{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T06:29:55Z","timestamp":1721370595244},"reference-count":73,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1996,1]]},"DOI":"10.1016\/0167-4048(96)88941-3","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:10:20Z","timestamp":1052781020000},"page":"297-316","source":"Crossref","is-referenced-by-count":13,"title":["The information security chain in a company"],"prefix":"10.1016","volume":"15","author":[{"given":"Thomas","family":"Finne","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(96)88941-3_BIB1","series-title":"F\u00f6retagsekonomisk metodl\u00e4ra","author":"Arbnor","year":"1977"},{"key":"10.1016\/0167-4048(96)88941-3_BIB2","series-title":"Opportunity Makes the Thief","author":"Audit Commission","year":"1994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB3","first-page":"4","article-title":"Ny Teknik\/Data","volume":"17","author":"Borgstr\u00f6m","year":"1996","journal-title":"Virus blirbarav\u00e4rre.Vecka"},{"key":"10.1016\/0167-4048(96)88941-3_BIB4","series-title":"Information Security for Managers","author":"Caelli","year":"1989"},{"key":"10.1016\/0167-4048(96)88941-3_BIB5","first-page":"649","article-title":"Communications Security","author":"Caelli","year":"1991"},{"issue":"Number 3","key":"10.1016\/0167-4048(96)88941-3_BIB6","first-page":"203","article-title":"Human Systems Management","volume":"Volume 10","author":"Carlsson","year":"1991","journal-title":"New Instruments for Management Research"},{"key":"10.1016\/0167-4048(96)88941-3_BIB7","series-title":"Information Security The Next Decade","first-page":"533","article-title":"Portrait of the Computer Criminal","author":"Carroll","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB8","series-title":"Careless words cost business","first-page":"158","article-title":"Accountancy","author":"Carter","year":"1989"},{"key":"10.1016\/0167-4048(96)88941-3_BIB9","series-title":"Systems Thinking, Systems Practice","author":"Checkland","year":"1981"},{"key":"10.1016\/0167-4048(96)88941-3_BIB10","series-title":"Approaching Zero","author":"Clough","year":"1992"},{"issue":"Nummer 9","key":"10.1016\/0167-4048(96)88941-3_BIB11","article-title":"Computer Spectrum","year":"1990","journal-title":"Schluss mit Abh\u00f6ren"},{"key":"10.1016\/0167-4048(96)88941-3_BIB12","series-title":"Computer Fraud & Security Bulletin","first-page":"4","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB13","series-title":"Tallberg Anders. Artikelkompendium. Datas\u00e4kerhet och adb-revision","author":"Deborah","year":"1994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB14","first-page":"17","article-title":"Information Protection and Client Server","author":"Deloitte Touche Tohmatsu International","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB15","series-title":"Computer Assurance Services","author":"Deloitte Touche Tohmatsu International","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB16","first-page":"27","article-title":"Security Management and Policy","author":"Dorey","year":"1991"},{"key":"10.1016\/0167-4048(96)88941-3_BIB17","first-page":"16","article-title":"Fraud Prevention and Computer Security for Financial Institutions-Part 2","author":"Essinger","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB18","series-title":"Informationss\u00e4kerhet","author":"Finne","year":"1993"},{"key":"10.1016\/0167-4048(96)88941-3_BIB19","series-title":"Paper presented at the IFIP WG 11.1 Workshop","article-title":"Information Security: Vital for Competitive Advantages","author":"Finne","year":"851995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB20","first-page":"456","article-title":"Analysing Information Security: A Knowledge-based DSS Approach","author":"Finne","year":"1996","journal-title":"\u00c5bo Akademi University, Institute for Advanced Management Systems Research, Ser, A"},{"issue":"No.3","key":"10.1016\/0167-4048(96)88941-3_BIB21","author":"FISUGbytes","year":"1994","journal-title":"Finnish Sun user group"},{"key":"10.1016\/0167-4048(96)88941-3_BIB22","series-title":"Mikrojen tietoturva","author":"Hannula","year":"1991"},{"key":"10.1016\/0167-4048(96)88941-3_BIB23","first-page":"14","article-title":"Network Security, Issues and Problems in Secure Remote Access","author":"Hancock","year":"1994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB24","series-title":"Information