{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:33:11Z","timestamp":1761323591016},"reference-count":17,"publisher":"Informa UK Limited","issue":"5-6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2008,12,5]]},"DOI":"10.1080\/19393550802492495","type":"journal-article","created":{"date-parts":[[2008,12,5]],"date-time":"2008-12-05T07:43:22Z","timestamp":1228463002000},"page":"267-277","source":"Crossref","is-referenced-by-count":3,"title":["A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks"],"prefix":"10.1080","volume":"17","author":[{"given":"Michael","family":"Workman","sequence":"first","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]},{"given":"William","family":"Allen","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0002","first-page":"133","volume":"46","author":"Antoniadis P.","year":"2004","journal-title":"The International Journal of Computer and Telecommunications Networking"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.1"},{"key":"CIT0004","volume-title":"Reflexive modernization. Politics, tradition and aesthetics in the modern social order","author":"Beck U.","year":"1994"},{"key":"CIT0005","volume-title":"Information processing approaches: An introduction to cognitive development","author":"Bjorklund D. F.","year":"1995"},{"key":"CIT0006","volume-title":"Proceedings of the IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology (IAT'05)","author":"Boella G.","year":"2005"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1515\/semi.1979.25.1-2.31"},{"key":"CIT0009","volume-title":"Language and problems of knowledge","author":"Chomsky N.","year":"1996"},{"key":"CIT0010","first-page":"1611","volume-title":"Lecture notes in computer science","author":"Dastani M.","year":"2004"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120723"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988788"},{"key":"CIT0013","volume-title":"The constitution of society: Outline of the theory of structuration","author":"Giddens A.","year":"1984"},{"key":"CIT0019","first-page":"1772","volume":"10","author":"Hoffman K.","year":"2008","journal-title":"Journal of Computer Virology"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.332"},{"key":"CIT0015","first-page":"31","volume":"5","author":"Krishnana R.","year":"2003","journal-title":"Journal of Information Technology Theory and Application"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.1"},{"key":"CIT0018","volume-title":"Proceedings of the 34th International Conference on Distributed Computing Systems","author":"Sun O.","year":"2004"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393550802492495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T23:11:31Z","timestamp":1481670691000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19393550802492495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,5]]},"references-count":17,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2008,12,5]]}},"alternative-id":["10.1080\/19393550802492495"],"URL":"https:\/\/doi.org\/10.1080\/19393550802492495","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,12,5]]}}}