{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T09:52:37Z","timestamp":1648720357077},"reference-count":19,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1996,1]]},"DOI":"10.1016\/0167-4048(96)82560-0","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T03:00:05Z","timestamp":1027652405000},"page":"377-386","source":"Crossref","is-referenced-by-count":9,"title":["Electronic communications risk management: A checklist for business managers"],"prefix":"10.1016","volume":"15","author":[{"given":"Rolf T.","family":"Moulton","sequence":"first","affiliation":[]},{"given":"Mark E.","family":"Moulton","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(96)82560-0_BIB1","series-title":"5th Jerusalem Conference on Information Technology","article-title":"Information Services Risk Management","author":"Ginzberg","year":"1990"},{"key":"10.1016\/0167-4048(96)82560-0_BIB2","series-title":"Code of Practice for Information Security Management","year":"1995"},{"key":"10.1016\/0167-4048(96)82560-0_BIB3","first-page":"17","article-title":"E-mail Managing The Legal Risks","author":"Hart","year":"5\/96"},{"key":"10.1016\/0167-4048(96)82560-0_BIB4","unstructured":"Protecting Business Information: Keeping it Confidential (draft), UK Department of Trade and Industry, [circulation drafts in 1996 final expected 9\/96]."},{"key":"10.1016\/0167-4048(96)82560-0_BIB5","unstructured":"Information Security Policies Made Easy, 5th edition, Baseline Software Sausalito, CA, USA."},{"key":"10.1016\/0167-4048(96)82560-0_BIB6","series-title":"Internet Security for Business","author":"Bernstein","year":"1996"},{"key":"10.1016\/0167-4048(96)82560-0_BIB7","article-title":"Internet Scanner Finds Security Holes","author":"Tabibian","year":"1996","journal-title":"PC Magazine"},{"key":"10.1016\/0167-4048(96)82560-0_BIB8","series-title":"Network Security","first-page":"3","article-title":"Electronic mail encryption standards rivalry"},{"key":"10.1016\/0167-4048(96)82560-0_BIB9","unstructured":"Strauss v. Microsoft, 856 E Supp. 821 (N.Y., USA, 1994)."},{"key":"10.1016\/0167-4048(96)82560-0_BIB10","series-title":"Tears of the \u2018fake memo\u2019wife","author":"Fitzmaurice"},{"key":"10.1016\/0167-4048(96)82560-0_BIB11","unstructured":"O'Connor v. Ortega, 480 U.S. 709, 107 S. Ct. 1492 (1986)."},{"key":"10.1016\/0167-4048(96)82560-0_BIB12","first-page":"1","journal-title":"The Sunday Times"},{"key":"10.1016\/0167-4048(96)82560-0_BIB13","first-page":"202","author":"Graham","journal-title":"The Computer Law and Security Report"},{"issue":"Number 2","key":"10.1016\/0167-4048(96)82560-0_BIB14","article-title":"Commercial Transactions On The Global Information Infrastructure: A European Perspective","volume":"Vol. XIV","author":"Millard","journal-title":"The John Marshall Journal of Computer & Information Law"},{"key":"10.1016\/0167-4048(96)82560-0_BIB15","first-page":"8","article-title":"Internet Holes-Part 8: Spam","author":"Cohen","year":"4\/96","journal-title":"Network Security"},{"key":"10.1016\/0167-4048(96)82560-0_BIB16","first-page":"84","article-title":"The Enemy Within","author":"Knowles","year":"1996"},{"key":"10.1016\/0167-4048(96)82560-0_BIB17","author":"Moulton","year":"1986"},{"key":"10.1016\/0167-4048(96)82560-0_BIB18","series-title":"Proceedings, 14th National Computer Security Conference","first-page":"564","article-title":"A Strategic Framework for Information Security Management","author":"Moulton"},{"key":"10.1016\/0167-4048(96)82560-0_BIB19","first-page":"5","year":"2\/96","journal-title":"Computer Security Alert (CSI)"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404896825600?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404896825600?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:52:53Z","timestamp":1555203173000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404896825600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,1]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1996,1]]}},"alternative-id":["0167404896825600"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(96)82560-0","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1996,1]]}}}