{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:45:32Z","timestamp":1747853132218,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322860"},{"type":"electronic","value":"9783642322877"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32287-7_5","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T06:35:41Z","timestamp":1345444541000},"page":"50-64","source":"Crossref","is-referenced-by-count":1,"title":["Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process"],"prefix":"10.1007","author":[{"given":"Kashif","family":"Syed","sequence":"first","affiliation":[]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[]},{"given":"Dale","family":"Lindskog","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Ruhl","sequence":"additional","affiliation":[]},{"given":"Shaun","family":"Aghili","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Khanmohammadi, K., Houmb, S.H.: Business Process-based Information Security Risk Assessment. In: 4th International Conference on Network and System Security (2010), http:\/\/ieeexplore.ieee.org\/xpl\/freeabs_all.jsp?arnumber=5635519"},{"key":"5_CR2","unstructured":"Shappell, S.A.: The Human Factors Analysis and Classification System (HFACS), National Technical Information Service, Springfield, Virginia (2000), http:\/\/www.nifc.gov\/fireInfo\/fireInfo_documents\/humanfactors_classAnly.pdf"},{"key":"5_CR3","unstructured":"NIST SP 800-53 Rev.3 Recommended Security Controls for Federal Information Systems and Organizations (2009), http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-53-Rev3\/sp800-53-rev3-final_updated-errata_05-01-2010.pdf"},{"key":"5_CR4","unstructured":"FIPS PUB 199 Standards for Security Categorization of Federal Information and Information Systems (2004)"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0167-4048(01)00305-4","volume":"20","author":"B.V. Solms","year":"2001","unstructured":"Solms, B.V.: Corporate Governance and Information Security. Computer and Security\u00a020, 215\u2013218 (2001)","journal-title":"Computer and Security"},{"key":"5_CR6","unstructured":"NIST SP 800-53A Rev.1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans, http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-53A-rev1\/sp800-53A-rev1-final.pdf"},{"key":"5_CR7","unstructured":"An Introduction to the Business Model for Information Security. Information Systems Audit and Control Association, ISACA (2009), http:\/\/www.isaca.org\/Knowledge-Center\/Research\/Documents\/Intro-Bus-Model-InfoSec-22Jan09-Research.pdf"},{"key":"5_CR8","unstructured":"Catano, V.M., et al.: Recruitment and Selection in Canada, 3rd edn., Toronto, Canada, pp. 3\u201311. Thomson Nelson (2005)"},{"key":"5_CR9","unstructured":"Flouris, T., Yilmaz, K.A.: The risk management framework to strategic human resource management. International Research Journal of Finance and Economics 36 (2010), http:\/\/www.eurojournals.com\/irjfe_36_03.pdf"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Rezende, R.V., Carvalho, C.S.: Selection of executives through in-house recruitment. In: Engineering Management Conference, Sao Paolo, pp. 356\u2013359 (1994)","DOI":"10.1109\/IEMC.1994.379910"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Dafoulas, G.A., Nikolau, A., Turega, M.: E-Service in the internet job market. In: 36th Hawaii International Conference on System Sciences (2003), http:\/\/www.hicss.hawaii.edu\/HICSS36\/HICSSpapers\/DTESS04.pdf","DOI":"10.1109\/HICSS.2003.1174191"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Ruskova, N.: Decision Support System for Human Resource Appraisal and Selection. In: 1st International IEEE Symposium on Intelligent Systems, vol.\u00a01, pp. 354\u2013357 (2002)","DOI":"10.1109\/IS.2002.1044281"},{"key":"5_CR13","unstructured":"Dart, D.: What Are the Real Costs of a Bad Hire? Ezine Articles, http:\/\/ezinearticles.com\/?What-Are-The-Real-Costs-of-a-Bad-Hire?&id=6421866"},{"key":"5_CR14","unstructured":"Yager, F.: Costs of Hiring the Wrong Person Go beyond the Financial. eFinancialCareers (2011), http:\/\/news.efinancialcareers.com\/News_ITEM\/newsItemId-35369"},{"key":"5_CR15","unstructured":"Bardin, J.: The Brave New World of InfoSec, Moving to a Risk-Based Organization \u2013 NIST 800-37 Revision 1 (2010), http:\/\/blogs.csoonline.com\/1188\/moving_to_a_risk_based_organization_nist-800_37_rev_1"},{"issue":"3","key":"5_CR16","first-page":"35","volume":"34","author":"R. Barner","year":"2000","unstructured":"Barner, R.: Talent Wars in the Executive Suite. The Futurist\u00a034(3), 35 (2000), http:\/\/www.allbusiness.com\/management\/534851-1.html","journal-title":"The Futurist"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32287-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:59:46Z","timestamp":1743983986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32287-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322860","9783642322877"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32287-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}