{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T21:16:17Z","timestamp":1773954977931,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T00:00:00Z","timestamp":1510704000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100009527","name":"Myndigheten f\u00f6r Samh\u00e4llsskydd och Beredskap","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009527","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11948-017-9992-1","type":"journal-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T11:07:09Z","timestamp":1510744029000},"page":"419-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Defining Information Security"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5830-3432","authenticated-orcid":false,"given":"Bj\u00f6rn","family":"Lundgren","sequence":"first","affiliation":[]},{"given":"Niklas","family":"M\u00f6ller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,15]]},"reference":[{"key":"9992_CR1","unstructured":"Adriaans, P. (2013). Information. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Fall 2013 ed.). \n                    http:\/\/plato.stanford.edu\/archives\/fall2013\/entries\/information\/\n                    \n                  ."},{"key":"9992_CR2","volume-title":"Introduction to computer security","author":"M Bishop","year":"2005","unstructured":"Bishop, M. (2005). Introduction to computer security. Boston: Addison-Wesley."},{"key":"9992_CR3","volume-title":"Information security management handbook","author":"MT Chapman","year":"2004","unstructured":"Chapman, M. T. (2004). Wireless security mayhem: Restraining the insanity of convenience. In H. F. Tipton & M. Krause (Eds.), Information security management handbook (5th ed.). Boca Raton: Auerbach.","edition":"5"},{"key":"9992_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S0167-4048(01)00209-7","volume":"20","author":"G Dhillon","year":"2001","unstructured":"Dhillon, G. (2001a). Violations of safegaurds by trusted personnel and understanding related information security concerns. Computers & Security,\n                           20, 165\u2013172.","journal-title":"Computers & Security"},{"key":"9992_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/978-1-878289-78-0","volume-title":"Information security management: Global challenges in the new millennium","author":"G Dhillon","year":"2001","unstructured":"Dhillon, G. (2001b). Challenges in managing information security in the new millennium. In G. Dhillon (Ed.), Information security management: Global challenges in the new millennium (pp. 1\u20139). Hershey, PA: IGI Global."},{"key":"9992_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G Dhillon","year":"2000","unstructured":"Dhillon, G., & Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM,\n                           43, 125\u2013128.","journal-title":"Communications of the ACM"},{"issue":"3","key":"9992_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","volume":"16","author":"G Dhillon","year":"2006","unstructured":"Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal,\n                           16(3), 293\u2013314.","journal-title":"Information Systems Journal"},{"key":"9992_CR8","volume-title":"Thinking how to live","author":"A Gibbard","year":"2003","unstructured":"Gibbard, A. (2003). Thinking how to live. Cambridge: Harvard University Press."},{"key":"9992_CR9","unstructured":"Gupta, A. (2015). Definitions. In: E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Summer 2015 ed.). \n                    http:\/\/plato.stanford.edu\/archives\/sum2015\/entries\/definitions\/\n                    \n                  ."},{"key":"9992_CR10","doi-asserted-by":"crossref","unstructured":"Horgan, T., & Timmons, M. (1990\u20131991). New wave moral realism meets moral twin earth. Journal of Philosophical Research, 16, 447\u2013465.","DOI":"10.5840\/jpr_1991_19"},{"key":"9992_CR11","unstructured":"ISO\/IEC 27000. (2016). Information technology\u2013Security techniques\u2013Information security management systems\u2013Overview and vocabulary. \n                    https:\/\/www.iso.org\/standard\/66435.html\n                    \n                  ."},{"key":"9992_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.4018\/978-1-4666-0978-5.ch005","volume-title":"Threats, countermeasures, and advances in applied information security","author":"E Kolkowska","year":"2012","unstructured":"Kolkowska, E., Hedstr\u00f6m, K., & Karlsson, F. (2012). Analyzing information security goals. In M. Gupta, J. Walp, & R. Sharman (Eds.), Threats, countermeasures, and advances in applied information security (pp. 91\u2013110). Hershey: IGI Global."},{"key":"9992_CR13","volume-title":"Principia ethica","author":"GE Moore","year":"1903","unstructured":"Moore, G. E. (1903). Principia ethica. Cambridge: Cambridge University Press."