Security The Next Decade","first-page":"125","article-title":"Information Security Issues in Mobile Computing","author":"Hardjono","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB25","series-title":"Network Security products launched","first-page":"2","article-title":"NetSec","author":"Herdan","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB26","series-title":"Protecting your Microcomputer System","author":"Highland","year":"1985"},{"key":"10.1016\/0167-4048(96)88941-3_BIB27","first-page":"458","article-title":"Random Bits and Bytes","volume":"Volume 13","author":"Highland","year":"1994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB28","series-title":"Information Security The Next Decade","first-page":"50","article-title":"Encryption Policy for the Global Information Infrastructure","author":"Hoffman","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB29","article-title":"Information Technology Security Techniques","author":"ISO","year":"1994","journal-title":"ISO\/IEC JTC 1\/SC 27, N 962"},{"key":"10.1016\/0167-4048(96)88941-3_BIB30","first-page":"8","author":"Johnson","year":"1994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB31","series-title":"ietokonevirukset","author":"vinen","year":"1990"},{"key":"10.1016\/0167-4048(96)88941-3_BIB32","article-title":"Tietoturvahenkil\u00f6st\u00f6 organisaatiossa","author":"Kajava","year":"1994","journal-title":"University of Oulu, Department of Information Processing Science, Working paper"},{"key":"10.1016\/0167-4048(96)88941-3_BIB33","series-title":"Frontiers of Electronic Commerce","author":"Kalakota","year":"1996"},{"key":"10.1016\/0167-4048(96)88941-3_BIB34","series-title":"Kilpailija-analyysist\u00e4 kilpailuvaltti","author":"Kelly","year":"1991"},{"key":"10.1016\/0167-4048(96)88941-3_BIB35","first-page":"205","article-title":"Biometrics, is it a Viable Proposition for Identity Authentication and Access Control?","volume":"Volume 14","author":"Kim","year":"1995"},{"issue":"No.1","key":"10.1016\/0167-4048(96)88941-3_BIB36","first-page":"44","article-title":"PC Tietotekniikan maailma","author":"Lahtinen","year":"1995","journal-title":"Mist\u00e4 PC-mikro koostuu?"},{"issue":"No.1","key":"10.1016\/0167-4048(96)88941-3_BIB37","first-page":"4","author":"LAN Vision Oy","year":"1995","journal-title":"Tietoturvauutiset"},{"key":"10.1016\/0167-4048(96)88941-3_BIB38","series-title":"Dataolyckor \u2014 har det verkligen h\u00e4nt n\u00e5gon g\u00e5ng?","author":"Ledell","year":"1992"},{"key":"10.1016\/0167-4048(96)88941-3_BIB39","article-title":"Er\u00e4\u00e4n pienen organisaation tietorikosketjun tarkastelua","author":"Leiwo","year":"1994","journal-title":"University of Oulu, Department of Information Processing Science, Working paper"},{"key":"10.1016\/0167-4048(96)88941-3_BIB40","series-title":"Persondatorn, n\u00e4tet och s\u00e4kerheten","author":"Lindberg","year":"1990"},{"key":"10.1016\/0167-4048(96)88941-3_BIB41","first-page":"455","article-title":"Access Control","author":"Longley","year":"1991"},{"key":"10.1016\/0167-4048(96)88941-3_BIB42","series-title":"Yrityksen Tietoturva","year":"1991"},{"key":"10.1016\/0167-4048(96)88941-3_BIB43","first-page":"15","article-title":"Computer Audit Update","author":"Maynard","year":"1994"},{"issue":"No.1","key":"10.1016\/0167-4048(96)88941-3_BIB44_1","first-page":"41","article-title":"Mikrodatorns testredaktion","author":"Mikrodatorn","year":"1993","journal-title":"S\u00e4kra data med billig backup"},{"issue":"No.1","key":"10.1016\/0167-4048(96)88941-3_BIB44_2","first-page":"47","article-title":"Mikrodatorns testredaktion","author":"Mikrodatorn","year":"1993","journal-title":"S\u00e4kra data med billig backup"},{"key":"10.1016\/0167-4048(96)88941-3_BIB45","unstructured":"Mulvad, Nils. Illustrerad Vetenskap. Nu angriper datorvirus sin egen medicin, Nr.2\/94, pp 46\u201349."