{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:27Z","timestamp":1754157687387,"version":"3.41.2"},"reference-count":4,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993,1,1]]},"abstract":"<jats:p>Top management is responsible for the wellbeing of the\norganization. Most organizations nowadays are dependent totally on the\navailability and effectiveness of their information service resources.\nFor this reason it is imperative that top management gets involved and\nstays involved in the protection of the information service assets of\nthe organization. This can only be accomplished through a process of\ncontinuous information security evaluation and reporting. An information\nsecurity evaluation and reporting tool, representing the information\nsecurity status in a concise, clear manner, will help a great deal in\nensuring top management involvement. Suggests implementation of an\ninformation security management model by means of an evaluation tool.\nThis tool will provide top management with information security status\nreporting in a clear, non\u2010technical format.<\/jats:p>","DOI":"10.1108\/09685229310026467","type":"journal-article","created":{"date-parts":[[2006,5,22]],"date-time":"2006-05-22T04:13:03Z","timestamp":1148271183000},"page":"4-10","source":"Crossref","is-referenced-by-count":2,"title":["A Tool for Information Security Management"],"prefix":"10.1108","volume":"1","author":[{"given":"H.","family":"van de Haar","sequence":"first","affiliation":[]},{"given":"R.","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"2","key":"p_2","first-page":"7","volume":"8","author":"Fitzgerald K.","year":"1990","journal-title":"Computer Control Quarterly"},{"issue":"4","key":"p_3","first-page":"217","volume":"12","author":"von Solms R.","year":"1990","journal-title":"Information Age"},{"volume-title":"Workshop","year":"1992","author":"von Solms R.","key":"p_4"},{"issue":"2","key":"p_5","first-page":"30","volume":"9","author":"Caelli W.J.","year":"1991","journal-title":"Computer Control Quarterly"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229310026467\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229310026467\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:27Z","timestamp":1753402167000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/1\/1\/4-10\/174180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,1,1]]},"references-count":4,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1993,1,1]]}},"alternative-id":["10.1108\/09685229310026467"],"URL":"https:\/\/doi.org\/10.1108\/09685229310026467","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1993,1,1]]}}}