{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:58:58Z","timestamp":1772809138166,"version":"3.50.1"},"reference-count":37,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2016,1,15]],"date-time":"2016-01-15T00:00:00Z","timestamp":1452816000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2016,4,2]]},"DOI":"10.1080\/08874417.2016.1117369","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T05:56:01Z","timestamp":1460354161000},"page":"106-115","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":23,"title":["Organizational Characteristics Influencing SME Information Security Maturity"],"prefix":"10.1080","volume":"56","author":[{"given":"Frederik","family":"Mijnhardt","sequence":"first","affiliation":[]},{"given":"Thijs","family":"Baars","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Spruit","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,1,15]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43314.10.2.20010506\/31401.6"},{"key":"CIT0002","volume-title":"How to achieve 27001 certification: an example of applied compliance management","author":"Arnason ST","year":"2008"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1596\/1813-9450-3127"},{"key":"CIT0004","first-page":"41","volume-title":"Second International Workshop on Software Product Management","author":"Bekkers W","year":"2008"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1002\/ev.1069"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1108\/02635570610653498"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.4135\/9781849209922"},{"key":"CIT0008","volume-title":"IT auditing using controls to protect information assets","author":"Davis C","year":"2010","edition":"2"},{"key":"CIT0009","first-page":"73","volume":"2002","author":"Dimopoulos V","year":"2004","journal-title":"Perth"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.5"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.24.10.1064"},{"key":"CIT0012","volume-title":"Proceedings of the 19th European Conference on Information Systems, ECIS","author":"Flores WR","year":"2011"},{"key":"CIT0013","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/09685220310480381","volume":"11","author":"Fulford H","year":"2003","journal-title":"Inf Manage Comp Sec"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.4337\/9781847207005"},{"key":"CIT0016","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"Hevner AR","year":"2004","journal-title":"MIS Quart"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.07.007"},{"key":"CIT0018","volume-title":"ISO\/IEC 27002","author":"Joint Technical Committee ISO\/IEC JTC 1","year":"2008"},{"key":"CIT0019","first-page":"2","volume-title":"E-J Res Teach","author":"Kajornboon AB.","year":"2005"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2006.05.011"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.001"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.04.006"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027505"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)00041-2"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.488"},{"key":"CIT0028","volume-title":"Why do some firms outsource IT more aggressively than others? The effects of organizational characteristics on IT outsourcing decisions","author":"Oh W.","year":"2005"},{"key":"CIT0029","volume-title":"Global technology audit guide: developing the IT audit plan","author":"Rehage K","year":"2008"},{"key":"CIT0030","author":"Ruiter JT.","year":"2012","journal-title":"TNO"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1201\/1078.10580530\/45925.23.2.20060301\/92671.4"},{"key":"CIT0033","volume-title":"Proceedings of the Twenty Second European Conference on Information Systems, ECIS","author":"Spruit M","year":"2014"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13335-0_22"},{"key":"CIT0035","first-page":"36","volume":"124","author":"The Commission of the European Communities","year":"2003","journal-title":"Official J Eur Union"},{"key":"CIT0036","first-page":"429","volume":"23","author":"Thong JYL","year":"1995","journal-title":"organizational characteristics and information technology adoption in small businesses. Omega, Int J Manage Sci"},{"key":"CIT0037","volume-title":"Management of information security","author":"Whitman M","year":"2013","edition":"3"},{"key":"CIT0038","volume-title":"Principles of information security","author":"Whitman M","year":"2011"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1093\/jopart\/mul021"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2016.1117369","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T08:58:30Z","timestamp":1567760310000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2016.1117369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,15]]},"references-count":37,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2016,1,15]]},"published-print":{"date-parts":[[2016,4,2]]}},"alternative-id":["10.1080\/08874417.2016.1117369"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2016.1117369","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}