},{"key":"10.1016\/0167-4048(96)88941-3_BIB46","series-title":"ATK-tilojen suunnittelu","author":"Mustonen","year":"1985"},{"key":"10.1016\/0167-4048(96)88941-3_BIB47","first-page":"6","article-title":"Meddelanden fr\u00e5n \u00c5bo Akademi","author":"Nordgren","year":"16121994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB48","series-title":"Method\/Questionnaire","article-title":"Information Security in Nordic Countries","author":"Nordic Council of Ministers","year":"1993"},{"key":"10.1016\/0167-4048(96)88941-3_BIB49","first-page":"300","article-title":"PC Plus. Protect and survive","author":"Norfolk","year":"1993"},{"key":"10.1016\/0167-4048(96)88941-3_BIB50","series-title":"Inside the Norton Antivirus","author":"Norton","year":"1992"},{"key":"10.1016\/0167-4048(96)88941-3_BIB51","first-page":"13","author":"Ongetta","year":"1994"},{"key":"10.1016\/0167-4048(96)88941-3_BIB52","first-page":"356","article-title":"Hitting the Wall: Errors in Developing and Debugging a \u201cSimple\u201d Spreadsheet Model","volume":"Vol II","author":"Panko","year":"1996"},{"key":"10.1016\/0167-4048(96)88941-3_BIB53","series-title":"Computer Security Management","author":"Parker","year":"1981"},{"key":"10.1016\/0167-4048(96)88941-3_BIB54","first-page":"10","author":"Parker","year":"1995"},{"issue":"Number 4","key":"10.1016\/0167-4048(96)88941-3_BIB55","first-page":"16","article-title":"Information Systems Security","volume":"Volume 3","author":"Parker","year":"1995","journal-title":"Security Accountability in Job Performance"},{"key":"10.1016\/0167-4048(96)88941-3_BIB56","series-title":"Varakopioinnin vaihtoehdot","first-page":"69","article-title":"MikroPC","author":"Pellonpoika","year":"1993"},{"key":"10.1016\/0167-4048(96)88941-3_BIB57","article-title":"Tietokonekeskukset","author":"Pohjola-Yhti\u00f6t","year":"1994","journal-title":"Suojeluohje S420"},{"key":"10.1016\/0167-4048(96)88941-3_BIB58","article-title":"Mikrotietokoneet","author":"Pohjola-Yhti\u00f6t","year":"1994","journal-title":"Suojeluohje S421"},{"key":"10.1016\/0167-4048(96)88941-3_BIB59","first-page":"8","author":"Preston","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB60","series-title":"Vesi turmelee kymmeni\u00e4 tuhansia asuntoja","first-page":"3","article-title":"Tekniikka & Talous","author":"Raunio"},{"key":"10.1016\/0167-4048(96)88941-3_BIB61","series-title":"Tietoturvallisuuden k\u00e4sikirja","author":"Saari","year":"1988"},{"key":"10.1016\/0167-4048(96)88941-3_BIB62","first-page":"4","article-title":"Kun verkko kaatuu, kaatuu yrityskin, Tietoviikko","author":"Sepp\u00e4nen","year":"3131995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB63","series-title":"Software Failure Risk, Measure and Management","author":"Sherer","year":"1992"},{"key":"10.1016\/0167-4048(96)88941-3_BIB64","series-title":"Commonsense Computer Security, your practical guide to information security","author":"Smith","year":"1993"},{"key":"10.1016\/0167-4048(96)88941-3_BIB65","first-page":"14","article-title":"Business Continuity Planning","volume":"Volume 14","author":"Smith","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB66","series-title":"Tracking a spy through the maze of computer espionage","article-title":"The Cuckoo's Egg","author":"Stoll","year":"1989"},{"key":"10.1016\/0167-4048(96)88941-3_BIB67","first-page":"473","article-title":"Security in Distributed and Client\/Server Systems \u2014 a Management View","volume":"Volume 13","author":"Symonds","year":"1994"},{"issue":"No. 10","key":"10.1016\/0167-4048(96)88941-3_BIB68","first-page":"54","author":"Uusitupa","year":"1989","journal-title":"Tietokone, Tietoturvaa \u2014 miksi ja miten"},{"key":"10.1016\/0167-4048(96)88941-3_BIB69","series-title":"Information Security The Next Decade","first-page":"40","article-title":"Information Security Accreditations \u2014 The ISO 9000 Route","author":"Von Solms","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB70","series-title":"Quality Assurance for Information Systems, methods, tools and techniques","author":"William","year":"1991"},{"key":"10.1016\/0167-4048(96)88941-3_BIB71","first-page":"13","article-title":"Information Security Awareness Raising Methods","author":"Wood","year":"1995"},{"key":"10.1016\/0167-4048(96)88941-3_BIB72","series-title":"Effective Information Security Management","author":"Wood","year":"1991"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404896889413?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404896889413?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:52:15Z","timestamp":1555203135000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404896889413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,1]]},"references-count":73,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1996,1]]}},"alternative-id":["0167404896889413"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(96)88941-3","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1996,1]]}}}