of raising ethical awareness: a case-based aiding system for use by computing and IT students. Sci. Eng. Ethics 11(2), 299\u2013315 (2005)","journal-title":"Sci. Eng. Ethics"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1016\/j.compedu.2009.05.011","volume":"53","author":"I Jung","year":"2009","unstructured":"Jung, I.: Ethical judgments and behaviors: applying a multidimensional ethics scale to measuring IT ethics of college students. Comput. Educ. 53(3), 940\u2013949 (2009)","journal-title":"Comput. Educ."},{"issue":"3","key":"3_CR9","first-page":"1","volume":"22","author":"Y Al-Saggaf","year":"2012","unstructured":"Al-Saggaf, Y., Burmeister, O.K.: Improving skill development: an exploratory study comparing a philosophical and an applied ethical analysis technique. J. Comput. Sci. Educ. 22(3), 1\u201319 (2012)","journal-title":"J. Comput. Sci. Educ."},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/298752.298756","volume":"29","author":"JJ Cappel","year":"1998","unstructured":"Cappel, J.J., Windsor, J.C.: A comparative investigation of ethical decision making: Information systems professionals versus students. Database Adv. Inf. Syst. 29(2), 20\u201334 (1998)","journal-title":"Database Adv. Inf. Syst."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Van den Bergh, J., Deschoolmeester, D.: Ethical decision making in IT: discussing the impact of an ethical code of conduct. Commun. IBIMA, 1\u201310 (2010)","DOI":"10.5171\/2010.127497"},{"key":"3_CR12","unstructured":"McLaughlin, S., Sherry, M., Carcary, M., O\u2019Brien, C.: e-Skills and IT Professionalism: Fostering the IT Profession in Europe. Final report. Maynooth, Innovation Value Institute, National University of Ireland (2012)"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1108\/14779960810921141","volume":"6","author":"R Lucas","year":"2008","unstructured":"Lucas, R., Mason, N.: A survey of ethics and regulation within the IT industry in Australia: ethics education. J. Inf. Commun. Ethics Soc. 6(4), 349\u2013363 (2008)","journal-title":"J. Inf. Commun. Ethics Soc."},{"key":"3_CR14","unstructured":"Ethics Resource Center. \nhttp:\/\/www.ethics.org\/ecihome\/research\/nbes\/nbes-reports\/nbes-2013"},{"key":"3_CR15","unstructured":"Lucas, R., Bowern, M.: Ethics survey: haste sours quality in IT. Information Age, June\/July 2007, pp. 28\u201330 (2007)"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/151220.151231","volume":"36","author":"RE Anderson","year":"1993","unstructured":"Anderson, R.E., Johnson, D.G., Gotterbarn, D., Perrolle, J.: Using the new ACM code of ethics in decision making. Commun. ACM 36(1), 98\u2013107 (1993)","journal-title":"Commun. ACM"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-14992-4_18","volume-title":"Financial Cryptography and Data Security","author":"KR Fleischmann","year":"2010","unstructured":"Fleischmann, K.R.: Preaching what we practice: teaching ethical decision-making to computer security professionals. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 197\u2013202. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-14992-4_18"},{"issue":"2\u20134","key":"3_CR18","first-page":"546","volume":"27","author":"H Khanifar","year":"2012","unstructured":"Khanifar, H., Jandaghi, G., Bordbar, H.: The professional and applied ethics constituents of IT specialist and users. Eur. J. Soc. Sci. 27(2\u20134), 546\u2013552 (2012)","journal-title":"Eur. J. Soc. Sci."},{"issue":"2","key":"3_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.5465\/AME.1989.4274762","volume":"3","author":"RP Nielsen","year":"1989","unstructured":"Nielsen, R.P.: Changing unprofessional organizational behavior. Acad. Manag. Exec. 3(2), 123\u2013130 (1989)","journal-title":"Acad. Manag. Exec."},{"issue":"7","key":"3_CR20","first-page":"57","volume":"6","author":"N Jamil","year":"2009","unstructured":"Jamil, N., Susanto, E.: Preventing unprofessional behavior of firms\u2019 managers through shame as a corporate culture. J. US-China Public Adm. 6(7), 57\u201364 (2009)","journal-title":"J. US-China Public Adm."},{"issue":"3","key":"3_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1108\/14779960380000231","volume":"3","author":"OK Burmeister","year":"2003","unstructured":"Burmeister, O.K., Weckert, J.: Applying the new software engineering code of ethics to usability engineering: a study of 4 cases. J. Inf. Commun. Ethics Soc. 3(3), 119\u2013132 (2003)","journal-title":"J. Inf. Commun. Ethics Soc."},{"issue":"6","key":"3_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MC.2009.204","volume":"42","author":"D Gotterbarn","year":"2009","unstructured":"Gotterbarn, D., Miller, K.: The public is the priority: making decisions using the software engineering code of ethics. IEEE Comput. 42(6), 66\u201373 (2009)","journal-title":"IEEE Comput."},{"issue":"3","key":"3_CR23","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1080\/00049670.2005.10721766","volume":"54","author":"S Ferguson","year":"2005","unstructured":"Ferguson, S., Salmond, R., Al-Saggaf, Y., Bowern, M., Weckert, J.: The use of case studies in professional codes of ethics: the relevance of the ACS experience to ALIA\u2019s code of ethics. Aust. Libr. J. 54(3), 299\u2013308 (2005)","journal-title":"Aust. Libr. J."},{"issue":"1","key":"3_CR24","first-page":"25","volume":"1","author":"M Maslin","year":"2010","unstructured":"Maslin, M., Zuraini, I., Ramlah, H., Norshidah, M.: An ethical assessment of computer ethics using scenario approach. Int. J. Electron. Commer. Stud. 1(1), 25\u201336 (2010)","journal-title":"Int. J. Electron. Commer. Stud."},{"key":"3_CR25","first-page":"197","volume-title":"Education and Ethics in the Life Sciences: Strengthening the Prohibition of Biological Weapons","author":"J Johnson","year":"2010","unstructured":"Johnson, J.: Teaching ethics to science students: challenges and a strategy. In: Rappert, B. (ed.) Education and Ethics in the Life Sciences: Strengthening the Prohibition of Biological Weapons, pp. 197\u2013213. ANU E Press, Canberra (2010)"},{"key":"3_CR26","unstructured":"Seach, G.R., Cattaneo, M., Burmeister, O.K.: Teaching ethics to IT practitioners. In: 6th International Conference of the Australian Institute of Computer Ethics, Burwood, Victoria (2012)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T03:04:46Z","timestamp":1524539086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}