{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:33Z","timestamp":1754157693600,"version":"3.41.2"},"reference-count":4,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[1993,4,1]],"date-time":"1993-04-01T00:00:00Z","timestamp":733622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993,4,1]]},"abstract":"<jats:p>A recent study of 50 Australian information systems development\nenvironments highlights a continuing lack of corporate security measures\nby Australian business organizations. Project managers and developers\nare battling the rising surge of computer\u2010related crime with little\nsupport from their corporate management. This has occurred in spite of\nrefinements in software development and the subsequent constraints on\naccess to these systems at a working plane. Outlines, for corporate\nmanagement, the results regarding lack of corporate commitment to the\nsecurity of information systems in Australia and recommends actions to\nrectify the current predicament.<\/jats:p>","DOI":"10.1108\/09685229310045303","type":"journal-article","created":{"date-parts":[[2006,5,22]],"date-time":"2006-05-22T04:13:30Z","timestamp":1148271210000},"source":"Crossref","is-referenced-by-count":1,"title":["Corporate Security: An Australian Ostrich"],"prefix":"10.1108","volume":"1","author":[{"given":"H.","family":"James","sequence":"first","affiliation":[]},{"given":"R.A.","family":"Coldwell","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"volume-title":"Computer Security in Australia","year":"1986","author":"Benbow G.","key":"p_1"},{"issue":"4","key":"p_2","first-page":"11","volume":"8","author":"Kamay V.","year":"1990","journal-title":"Computer Control Quarterly"},{"volume-title":"Essays on Computer Law","year":"1990","author":"Coldwell R.A.","key":"p_3"},{"volume-title":"The Australian Computer Society Code ofProfessional Conduct","year":"1986","author":"The Australian Computer Society","key":"p_4"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229310045303\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229310045303\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:29Z","timestamp":1753402169000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/173853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,4,1]]},"references-count":4,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1993,4,1]]}},"alternative-id":["10.1108\/09685229310045303"],"URL":"https:\/\/doi.org\/10.1108\/09685229310045303","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1993,4,1]]}}}