{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:22:25Z","timestamp":1763580145276},"reference-count":17,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1988,10,1]],"date-time":"1988-10-01T00:00:00Z","timestamp":591667200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1988,10]]},"DOI":"10.1016\/0167-4048(88)90196-4","type":"journal-article","created":{"date-parts":[[2002,10,8]],"date-time":"2002-10-08T10:42:38Z","timestamp":1034073758000},"page":"455-465","source":"Crossref","is-referenced-by-count":4,"title":["A context for information systems security planning"],"prefix":"10.1016","volume":"7","author":[{"given":"Charles Cresson","family":"Wood","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(88)90196-4_BIB1_1","first-page":"29","article-title":"The Coming of Post-Industrial Society: A Venture in Social Forecasting","author":"Bell","year":"1973"},{"key":"10.1016\/0167-4048(88)90196-4_BIB1_2","first-page":"30","article-title":"The Coming of Post-Industrial Society: A Venture in Social Forecasting","author":"Bell","year":"1973"},{"key":"10.1016\/0167-4048(88)90196-4_BIB2_1","first-page":"50","article-title":"CIO: misfit or misnomer?","author":"Carlyle","year":"1988","journal-title":"Datamation"},{"key":"10.1016\/0167-4048(88)90196-4_BIB2_2","first-page":"56","article-title":"CIO: misfit or misnomer?","author":"Carlyle","year":"1988","journal-title":"Datamation"},{"key":"10.1016\/0167-4048(88)90196-4_BIB3_1","first-page":"65","article-title":"The elusive advantage","author":"Clemons","year":"1987","journal-title":"Computerworld"},{"key":"10.1016\/0167-4048(88)90196-4_BIB3_2","first-page":"70","article-title":"The elusive advantage","author":"Clemons","year":"1987","journal-title":"Computerworld"},{"key":"10.1016\/0167-4048(88)90196-4_BIB4","series-title":"Blundering into Disaster: Surviving the First Century of the Nuclear Age","author":"McNamara","year":"1986"},{"key":"10.1016\/0167-4048(88)90196-4_BIB5_1","first-page":"109","article-title":"Strategic systems planning shifts to data-oriented approach","author":"Moskowitz","year":"1986","journal-title":"Computerworld"},{"key":"10.1016\/0167-4048(88)90196-4_BIB5_2","first-page":"110","article-title":"Strategic systems planning shifts to data-oriented approach","author":"Moskowitz","year":"1986","journal-title":"Computerworld"},{"key":"10.1016\/0167-4048(88)90196-4_BIB5_3","first-page":"112","article-title":"Strategic systems planning shifts to data-oriented approach","author":"Moskowitz","year":"1986","journal-title":"Computerworld"},{"key":"10.1016\/0167-4048(88)90196-4_BIB5_4","first-page":"117","article-title":"Strategic systems planning shifts to data-oriented approach","author":"Moskowitz","year":"1986","journal-title":"Computerworld"},{"key":"10.1016\/0167-4048(88)90196-4_BIB6","series-title":"Proc. 5th Ann. Information Systems Security Association National Conf.","article-title":"Towards a general policy for data integrity","author":"Wilson","year":"1988"},{"key":"10.1016\/0167-4048(88)90196-4_BIB7_1","first-page":"48","article-title":"Structuring systems security","author":"Wood","year":"1987","journal-title":"Security"},{"key":"10.1016\/0167-4048(88)90196-4_BIB7_2","first-page":"52","article-title":"Structuring systems security","author":"Wood","year":"1987","journal-title":"Security"},{"key":"10.1016\/0167-4048(88)90196-4_BIB8","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/0167-4048(87)90066-6","article-title":"Information systems security: management success factors","volume":"6","author":"Wood","year":"1987","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(88)90196-4_BIB9","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/0167-4048(87)90032-0","article-title":"The human immune system as an information systems security reference model","volume":"6","author":"Wood","year":"1987","journal-title":"Comput. Secur."},{"key":"10.1016\/0167-4048(88)90196-4_BIB10","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/0167-4048(83)90004-4","article-title":"Enhancing information security with the information resource management approach","volume":"2","author":"Wood","year":"1983","journal-title":"Comput. Secur."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404888901964?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404888901964?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T08:25:39Z","timestamp":1554884739000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404888901964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,10]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1988,10]]}},"alternative-id":["0167404888901964"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(88)90196-4","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1988,10]]}}}