{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:06:01Z","timestamp":1774368361468,"version":"3.50.1"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319164854","type":"print"},{"value":"9783319164861","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16486-1_45","type":"book-chapter","created":{"date-parts":[[2015,3,25]],"date-time":"2015-03-25T11:45:52Z","timestamp":1427283952000},"page":"459-468","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of Information Systems Security Policies: A Survey in Small and Medium Sized Enterprises"],"prefix":"10.1007","author":[{"given":"Isabel","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","unstructured":"ISO\/IEC 27002. Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Requirements, International Organization for Standardization\/International Electrotechnical Commission (2005)"},{"key":"45_CR2","unstructured":"Beatson, J.G.: Information Security: The Impact of End User Computing. In: Gable, G.G., Caelli, W.J. (eds.) IT Security: The Need for International Cooperation \u2014 Proceedings of the IFIP TC11 Eighth International Conference on Information Security, pp. 35\u201345. Elsevier (1992)"},{"key":"45_CR3","unstructured":"Beal, A.: Seguran\u00e7a da Informa\u00e7\u00e3o: princ\u00edpios e melhores pr\u00e1ticas para a prote\u00e7\u00e3o dos ativos de informa\u00e7\u00e3o nas organiza\u00e7\u00f5es, S\u00e3o. Atlas, Paulo (2005)"},{"key":"45_CR4","unstructured":"de S\u00e1-Soares, F.: A Theory of Action Interpretation of Information Systems Security. PhD Thesis, University of Minho, Guimar\u00e3es (2005)"},{"issue":"7","key":"45_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G. Dhillon","year":"2000","unstructured":"Dhillon, G., Backhouse, J.: Information System Security Management in the New Millennium. Communications of ACM\u00a043(7), 125\u2013128 (2000)","journal-title":"Communications of ACM"},{"key":"45_CR6","unstructured":"ISO\/IEC 17799. International Standard ISO\/IEC 17799:2000 Code of Practice for Information Security Management, International Organization for Standardization\/International Electrotechnical Commission (2005)"},{"issue":"8","key":"45_CR7","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/0167-4048(96)81706-8","volume":"14","author":"C.C. Wood","year":"1995","unstructured":"Wood, C.C.: Writing InfoSec Policies. Computers & Security\u00a014(8), 667\u2013674 (1995)","journal-title":"Computers & Security"},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/S1386-5056(98)00022-7","volume":"49","author":"N. Gaunt","year":"1998","unstructured":"Gaunt, N.: Installing an appropriate information security policy. International Journal of Medical Informatics\u00a049(1), 131\u2013134 (1998)","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"45_CR9","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2004.08.011","volume":"24","author":"M. Karyda","year":"2005","unstructured":"Karyda, M., Kiountouzis, E., Kokolakis, S.: Information systems security policies: a contextual perspective. Computers & Security\u00a024(3), 246\u2013260 (2005)","journal-title":"Computers & Security"},{"key":"45_CR10","unstructured":"Lopes, I.: The adoption of information security systems in the local public administration in Portugal, PhD Thesis, University of Minho, Guimar\u00e3es (2012)"},{"issue":"1","key":"45_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"M. Siponen","year":"2000","unstructured":"Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management and Computer Security\u00a08(1), 31\u201341 (2000a)","journal-title":"Information Management and Computer Security"}],"container-title":["Advances in Intelligent Systems and Computing","New Contributions in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16486-1_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T03:41:19Z","timestamp":1675136479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16486-1_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164854","9783319164861"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16486-1_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}