{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:45:48Z","timestamp":1759333548114,"version":"3.41.2"},"reference-count":23,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AP"],"published-print":{"date-parts":[[2004,10]]},"DOI":"10.1108\/00012530410560878","type":"journal-article","created":{"date-parts":[[2004,11,2]],"date-time":"2004-11-02T23:45:54Z","timestamp":1099439154000},"page":"272-285","source":"Crossref","is-referenced-by-count":9,"title":["E\u2010security issues and policy development in an information\u2010sharing and networked environment"],"prefix":"10.1108","volume":"56","author":[{"given":"Alan D.","family":"Smith","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"b1","unstructured":"Arnett, K.P. and Liu, C. (2002), \u201cRaising a red flag on global WWW privacy policies\u201d,Journal of Computer Information Systems, Vol. 43 No. 1, pp. 117\u201028."},{"key":"b2","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0335.t01-1-00290"},{"key":"b5","unstructured":"Bensaou, M. and Earl, M. (1998), \u201cThe right mindset for managing information technology\u201d,Harvard Business Review, Vol. 76 No. 5, pp. 119\u201028."},{"key":"b6","unstructured":"Burke, L.A. and Witt, L.A. (2000), \u201cSelecting high\u2010performing information technology professionals\u201d,Journal of End User Computing, Vol. 14 No. 4, p. 37."},{"key":"b8","doi-asserted-by":"publisher","DOI":"10.1108\/02635579910301793"},{"key":"b9","doi-asserted-by":"publisher","DOI":"10.1108\/03074350010766981"},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2002100104"},{"key":"b11","unstructured":"Knyght, P.R., Korac\u2010Kakabadse, A., Korac\u2010Kakabadse, N. and Kouzmin, A. (2000), \u201cThe impact of information technology on the ethics of public sector management in the third millennium\u201d,Global Virtue Ethics Review, Vol. 2 No. 1, pp. 77\u201084."},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1080\/10696679.2002.11501914"},{"key":"b13","doi-asserted-by":"publisher","DOI":"10.2307\/2674663"},{"key":"b14","unstructured":"Parker, R. (2003), \u201cHow to profit by safeguarding privacy\u201d,Journal of Accountancy, Vol. 195 No. 5, pp. 47\u201052."},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383391"},{"key":"b16","unstructured":"Roberts, M. (2002), \u201cGuarding the electronic gates\u201d,Chemical Week, Vol. 20 No. 27, pp. 41\u20102."},{"key":"b17","unstructured":"Smith, A.D. (2002), \u201cLoyalty and e\u2010marketing issues: customer retention on the Web\u201d,Quarterly Journal of E\u2010commerce, Vol. 3 No. 2, pp. 149\u201061."},{"key":"b18","doi-asserted-by":"crossref","unstructured":"Smith, A.D. (2003), \u201cSurveying practicing project managers on curricular aspects of project management programs: a resource\u2010based approach\u201d,Project Management Journal, Vol. 34 No. 2, pp. 26\u201033.","DOI":"10.1177\/875697280303400204"},{"key":"b19","unstructured":"Smith, A.D. and Faley, R.A. (2001), \u201cE\u2010mail workplace privacy issues in an information\u2010 and knowledge\u2010based environment\u201d,Southern Business Review, Vol. 27 No. 1, pp. 8\u201019."},{"key":"b20","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210431863"},{"key":"b21","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210424113"},{"key":"b22","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210436976"},{"key":"b23","doi-asserted-by":"publisher","DOI":"10.1300\/J396v24n02_03"},{"key":"b24","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.40.9.1069"},{"key":"b25","unstructured":"Tuthill, M. (2001), \u201cE\u2010risk is a manageable beast\u201d,AFP Exchange, Vol. 21 No. 3, pp. 52\u20106."},{"key":"b26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00871964"}],"container-title":["Aslib Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00012530410560878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/00012530410560878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:36:34Z","timestamp":1753356994000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/56\/5\/272-285\/22113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["10.1108\/00012530410560878"],"URL":"https:\/\/doi.org\/10.1108\/00012530410560878","relation":{},"ISSN":["0001-253X"],"issn-type":[{"type":"print","value":"0001-253X"}],"subject":[],"published":{"date-parts":[[2004,10]]}}}