{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:45:57Z","timestamp":1770903957207,"version":"3.50.1"},"reference-count":25,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1080\/08874417.2009.11645326","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:00:40Z","timestamp":1770901240000},"page":"71-75","source":"Crossref","is-referenced-by-count":0,"title":["Strategic, Tactical, &amp; Operational Management Security Model"],"prefix":"10.1080","volume":"49","author":[{"given":"Garry","family":"White","sequence":"first","affiliation":[{"name":"Texas State University, San Marcos, TX 78666"}]}],"member":"301","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11647498"},{"issue":"3","key":"e_1_2_1_3_1","first-page":"249","article-title":"\u201cInternet Security Management: A Joint Postgraduate Curriculum Design.\u201d","volume":"13","author":"Armstrong H.","year":"2002","unstructured":"Armstrong, H. & Jayaratna, N. (2002). \u201cInternet Security Management: A Joint Postgraduate Curriculum Design.\u201d Journal of Information Systems Education, 13(3), 249\u2013258.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_2_1_4_1","first-page":"26","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Barnett S.","year":"1996","unstructured":"Barnett, S. (1996). \u201cComputer Security Training and Education: A Needs Analysis.\u201d In Proceedings of the IEEE Symposium on Security and Privacy, p. 26\u201327, Los Alamitos, CA, May. IEEE Computer Society Press."},{"key":"e_1_2_1_5_1","volume-title":"Board of Directors and Information Security: A Perception Grid","author":"Ezingeard J.N.","year":"2004","unstructured":"Ezingeard, J.N. & McFadzean, E. & Birchall, D. (2004). Board of Directors and Information Security: A Perception Grid. Paper No. 222 in Proceedings of British Academy of Management Confrerence, Harrogatte."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/45159.32.11.20050501\/87704.1"},{"issue":"3","key":"e_1_2_1_7_1","first-page":"211","article-title":"\u201cInformation Systems Security Education: Redressing the Balance of Theory and Practice.\u201d","volume":"13","author":"Hsu C.","year":"2002","unstructured":"Hsu, C. & Backhouse, J. (2002). \u201cInformation Systems Security Education: Redressing the Balance of Theory and Practice.\u201d Journal of Information Systems Education, 13(3), 211\u2013218.","journal-title":"Journal of Information Systems Education"},{"issue":"12","key":"e_1_2_1_8_1","first-page":"118","article-title":"Security and Risk Assessment","volume":"144","author":"Kalbaugh G.E.","year":"2001","unstructured":"Kalbaugh, G.E. (December, 2001). Security and Risk Assessment. Rough Notes, 144(12), 118\u2013119.","journal-title":"Rough Notes"},{"issue":"3","key":"e_1_2_1_9_1","first-page":"227","article-title":"\u201cInformation Secuirty Management Curriculum Design: A joint Industry and Academic Effort.\u201d","volume":"13","author":"Kim K","year":"2002","unstructured":"Kim, K & Surendran, K. (2002). \u201cInformation Secuirty Management Curriculum Design: A joint Industry and Academic Effort.\u201d Journal of Information Systems Education, 13(3), 227\u2013235.","journal-title":"Journal of Information Systems Education"},{"issue":"3","key":"e_1_2_1_10_1","first-page":"237","article-title":"\u201cEducation Requirement Analysis for Information Security Professionals in Korea.\u201d","volume":"13","author":"Kim S.","year":"2002","unstructured":"Kim, S. & Choi, M (2002). \u201cEducation Requirement Analysis for Information Security Professionals in Korea.\u201d Journal of Information Systems Education, 13(3), 237\u2013247.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570510616111"},{"issue":"3","key":"e_1_2_1_12_1","first-page":"177","article-title":"\u201cCrafting an Undergraduate Information Security Emphasis Within Information Technology.\u201d","volume":"13","author":"Logan P. Y.","year":"2002","unstructured":"Logan, P. Y. (2002). \u201cCrafting an Undergraduate Information Security Emphasis Within Information Technology.\u201d Journal of Information Systems Education, 13(3), 177\u2013182.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_2_1_13_1","first-page":"12","article-title":"Managing Information Security","volume":"2002","author":"Lohmeyer D.","year":"2002","unstructured":"Lohmeyer, D. & McCrory, J. & Pogreb, S. (2002). Managing Information Security. The McKinsey Quarterly, 2002, p. 12.","journal-title":"The McKinsey Quarterly"},{"key":"e_1_2_1_14_1","volume-title":"Information Security: Principles and Practices.","author":"Merkow M.","year":"2006","unstructured":"Merkow, M. & Breithaupt, J. (2006). Information Security: Principles and Practices. Pearson\/Prentice Hall, Upper Saddle River, NJ."},{"issue":"1","key":"e_1_2_1_15_1","first-page":"55","article-title":"Aligning the Information Security Policy with the Strategic Information Systems Plan","volume":"25","author":"Misra S.","year":"2007","unstructured":"Misra, S. & Kumar, V. & Kumar, U. (2007). Aligning the Information Security Policy with the Strategic Information Systems Plan. Computers & Security, 25(1), 55.","journal-title":"Computers & Security"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)04021-9"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2007.11645992"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.004"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701260579"},{"issue":"2","key":"e_1_2_1_20_1","first-page":"67","article-title":"Finding Security","volume":"4","author":"Rangaswami M. R.","year":"2005","unstructured":"Rangaswami, M. R. (Feb, 2005). Finding Security. Optimize, 4(2), 67\u201368.","journal-title":"Optimize"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.1997.11647307"},{"issue":"3","key":"e_1_2_1_22_1","first-page":"173","article-title":"\u201cAccommodating Information Security in our Curricula.\u201d","volume":"13","author":"Surendran K.","year":"2002","unstructured":"Surendran, K. & Ki-Yoon, K. & Harris, A. (2002). \u201cAccommodating Information Security in our Curricula.\u201d Journal of Information Systems Education, 13(3), 173\u2013176.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2007.11645971"},{"issue":"15","key":"e_1_2_1_24_1","first-page":"48","article-title":"Strategic Security","volume":"39","author":"Vijayan J.","year":"2005","unstructured":"Vijayan, J. (2005). Strategic Security. Computerworld, 39(15), 48.","journal-title":"Computerworld"},{"key":"e_1_2_1_25_1","volume-title":"Principles of Information Security","author":"Whitman M. E.","year":"2005","unstructured":"Whitman, M. E. & Mattord, H. J. (2005). Principles of Information Security, 2nd Ed. Thomson\/Course Technology, Boston, MA.","edition":"2"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2006.11645910"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2009.11645326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:00:43Z","timestamp":1770901243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2009.11645326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["10.1080\/08874417.2009.11645326"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2009.11645326","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}