{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:08Z","timestamp":1754157668071,"version":"3.41.2"},"reference-count":15,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[1998,5,1]],"date-time":"1998-05-01T00:00:00Z","timestamp":893980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,5,1]]},"abstract":"<jats:p>Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to introduce to the reader the threats that Internet computer viruses can cause and provide guidelines on how organizations or individuals can protect themselves against these viruses. Discusses the full set of virus types. Recommends the development of virus protection policy for organizations.<\/jats:p>","DOI":"10.1108\/09685229810209388","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:09:54Z","timestamp":1027735794000},"page":"66-71","source":"Crossref","is-referenced-by-count":4,"title":["Internet computer virus protection policy"],"prefix":"10.1108","volume":"6","author":[{"given":"H. Joseph","family":"Wen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022012120042420000_b1","unstructured":"Chen, E. (1997, \u201cActive X and Java: the next virus carriers?\u201d, Computer Technology Review, pp. 38\u201041."},{"key":"key2022012120042420000_b2","unstructured":"Cohen, F. (1994, Short Course in Computer Viruses, Wiley.."},{"key":"key2022012120042420000_b3","unstructured":"Coursey, D. (1997, \u201cMacro world beyond viruses\u201d, Computer World, June 2."},{"key":"key2022012120042420000_b4","unstructured":"Demey, P. (1996, \u201cProtect your electronic data before its too late\u201d, Practical Accountant, December, pp. 32\u201035."},{"key":"key2022012120042420000_b5","unstructured":"Fites, P. (1989, Computer Virus Crises, Van Nostranol.."},{"key":"key2022012120042420000_b6","unstructured":"Jarvis, K. (1997, \u201cDemystifying computer viruses\u201d, Management Accounting, April, pp. 24\u201031."},{"key":"key2022012120042420000_b7","doi-asserted-by":"crossref","unstructured":"Nachenberg, C. (1997, \u201cComputer virus \u2010 coevolution\u201d, Communications of the ACM, January, pp. 46\u201051.","DOI":"10.1145\/242857.242869"},{"key":"key2022012120042420000_b8","unstructured":"New York Times (1993), \u201cThe virus: threat or menace?\u201d, New York Times, 15 June."},{"key":"key2022012120042420000_b9","unstructured":"NSCA (1997, \u201cNCSA\u00ae 1997 computer virus prevalence survey\u201d, NCSA, available at http:\/\/ www.antivirus.com\/forms\/ncsarep.tml"},{"key":"key2022012120042420000_b10","doi-asserted-by":"crossref","unstructured":"Slade, R. (1994, Guide to Computer Viruses, Springer\u2010Vaelag..","DOI":"10.1007\/978-1-4684-0227-8"},{"key":"key2022012120042420000_b11","doi-asserted-by":"crossref","unstructured":"Soloman A. (1991, PC Viruses: Detection, Analyses and Cure, Springer\u2010Valag..","DOI":"10.1007\/978-1-4471-1031-6"},{"key":"key2022012120042420000_b12","doi-asserted-by":"crossref","unstructured":"Wack J. (1989, Computer Viruses and Related Threats: A Management Guide, Department of Commerce..","DOI":"10.6028\/NIST.SP.500-166"},{"key":"key2022012120042420000_b13","unstructured":"Whalley, I. (1996, \u201cVirus defense for the future\u201d, Security Management, November, pp. 60\u20104."},{"key":"key2022012120042420000_b14","unstructured":"White S.R., Kuo, C.J. and Chess, D.M. (1996, Coping with Computer Viruses and Related Problems, IBM Los Angeles Scientific Center and IBM Thomas J. Watson Research Center.."},{"key":"key2022012120042420000_b15","unstructured":"Wood C.C. (1997, \u201cPolicies from the ground up\u201d, Infosecurity News, March\/April, pp. 24\u20108."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810209388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810209388\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810209388\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:47Z","timestamp":1753402187000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/2\/66-71\/178423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,5,1]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,5,1]]}},"alternative-id":["10.1108\/09685229810209388"],"URL":"https:\/\/doi.org\/10.1108\/09685229810209388","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,5,1]]}}}