{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T15:18:15Z","timestamp":1648653495638},"reference-count":7,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,11]]},"DOI":"10.1016\/s0167-4048(02)01109-4","type":"journal-article","created":{"date-parts":[[2003,1,9]],"date-time":"2003-01-09T07:31:12Z","timestamp":1042097472000},"page":"620-623","source":"Crossref","is-referenced-by-count":1,"title":["Security policy update"],"prefix":"10.1016","volume":"21","author":[{"given":"Chris","family":"Pounder","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)01109-4_BIB1","unstructured":"1The draft cybersecurity plan is available from: www.whitehouse.gov\/pcipb\/cyberstrategy-draft.pdf."},{"key":"10.1016\/S0167-4048(02)01109-4_BIB2","unstructured":"2Copies of the sector-specific strategies to secure critical infrastructure can be obtained from www.pcis.org."},{"key":"10.1016\/S0167-4048(02)01109-4_BIB3","unstructured":"3The FTC security site is www.ftc.gov\/infosecurity. The \u201cFinancial Institutions and Customer Data: Complying with the Safeguards Rule\u201d is available at http:\/\/www.ftc.gov\/bcp\/conline\/pubs\/alerts\/safealrt.htm and the Rule itself is posted at www.ftc.gov\/privacy\/glbact"},{"key":"10.1016\/S0167-4048(02)01109-4_BIB4","unstructured":"4The \u201cGuidelines for the Security of Information Systems and Networks\u201d replace the security guidelines first issued in 1992 and can be obtained from http:\/\/www.oecd.org\/pdf\/M00034000\/M00034292.pdf"},{"key":"10.1016\/S0167-4048(02)01109-4_BIB5","unstructured":"5Details of BS7799\/ISO17799 Part 2 from http:\/\/www.c-cure.org"},{"key":"10.1016\/S0167-4048(02)01109-4_BIB6","unstructured":"6OFTEL Guidance from www.oftel.gov.uk\/publications (under October 2002). There are four security documents: \u201cGuidelines on the essential requirements for network security and integrity and criteria for restriction of access to the network\u201d; \u201cGuidelines on the essential requirements for network security and integrity\u201d; \u201cCriteria for the restriction of access to and use of the fixed public telephone system on the grounds of network security or integrity\u201d; and \u201cAn overview of the fixed telephone emergency services\u201d."},{"key":"10.1016\/S0167-4048(02)01109-4_BIB7","unstructured":"7\u201cPrivacy and Data Sharing\u201d Report from http:\/\/www.piu.gov.uk\/reports\/reports.shtml"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802011094?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802011094?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,2]],"date-time":"2019-04-02T11:59:27Z","timestamp":1554206367000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802011094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11]]},"references-count":7,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2002,11]]}},"alternative-id":["S0167404802011094"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)01109-4","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,11]]}}}