{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T02:24:41Z","timestamp":1775183081155,"version":"3.50.1"},"reference-count":29,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2007,10,2]]},"DOI":"10.1080\/10580530701586136","type":"journal-article","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T10:04:09Z","timestamp":1195207449000},"page":"361-372","source":"Crossref","is-referenced-by-count":148,"title":["An Information Security Governance Framework"],"prefix":"10.1080","volume":"24","author":[{"given":"A. Da","family":"Veiga","sequence":"first","affiliation":[{"name":"a  University of Pretoria ,  South Africa"}]},{"given":"J. H. P.","family":"Eloff","sequence":"additional","affiliation":[{"name":"b   Department of Computer Science , University of Pretoria ,  South Africa"}]}],"member":"301","published-online":{"date-parts":[[2007,12,10]]},"reference":[{"issue":"3","key":"CIT0001","first-page":"37","volume":"60","author":"Baggett W. O.","year":"2003","journal-title":"The Internal Auditor"},{"issue":"4","key":"CIT0002","first-page":"57","volume":"6","author":"Bresz F. P.","year":"2004","journal-title":"Journal of Health Care Compliance"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1108\/00438029510147745"},{"key":"CIT0004","unstructured":"COBIT security baseline\u2014An information security survival kit. 2004. Rolling Meadows, USA: IT Governance Institute."},{"issue":"1","key":"CIT0005","first-page":"147","volume":"11","author":"Da Veiga A.","year":"2007","journal-title":"Southern African Business Review"},{"key":"CIT0006","volume-title":"U.S. Securities and Exchange Commission.","author":"Donaldson W. H.","year":"2005"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(05)70275-X"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33406-8_8"},{"key":"CIT0014","volume-title":"Top ranked information security issues: The 2004 International Information Systems Security Certification Consortium (SIC) survey results.","author":"Knapp J. K.","year":"2004"},{"key":"CIT0015","volume-title":"Security Transformation.","author":"McCarthy M. P.","year":"2001"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35586-3_16"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35586-3_16"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1108\/01437720210453984"},{"key":"CIT0019","unstructured":"The Concise Oxford Dictionary. 1983. Edited by: \n                     Sykes ,  J. B.  Oxford: Clarendon Press."},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(05)70222-0"},{"issue":"9","key":"CIT0023","first-page":"35","volume":"104","author":"Richards N.","year":"2002","journal-title":"Business Credit"},{"key":"CIT0024","series-title":"9th ed.","volume-title":"Organizational Behaviour.","author":"Robbins S.","year":"2001"},{"key":"CIT0025","author":"Ross B.","year":"2000","journal-title":"Computer Weekly News."},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(05)00141-7"},{"key":"CIT0027","volume-title":"Proceedings of the Annual International Information Security South Africa (ISSA) conference.","author":"Teufel S."},{"issue":"1","key":"CIT0028","volume":"4","author":"Tretic B.","year":"2001","journal-title":"Intelligent Enterprise"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00507-7"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1201\/9781420031034"},{"issue":"48","key":"CIT0031","first-page":"24","volume":"34","author":"Verton D.","year":"2000","journal-title":"Computerworld"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1108\/09685229710168006"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)07021-8"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.07.003"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.004"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.012"}],"container-title":["Information Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530701586136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T02:14:25Z","timestamp":1534385665000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530701586136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":29,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2007,12,10]]},"published-print":{"date-parts":[[2007,10,2]]}},"alternative-id":["10.1080\/10580530701586136"],"URL":"https:\/\/doi.org\/10.1080\/10580530701586136","relation":{},"ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10,2]]}}}