{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:04:43Z","timestamp":1764173083016},"reference-count":28,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)84641-x","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T10:55:29Z","timestamp":1027594529000},"page":"469-479","source":"Crossref","is-referenced-by-count":11,"title":["Information security implemented in: The theory on stock market efficiency, Markowitz's portfolio theory and porter's value chain"],"prefix":"10.1016","volume":"16","author":[{"given":"Thomas","family":"Finne","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)84641-X_BIB1","author":"Bequai","year":"1984"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB2","first-page":"47","article-title":"The New Religion of Risk Management","author":"Bernstein","year":"1996","journal-title":"Harvard Business Review"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB3","series-title":"Principles of Corporate Finance","author":"Brealey","year":"1991"},{"issue":"Number 3","key":"10.1016\/S0167-4048(97)84641-X_BIB4","first-page":"203","article-title":"Human Systems Management","volume":"Volume 10","author":"Carlsson","year":"1991","journal-title":"New Instruments for Management Research"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB5","series-title":"Information Security for Managers","author":"Caelli","year":"1989"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB6_1","series-title":"Practical Risk Theory for Actuaries","author":"Daykin","year":"1994"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB6_2","series-title":"Business Research Methods","author":"Emory","year":"1976"},{"issue":"No.5","key":"10.1016\/S0167-4048(97)84641-X_BIB7","doi-asserted-by":"crossref","first-page":"383","DOI":"10.2307\/2325486","article-title":"Efficient Capital Markets: A Review of Theory and Empirical Work","author":"Fama","year":"1970","journal-title":"Journal of Finance"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB8","author":"Finne","year":"1994"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB9","series-title":"Paper presented at the IFIP WG 11.1 Workshop","first-page":"12","article-title":"Information Security: Vital for Competitive Advantages","author":"Finne","year":"1995"},{"issue":"Number 4","key":"10.1016\/S0167-4048(97)84641-X_BIB10","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/0167-4048(96)88941-3","article-title":"The Information Security Chain in a Company","volume":"Volume 15","author":"Finne","year":"1996","journal-title":"Computers & Security. Elsevier Advanced Technology"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB11","series-title":"Proceedings of 1996 IEEE International Conference on Systems, Man and Cybernetics","first-page":"193","article-title":"A DSS for Information Security Analysis: Computer Support in a Company's Risk Managment","author":"Finne","year":"1996"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB12","article-title":"Communication in the Share Markets","author":"Ik\u00e4heimo","year":"1996"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB13","series-title":"To appear in the proceedings of the Fifth European Conference on Information Systems","article-title":"A Resource-Based Analysis of Perceived Core Competencies: Applying the VRIO Framework into a Case of the Russian Trade of a Finnish Corporation","author":"Kangas","year":"1997"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB14","unstructured":"Murray, William H. Security should pay: It should not cost: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms. Proceedings of the IFIP TC11 Eleventh International Conference on Information Security. South Africa 9\u201312.5.95, pp 1\u20136."},{"key":"10.1016\/S0167-4048(97)84641-X_BIB15","series-title":"Computer Security Management","author":"Parker","year":"1981"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB16","series-title":"The Logic of Scientific Discovery","author":"Popper","year":"1959"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB17","series-title":"Competitive Advantage, Creating and Sustaining Superior Performance","author":"Porter","year":"1985"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB18","first-page":"149","article-title":"How Information Gives you Competitive Advantage","author":"Porter","year":"1985","journal-title":"Harvrd Business Review"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB19","series-title":"Kansakuntien kilpailuetu","author":"Porter","year":"1991"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB20","series-title":"Principles of Corporate Finance","article-title":"Statistical versus Clinical Prediction of the Stock Market","author":"Roberts","year":"1967-1991"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB21","series-title":"Tietoturvallisuuden k\u00e4sikirja","author":"Saari","year":"1988"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB22","series-title":"Investments","author":"Sharpe","year":"1990"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB23","article-title":"Commonsense Computer Security","author":"Smith","year":"1993"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB24","series-title":"Risk Analysis, Assessment and Management","article-title":"Financial Risk Management Models","author":"Thomas","year":"1992"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB25","series-title":"Financial Management and Policy","author":"Van Home","year":"1992"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB26","series-title":"Effective Information Security Management","author":"Wood","year":"1991"},{"key":"10.1016\/S0167-4048(97)84641-X_BIB27","series-title":"Multiple Criteria Decision Making","author":"Zeleny","year":"1982"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740489784641X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740489784641X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T16:34:00Z","timestamp":1578587640000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740489784641X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S016740489784641X"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)84641-x","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}