{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:30:07Z","timestamp":1743013807840,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312316"},{"type":"electronic","value":"9783319312323"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31232-3_46","type":"book-chapter","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T01:32:02Z","timestamp":1456795922000},"page":"493-502","source":"Crossref","is-referenced-by-count":1,"title":["Architecture of Information Security Policies: A Content Analysis"],"prefix":"10.1007","author":[{"given":"Isabel","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,2]]},"reference":[{"key":"46_CR1","unstructured":"ISO\/IEC 27002: Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Requirements (2005)"},{"key":"46_CR2","unstructured":"Beatson, J. G.: Information Security: The Impact of End User Computing. In G. G. Gable e W. J. Caelli (Eds.), IT Security: The Need for International Cooperation \u2014 Proceedings of the IFIP TC11 Eighth International Conference on Information Security, Amsterdam, pp. 35\u201345. Elsevier (1992)"},{"key":"46_CR3","unstructured":"Beal, A.: Seguran\u00e7a da Informa\u00e7\u00e3o: princ\u00edpios e melhores pr\u00e1ticas para a prote\u00e7\u00e3o dos ativos de informa\u00e7\u00e3o nas organiza\u00e7\u00f5es, S\u00e3o Paulo: Atlas (2005)"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Hong, K.S., Chi, Y.P., Chao L.R., Tang J.H.: An integrated system theory of information security management. Information Management & Computer Security, 11 (5), 243-248 (2003)","DOI":"10.1108\/09685220310500153"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Fulford, H., Doherty, N.F.: The application of information security policies in large UK-based organizations: an exploratory investigation. Information Management & Computer Security, 11 (3), 106-114 (2003)","DOI":"10.1108\/09685220310480381"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Knapp, K., Marshall, R., Rainer, K, Ford, N.: Information Security: Management\u2019s Effect on Culture and Policy. Information Management & Computer Security, 11 (1), 24-36 (2006)","DOI":"10.1108\/09685220610648355"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Karyda, M., Kiountouzis, E., Kokolakis, S.: Information systems security policies: a contextual perspective. Computers & Security, 24 (3), 246-260 (2005)","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"46_CR8","unstructured":"ISO\/IEC 17799 International Standard ISO\/IEC 17799:2000 Code of Practice for Information Security Management, International Organization for Standardization\/International Electrotechnical Commission (2005)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Wood, C. C.: Writing InfoSec Policies, Computers & Security, 14 (8), 667-674 (1995)","DOI":"10.1016\/0167-4048(96)81706-8"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Lindup, K.R.: A New Model for Information Security Policies. Computers & Security, 14 (8), 691-695 (1995)","DOI":"10.1016\/0167-4048(96)81709-3"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Whitman, M.E., Townsend, A.M., Aalberts, R.J.: Information Systems Security and the Need for Policy, In Information Security Management: Global Challenges in the New Millennium (Dhillon, G. Ed.), Idea Group Publishing (2001)","DOI":"10.4018\/978-1-878289-78-0.ch002"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"H\u00f6ne, K., Eloff, J.: Information security policy \u2013 what do internationalinformation security standards say? Computers & Security, 21 (5), 402-409 (2002)","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"46_CR13","unstructured":"Communications and Information Tecnology Commission, Information Security Policies and Procesures Development Framework for Government Agencies http:\/\/www.citc.gov.sa\/English\/RulesandSystems\/RegulatoryDocuments\/OtherRegulatoryDocuments\/Documents\/CITC_Information_Security_Policies_and_Procedures_Guide_En.pdf"},{"key":"46_CR14","first-page":"277","volume-title":"Advances in Intelligent Systems and Computing","author":"Isabel Lopes","year":"2014","unstructured":"Lopes, I., Oliveira, P.: Understanding Information Security Culture: A Survey in Small and Medium Sized Enterprises. \u00c1lvaro Rocha et al (eds.). New Perspectives in Information Systems and Technologies, Volume 1. ed. Cham: Springer International Publishing, v. 275, p. 277-286 (2014)"},{"key":"46_CR15","unstructured":"Myers, M. D.: Qualitative Research in Information Systems ACM Computing Surveys (CSUR), MISQ Discovery (1997)"},{"key":"46_CR16","unstructured":"Berelson, B.: Content Analysis in Communications Research. Free Press, New York (1952)"},{"key":"46_CR17","unstructured":"Kim, D., Solomon, M. G.: Fundamentals of Information Systems Security, Jones and Bartlett Publishers (2010)"},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Tipton, H., Krause, M.: Information Security Mangement Handbook. Auerbach Publications (2009)","DOI":"10.1201\/9781420090956"}],"container-title":["Advances in Intelligent Systems and Computing","New Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31232-3_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T20:42:32Z","timestamp":1654461752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31232-3_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312316","9783319312323"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31232-3_46","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}