{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:19Z","timestamp":1761621019489},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037474"},{"type":"electronic","value":"9783642037481"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03748-1_10","type":"book-chapter","created":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T05:10:34Z","timestamp":1250917834000},"page":"95-104","source":"Crossref","is-referenced-by-count":2,"title":["Steering Security through Measurement"],"prefix":"10.1007","author":[{"given":"Jose M.","family":"Torres","sequence":"first","affiliation":[]},{"given":"Jose M.","family":"Sarriegi","sequence":"additional","affiliation":[]},{"given":"Josune","family":"Hernantes","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Lauge","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","volume-title":"TECNUN","author":"J.M. Torres","year":"2007","unstructured":"Torres, J.M.: ISSMF. An Information System Security Management Framework for SMEs. In: TECNUN. University of Navarra, Donostia (2007)"},{"key":"10_CR2","unstructured":"Sademies, A.: Process Approach to Information Security Metrics in Finnish Industry and State Institutions. Espoo (2004)"},{"key":"10_CR3","unstructured":"Santos, J., Sarriegi, J.M., Torres, J.M., Serrano, N.: Empirical study of the Information Systems Security Management in Basque Country SMEs. In: Proceedings of the 8th International Conference of the DS - IESE, pp. 884\u2013893 (2005)"},{"key":"10_CR4","unstructured":"Berinato, S., Cosgrove, L.: Six Secrets of Highly Secure Organizations. CIO magazine (2004)"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.cose.2005.05.002","volume":"24","author":"M. Theoharidou","year":"2005","unstructured":"Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to information systems and the effectiveness of ISO17799. Computers & Security\u00a024, 472\u2013484 (2005)","journal-title":"Computers & Security"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/S0167-4048(01)00813-6","volume":"20","author":"G. Dhillon","year":"2001","unstructured":"Dhillon, G., Moores, S.: Computer crimes: theorizing about the enemy within. Computers & Security\u00a020, 715\u2013723 (2001)","journal-title":"Computers & Security"},{"key":"10_CR7","volume-title":"The Art of Deception. Indianapolis","author":"K. Mitnick","year":"2002","unstructured":"Mitnick, K.: The Art of Deception. Indianapolis. John Wiley Inc., Indiana (2002)"},{"key":"10_CR8","volume-title":"Beyond Fears","author":"B. Schneier","year":"2003","unstructured":"Schneier, B.: Beyond Fears. Copernicus Book ed., New York (2003)"},{"key":"10_CR9","unstructured":"Caralli, R.A.: The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management, Report CMU\/SEI-2004-TR-010 (2004)"},{"key":"10_CR10","unstructured":"Dojkovski, S., Lichtenstein, S., Warren, M.J.: Fostering Information Security Culture in Small and Medium Size Enterprises: An Interpretive Study in Australia. In: Proceedings of the Fifteenth European Conference on Information Systems, St. Gallen, Switzerland, pp. 1560\u20131571 (2007)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03748-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T13:33:14Z","timestamp":1552138394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03748-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037474","9783642037481"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03748-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}