{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T05:03:41Z","timestamp":1648789421922},"reference-count":3,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1998,1]]},"DOI":"10.1016\/s0167-4048(98)80311-8","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:10:20Z","timestamp":1052781020000},"page":"207-210","source":"Crossref","is-referenced-by-count":7,"title":["Recent security surveys"],"prefix":"10.1016","volume":"17","author":[{"given":"Stephen","family":"Hinde","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(98)80311-8_BIB1_1","series-title":"Ghost in the Machine \u2014 an Analysis of IT Fraud and Abuse","year":"1998"},{"key":"10.1016\/S0167-4048(98)80311-8_BIB2_1","series-title":"The Information Security Survey by KPMG","year":"1998"},{"key":"10.1016\/S0167-4048(98)80311-8_BIB3","unstructured":"The Business Information Security Survey (BISS'98) \u2014 Information Security the True Cost To Business. The latest in a series of Information Security Surveys managed by the National Computing Centre (NCC) for the UK Department of Trade and Industry. This one is sponsored by AT&T, Sysdeco and the UK ITSEC Scheme. The Survey consisted of 1000 telephone interviews with people responsible for information security across a broad range of UK organizations, across all sectors. All interviewing was conducted by NOP using Computer Assisted Telephone Interviewing. Sampling was done from the Business Database, the most comprehensive database of UK IT sites. A qualitative follow up exercise was carried out by the NCC consisting of face to face interviews with representatives of 30 organizations which had suffered a security breach and 30 organizations which had an information security policy. These organizations were sourced from the quantitative survey."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404898803118?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404898803118?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:57:23Z","timestamp":1555203443000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404898803118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,1]]},"references-count":3,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1998,1]]}},"alternative-id":["S0167404898803118"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(98)80311-8","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1998,1]]}}}