{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T11:19:00Z","timestamp":1772795940113,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319164854","type":"print"},{"value":"9783319164861","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16486-1_50","type":"book-chapter","created":{"date-parts":[[2015,3,25]],"date-time":"2015-03-25T11:45:52Z","timestamp":1427283952000},"page":"513-522","source":"Crossref","is-referenced-by-count":4,"title":["Applying Action Research in the Formulation of Information Security Policies"],"prefix":"10.1007","author":[{"given":"Isabel","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"Beatson, J.G.: Information Security: The Impact of End User Computing. In: Gable, G.G., Caelli, W.J. (eds.) IT Security: The Need for International Cooperation \u2014 Proceedings of the IFIP TC11 Eighth International Conference on Information Security, Amsterdam, pp. 35\u201345. Elsevier (1992)"},{"key":"50_CR2","unstructured":"de S\u00e1-Soares, F.: Interpreta\u00e7\u00e3o da Seguran\u00e7a de Sistemas de Informa\u00e7\u00e3o Segundo a Teoria da Ac\u00e7\u00e3o, PhD Thesis in Information Systems and Technologies, Universidade do Minho, Guimar\u00e3es (2005)"},{"key":"50_CR3","series-title":"AISC","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-319-05951-8_27","volume-title":"New Perspectives in Information Systems and Technologies, Volume 1","author":"I. Lopes","year":"2014","unstructured":"Lopes, I., Oliveira, P.: Understanding Information Security Culture: A Survey in Small and Medium Sized Enterprises. In: Rocha, \u00c1., Correia, A.M., Tan, F., Stroetmann, K. (eds.) New Perspectives in Information Systems and Technologies, Volume 1. AISC, vol.\u00a0275, pp. 277\u2013286. Springer, Heidelberg (2014)"},{"issue":"5","key":"50_CR4","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/S0167-4048(02)00504-7","volume":"21","author":"K. H\u00f6ne","year":"2012","unstructured":"H\u00f6ne, K., Eloff, J.: Information security policy \u2014 what do international information security standards say? Computers & Security\u00a021(5), 402\u2013409 (2012)","journal-title":"Computers & Security"},{"issue":"8","key":"50_CR5","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/0167-4048(96)81706-8","volume":"14","author":"C.C. Wood","year":"1995","unstructured":"Wood, C.C.: Writing InfoSec Policies. Computers & Security\u00a014(8), 667\u2013674 (1995)","journal-title":"Computers & Security"},{"key":"50_CR6","unstructured":"Peltier, T.R.: Information Security Policies. Procedure: a practitioner\u2019s reference. CRC Press (1999)"},{"issue":"3","key":"50_CR7","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2004.08.011","volume":"24","author":"M. Karyda","year":"2005","unstructured":"Karyda, M., Kiountouzis, E., Kokolakis, S.: Information systems security policies: a contextual perspective. Computers & Security\u00a024(3), 246\u2013260 (2005)","journal-title":"Computers & Security"},{"key":"50_CR8","unstructured":"Wills, L.: Security Policies: Where to Begin. Security Essentials 1(4b) (2002)"},{"key":"50_CR9","unstructured":"Diver, S.: Information Security Policy \u2013 A Development Guide for Large and Small Companies. SANS Institute (2007)"},{"key":"50_CR10","unstructured":"Dick, B.: A beginner\u2019s guide to action research, Southern Cross University, Australia (2000), \n                      http:\/\/www.scu.edu.au\/schools\/gcm\/ar\/arp\/guide.html"},{"key":"50_CR11","unstructured":"Cunha, P.R., Figueiredo, A.D.: Research and Critical Rationalism: a Virtuous Marriage. In: Proc. of the Xth European Conference on Information Systems (ECIS), Gdansk, Poland (2002)"},{"issue":"4","key":"50_CR12","doi-asserted-by":"publisher","first-page":"582","DOI":"10.2307\/2392581","volume":"23","author":"G. Susman","year":"1978","unstructured":"Susman, G., Evered, R.: Na Assement of the Scientific Merits of Action Research. Administrative Science Quarterly\u00a023(4), 582\u2013603 (1978)","journal-title":"Administrative Science Quarterly"},{"issue":"11","key":"50_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1080\/026839696345289","volume":"3","author":"R. Baskerville","year":"1996","unstructured":"Baskerville, R., Wood-Harper, A.T.: A Critical Perspective on Action Research as Method for Information Systems Research. Journal of Information Technology\u00a03(11), 235\u2013246 (1996)","journal-title":"Journal of Information Technology"},{"key":"50_CR14","unstructured":"Kee, C.: Security Policy Roadmap \u2013 Process for Creating Security Policies. SANS Institute (2001)"},{"key":"50_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijinfomgt.2003.12.002","volume":"24","author":"Whitman","year":"2004","unstructured":"Whitman: In defense of the realm: Understanding threats to information security. Informational Journal of Information Management\u00a024, 3\u20134 (2004)","journal-title":"Informational Journal of Information Management"}],"container-title":["Advances in Intelligent Systems and Computing","New Contributions in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16486-1_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T07:38:58Z","timestamp":1676446738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16486-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164854","9783319164861"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16486-1_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}