{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:08:56Z","timestamp":1725898136542},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642297519"},{"type":"electronic","value":"9783642297526"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-29752-6_24","type":"book-chapter","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T06:22:01Z","timestamp":1357107721000},"page":"324-334","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Information Security Effectiveness with Health Professionals"],"prefix":"10.1007","author":[{"given":"Robin","family":"Krens","sequence":"first","affiliation":[]},{"given":"Marco","family":"Spruit","sequence":"additional","affiliation":[]},{"given":"Nathalie","family":"Urbanus","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"24_CR1","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.istr.2008.10.006","volume":"13","author":"D. Ashenden","year":"2008","unstructured":"Ashenden, D.: Information security management: A human challenge? Information Security Technical Report\u00a013(4), 195\u2013201 (2008)","journal-title":"Information Security Technical Report"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S1386-5056(98)00006-9","volume":"49","author":"B. Barber","year":"1998","unstructured":"Barber, B.: Patient data and security: an overview. International Journal of Medical Informatics\u00a049(1), 19\u201330 (1998)","journal-title":"International Journal of Medical Informatics"},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1046\/j.1365-2575.2001.00099.x","volume":"11","author":"G. Dhillon","year":"2001","unstructured":"Dhillon, G., Backhouse, J.: Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal\u00a011(2), 127\u2013154 (2001)","journal-title":"Information Systems Journal"},{"issue":"12","key":"24_CR4","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.ijmedinf.2009.08.006","volume":"78","author":"J.I. Fernando","year":"2009","unstructured":"Fernando, J.I., Dawson, L.L.: The health information system security threat lifecycle: An informatics theory. International Journal of Medical Informatics\u00a078(12), 815\u2013826 (2009)","journal-title":"International Journal of Medical Informatics"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.ijmedinf.2010.01.009","volume":"79","author":"A. Ferreira","year":"2010","unstructured":"Ferreira, A., Antunes, L., Chadwick, D., Correia, R.: Grounding information security in healthcare. International Journal of Medical Informatics\u00a079(4), 268\u2013283 (2010)","journal-title":"International Journal of Medical Informatics"},{"key":"24_CR6","unstructured":"Gollman, D.: Computer Security, 1st edn. John Wiley & Sons (1999)"},{"issue":"2","key":"24_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S1386-5056(00)00115-5","volume":"60","author":"N. Gaunt","year":"2000","unstructured":"Gaunt, N.: Practical approaches to creating a security culture. International Journal of Medical Informatics\u00a060(2), 151\u2013157 (2000)","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"24_CR8","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A.R. Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Quarterly\u00a028(1), 75\u2013105 (2004)","journal-title":"MIS Quarterly"},{"key":"24_CR9","unstructured":"International Organization for Standardization. Information technology \u2013 security techniques \u2013 code of practice for information security management. Technical Report ISO\/IEC 27002:2005 (2005)"},{"key":"24_CR10","first-page":"1483","volume-title":"Human factors and the Ergonomics Environment","author":"S. Kraemer","year":"2005","unstructured":"Kraemer, S., Carayon, P.: Computer and information security culture: Findings from two studies. In: Human factors and the Ergonomics Environment, pp. 1483\u20131487. Human Factors and the Ergonomics Society, Orlando (2005)"},{"issue":"4","key":"24_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/S0167-4048(00)04021-9","volume":"19","author":"J.D. Nosworthy","year":"2000","unstructured":"Nosworthy, J.D.: Implementing information security in the 21st century do you have the balancing factors? Computers & Security\u00a019(4), 337\u2013347 (2000)","journal-title":"Computers & Security"},{"key":"24_CR12","unstructured":"OECD: Guidelines for the security of information systems and networks: Towards a culture of security. Technical report, Organization for Economic Cooperation and Development, Paris (2002)"},{"key":"24_CR13","unstructured":"Parker, D., Hudson, P.T.: HSE: Understanding your culture. Shell International Exploration and Production EP 2001 - 5124 (2001)"},{"key":"24_CR14","first-page":"21","volume-title":"Qualitative research in health care, chapter Focus Groups","year":"2006","unstructured":"Pope, C., Mays, N., Kitzinger, J. (eds.): Qualitative research in health care, chapter Focus Groups, 3rd edn., pp. 21\u201331. Blackwell Publishing, Oxford (2006)","edition":"3"},{"key":"24_CR15","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-662-02933-6_13","volume-title":"Verification and Identification of Complex Systems: Human Factor Issues","author":"J. Reason","year":"1993","unstructured":"Reason, J.: The identification of latent organizational failures in complex systems. In: Wise, J.A., Hopkin, V.D., Stager, P. (eds.) Verification and Identification of Complex Systems: Human Factor Issues, pp. 223\u2013237. Springer, New York (1993)"},{"issue":"3","key":"24_CR16","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1057\/palgrave.ejis.3000537","volume":"14","author":"M.T. Siponen","year":"2005","unstructured":"Siponen, M.T.: An analysis of the traditional IS security approaches: implications for research and practice. European Journal of Information Systems\u00a014(3), 305\u2013315 (2005)","journal-title":"European Journal of Information Systems"},{"issue":"8","key":"24_CR17","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1145287.1145316","volume":"49","author":"M.T. Siponen","year":"2006","unstructured":"Siponen, M.T.: Information security standards focus on the existence of process, not its content. Communications of the ACM\u00a049(8), 97\u2013100 (2006)","journal-title":"Communications of the ACM"},{"key":"24_CR18","volume-title":"Information security: principles and practice","author":"M. Stamp","year":"2006","unstructured":"Stamp, M.: Information security: principles and practice, 2nd edn. John Wiley & Sons, Hoboken (2006)","edition":"2"},{"key":"24_CR19","unstructured":"University of Manchester and National Patient Safety Agency: Manchester Patient Safety Framework MaPSaF, \n                    \n                      http:\/\/www.nrls.npsa.nhs.uk"},{"key":"24_CR20","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/978-3-662-02933-6_25","volume-title":"Verification and Validation in Complex Man-machine Systems","author":"R. Westrum","year":"1993","unstructured":"Westrum, R.: Cultures with requisite imagination. In: Wise, J.A., Hopkin, V.D., Stager, P. (eds.) Verification and Validation in Complex Man-machine Systems, pp. 401\u2013416. Springer, New York (1993)"},{"issue":"3","key":"24_CR21","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1177\/1081180X08092831","volume":"14","author":"P.A.H. Williams","year":"2008","unstructured":"Williams, P.A.H.: When trust defies common security sense. Health Informatics Journal\u00a014(3), 211\u2013221 (2008)","journal-title":"Health Informatics Journal"}],"container-title":["Communications in Computer and Information Science","Biomedical Engineering Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29752-6_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:15:04Z","timestamp":1620126904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29752-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642297519","9783642297526"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29752-6_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}