{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:12Z","timestamp":1754157672417,"version":"3.41.2"},"reference-count":1,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,12,1]]},"abstract":"<jats:p>Information security has become very important in most organizations. An acceptable level of information security can only be introduced and maintained if the correct set of security controls, both procedural and technical, is identified, implemented and maintained. The process of identifying the most effective set of security controls can be a very complicated, resource\u2010intensive process. A number of large British companies have joined forces to establish a Code of Practice for Information Security Management. This document provides guidelines to any organization to identify and introduce a set of controls that will provide an acceptable level of protection to the information resources. This paper briefly discusses the BS 7799 British standard.<\/jats:p>","DOI":"10.1108\/09685229810240158","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"224-225","source":"Crossref","is-referenced-by-count":29,"title":["Information security management (3): the Code of Practice for Information Security Management (BS 7799)"],"prefix":"10.1108","volume":"6","author":[{"given":"Rossouw","family":"von Solms","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022031619591644800_b1","unstructured":"British Standards Institute (1993), BS 7799: Code of Practice for Information Security Management (CoP), PD0003, UK."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240158\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810240158\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:49Z","timestamp":1753402189000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/5\/224-225\/185792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,12,1]]},"references-count":1,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1998,12,1]]}},"alternative-id":["10.1108\/09685229810240158"],"URL":"https:\/\/doi.org\/10.1108\/09685229810240158","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,12,1]]}}}