{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T15:49:59Z","timestamp":1762444199396},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157165"},{"type":"electronic","value":"9783642157172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15717-2_2","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T09:25:30Z","timestamp":1283333130000},"page":"9-18","source":"Crossref","is-referenced-by-count":5,"title":["A Security Audit Framework to Manage Information System Security"],"prefix":"10.1007","author":[{"given":"Teresa","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Baharin, K.N., Md Din, N., Jamaludin, M., Md Tahir, N.: Third Party Security Audit Procedure for Network Environment. In: 4th National Conference on Telecommunication Technology, Shah Alam, Malaysia (2003)"},{"key":"2_CR2","unstructured":"Common Criteria for Information Technology Security Evaluation, Part I: Introduction and General Model, Version 3.1, Revision 1, CCMB-2006-09-001 (September 2006)"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1080\/10580530701586136","volume":"24","author":"A. Veiga Da","year":"2007","unstructured":"Da Veiga, A., Eloff, J.H.P.: An information security governance framework. Information Systems Management\u00a024, 361\u2013372 (2007)","journal-title":"Information Systems Management"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Farahmand, F., Navathe, S.B., Sharp, G.P., Enslow, P.H.: Managing Vulnerabilities of Information System to Security Incidents. In: Proceedings of ICEC 2003, Pittsburg, PA. ACM, New York (2003) 1 58113-788-5\/03\/09.","DOI":"10.1145\/948005.948050"},{"key":"2_CR5","unstructured":"Hayes, B.: Conducting a Security Audit: An Introductory Overview. Security Focus, \n                  \n                    http:\/\/www.securityfocus.com\/infocus\/1697\n                  \n                  \n                 (accessed January 2010)"},{"key":"2_CR6","unstructured":"Information Security Management, Part2: Specification for Information security management systems AS\/NZS 7799.2:2003 BS 7799.2:2002. (2003) SANS, \n                  \n                    http:\/\/www.sans.org\/score\/checklists\/ISO_17799_checklist.pdf"},{"key":"2_CR7","unstructured":"ISO\/IEC FDIS 27000 Information technology \u2013 Security techniques \u2013 Information security management systems Overview and vocabulary. ISO copyright office, Geneva, Switzerland (2009)"},{"key":"2_CR8","unstructured":"ISO\/IEC FDIS 27001 Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements. ISO copyright office, Geneva, Switzerland (2005)"},{"key":"2_CR9","unstructured":"Lo, E.C., Marchand, M.: Security Audit: A Case Study. In: Proceedings of the CCECE, Niagara Falls, 0-7803-8253-6\/04. IEEE, Los Alamitos (May 2004)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Onwubiko, C.: A Security Audit Framework for Security Management in the Enterprise. In: Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2 (2009)","DOI":"10.1007\/978-3-642-04062-7_2"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1504\/IJESDF.2009.027524","volume":"2","author":"C. Onwubiko","year":"2009","unstructured":"Onwubiko, C., Lenaghan, A.P.: Challenges and complexities of managing information security. Int. J. Electronic Security and Digital Forensic\u00a02(3), 306\u2013321 (2009)","journal-title":"Int. J. Electronic Security and Digital Forensic"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Onwubiko, C., Lenaghan, A.P.: Managing Security Threats and Vulnerabilities for Small and Medium Enterprises. In: Proceeding of the 5th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2007, New Brunswick, New Jersey, May 23-24 (2007)","DOI":"10.1109\/ISI.2007.379479"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Pereira, T., Santos, H.: An Ontology Based Approach To Information Security. In: Sartori, F., Sicilia, M.-A., Manouselis, N. (eds.) Communication in computer and Information Science, vol.\u00a0XIII, 330 p. (2009) (Soft-cover); 3rd International Conference, Metadata and Semantics Research (MTSR 2009), Milan, Italy, September 30th -October, pp. 183\u2013193. Springer, Heidelberg (2009) ISBN: 978-3642-04589-9","DOI":"10.1007\/978-3-642-04590-5_17"},{"key":"2_CR14","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"2007","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. Prentice Hall PTR, Englewood Cliffs (2007)","edition":"4"},{"key":"2_CR15","unstructured":"Walker, D.M., Jones, R.L.: Management Planning Guide for Information Systems Security Auditing, special publication of the National State Auditors Association and the U.S. General Accounting Office, December 10 (2001), \n                  \n                    http:\/\/www.gao.gov\/special.pubs\/mgmtpln.pdf"},{"key":"2_CR16","unstructured":"Smith, M.K., Welty, C., McGuinness, D.L.: OWL Web Ontology Language Guide, W3C Recommendation. Technical report, W3C (February 10, 2004), \n                  \n                    http:\/\/www.w3.org\/TR\/owl-guide\/"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety, and Sustainability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15717-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:03:15Z","timestamp":1619773395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15717-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157165","9783642157172"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15717-2_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}