},{"key":"9992_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10676-005-4582-3","volume":"7","author":"H Nissenbaum","year":"2005","unstructured":"Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology,\n                           7, 61\u201373.","journal-title":"Ethics and Information Technology"},{"key":"9992_CR15","unstructured":"NIST Interagency Report (IR) 7298 Revision 2. (2013). Glossary of key information security terms.\n                           \n                    http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\n                    \n                  ."},{"key":"9992_CR16","volume-title":"Fighting computer crime: A new framework for protecting information","author":"DB Parker","year":"1998","unstructured":"Parker, D. B. (1998). Fighting computer crime: A new framework for protecting information. New York: Wiley."},{"key":"9992_CR17","volume-title":"Computer security handbook","author":"DB Parker","year":"2009","unstructured":"Parker, D. B. (2009). Towards a new framework for information security. In S. Bosworth, M. E. Kabay, & E. Whyne (Eds.), Computer security handbook (5th ed.). Hoboken, NJ: Wiley.","edition":"5"},{"key":"9992_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/b12444","volume-title":"Information security risk analysis","author":"TR Peltier","year":"2001","unstructured":"Peltier, T. R. (2001). Information security risk analysis. Boca Raton, FL: Auerbach."},{"key":"9992_CR19","volume-title":"Security in computing","author":"CP Pfleeger","year":"2007","unstructured":"Pfleeger, C. P., & Pfleeger, S. L. (2007). Security in computing (4th ed.). Upper Saddle River, NJ: Prentice Hall.","edition":"4"},{"key":"9992_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of computer security","author":"J Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., & Seberry, J. (2003). Fundamentals of computer security. New York: Springer."},{"key":"9992_CR25","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/S0167-4048(01)00608-3","volume":"20","author":"B Solms von","year":"2001","unstructured":"von Solms, B. (2001a). Information security\u2014A multidimensional discipline. Computers & Security,\n                           20, 504\u2013508.","journal-title":"Computers & Security"},{"key":"9992_CR26","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/S0167-4048(00)07021-8","volume":"19","author":"B Solms von","year":"2001","unstructured":"von Solms, B. (2001b). Information security\u2014The third wave? Computer & Security,\n                           19, 615\u2013620.","journal-title":"Computer & Security"},{"key":"9992_CR27","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2006.03.004","volume":"25","author":"B Solms von","year":"2006","unstructured":"von Solms, B. (2006). Information security\u2014The forth wave. Computer & Security,\n                           25, 165\u2013168.","journal-title":"Computer & Security"},{"key":"9992_CR21","volume-title":"Information security illuminated","author":"Michael G Solomon","year":"2005","unstructured":"Solomon, Michael G., & Chapple, Mike. (2005). Information security illuminated. Boston: Jones and Bartlett."},{"key":"9992_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10676-004-1266-3","volume":"6","author":"A Takanen","year":"2004","unstructured":"Takanen, A., Vourij\u00e4rvi, P., Laakso, M., & R\u00f6ning, J. (2004). Agents of responsibility in software vulnerability processes. Ethics and Information Technology,\n                           6, 93\u2013110.","journal-title":"Ethics and Information Technology"},{"key":"9992_CR23","volume-title":"Information security management handbook","author":"JS Tiller","year":"2004","unstructured":"Tiller, J. S., & Fish, B. D. (2004). Packet sniffers and network monitors. In H. F. Tipton & M. Krause (Eds.), Information security management handbook (5th ed.). Boca Raton: Auerbach.","edition":"5"},{"key":"9992_CR24","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/S0167-4048(01)00507-7","volume":"20","author":"CM Trompeter","year":"2001","unstructured":"Trompeter, C. M., & Eloff, J. H. P. (2001). A framework for the implementation of socio-ethical controls in information security. Computers & Security,\n                           20, 384\u2013391.","journal-title":"Computers & Security"},{"key":"9992_CR28","unstructured":"United States Code, Title 44, Chapter 35, Subchapter III, \u00a7 3542\u2014Definitions."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9992-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9992-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9992-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T12:58:27Z","timestamp":1554469107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9992-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,15]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9992"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9992-1","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,15]]},"assertion":[{"value":"15 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}