{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:17:30Z","timestamp":1743113850272,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319313061"},{"type":"electronic","value":"9783319313078"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31307-8_37","type":"book-chapter","created":{"date-parts":[[2016,3,2]],"date-time":"2016-03-02T01:39:38Z","timestamp":1456882778000},"page":"353-362","source":"Crossref","is-referenced-by-count":0,"title":["The Security Policy Application Process: Action Research"],"prefix":"10.1007","author":[{"given":"Isabel","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,3]]},"reference":[{"key":"37_CR1","unstructured":"Lopes, I. and Oliveira, P.: Understanding Information Security Culture: A Survey in SMEs. \u00c1lvaro Rocha, et al. A Stroetmann. New Perspectives in Information Systems and Technologies, Volume 1. ed. Cham: Springer, 2014, v. 275, pp. 277-286 (2014)"},{"issue":"4","key":"37_CR2","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1080\/10580530701586136","volume":"24","author":"A. Da Veiga","year":"2007","unstructured":"Da Veiga, A., Eloff, J. H. P.: An Information Security Governance Framework, Information Systems Management, 24:4, pp. 361-372 (2007)","journal-title":"Information Systems Management"},{"key":"37_CR3","unstructured":"Kim, D., Solomon, M. G.: Fundamentals of Information Systems Security, Jones and Bartlett Publishers (2010)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Tipton, H., Krause, M.: Information Security Mangement Handbook. Auerbach Publications (2009)","DOI":"10.1201\/9781420090956"},{"key":"37_CR5","unstructured":"de S\u00e1-Soares, F.: A Theory of Action Interpretation of Information Systems Security, PhD Thesis, University of Minho, Guimar\u00e3es (2005)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"H\u00f6ne, K., Eloff, J.: Information security policy \u2014 what do international information security standards say?, Computers & Security 21 (5), pp. 402\u2013409 (2012)","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Wood, C. C.: Writing InfoSec Policies, Computers & Security, 14 (8), pp. 667-674 (1995)","DOI":"10.1016\/0167-4048(96)81706-8"},{"key":"37_CR8","unstructured":"Peltier, T. R.: ISS, Procedure: a practitioner\u2019s reference, CRC Press (1999)"},{"key":"37_CR9","unstructured":"Hartley, B., Locke, A.: The Process of Security, Business Security Advisor, pp. 22-24, USA (2001)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Karyda, M., Kiountouzis, E., Kokolakis, S.: Information systems security policies: a contextual perspective, Computers & Security 24 (3) pp. 246-260 (2005)","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"37_CR11","unstructured":"Wills, L.: Security Policies: Where to Begin, Security Essentials, 1(4b) (2002)"},{"issue":"1","key":"37_CR12","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/S1386-5056(98)00022-7","volume":"49","author":"Nick Gaunt","year":"1998","unstructured":"Gaunt, N.: Installing an appropriate information security policy, International Journal of Medical Informatics 49(1) pp. 131-134 (1998)","journal-title":"International Journal of Medical Informatics"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Dick, B.: A beginner\u2019s guide to action research (2000), (Accessed 4 de Dez 2014) www.scu.edu.au\/schools\/gcm\/ar\/arp\/guide.html","DOI":"10.4135\/9781473920163.n4"},{"issue":"4","key":"37_CR14","doi-asserted-by":"crossref","first-page":"582","DOI":"10.2307\/2392581","volume":"23","author":"Gerald I. Susman","year":"1978","unstructured":"Susman, G., Evered, R.: An Assessment of the Scientific Merits of Action Research, Administrative Science Quarterly, 23(4), pp 582-603 (1978)","journal-title":"Administrative Science Quarterly"}],"container-title":["Advances in Intelligent Systems and Computing","New Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31307-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T23:58:13Z","timestamp":1654473493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31307-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319313061","9783319313078"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31307-8_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}