{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:20:55Z","timestamp":1725459655234},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/acosis.2016.7843921","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:43:51Z","timestamp":1486676631000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Information system security governance: Technology intelligence perspective"],"prefix":"10.1109","author":[{"given":"Mounia","family":"Zaydi","sequence":"first","affiliation":[]},{"given":"Bouchaib","family":"Nasserddine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"5","author":"dumont","year":"0","journal-title":"COBIT Pour une meilleur gouvernance des systemes d'information"},{"key":"ref11","first-page":"42","article-title":"Governing information System Security: Review off Approaches to Information System Security Assurance and Auditing","author":"spremic","year":"0"},{"journal-title":"Creating trust in the digital world annual Global Information Security Survey","year":"2015","author":"younng","key":"ref12"},{"key":"ref13","first-page":"210","author":"omar","year":"2015","journal-title":"CCNA Security"},{"journal-title":"COBIT pour one meilleur gouvernance des syst&#x00E8;mes d'information","year":"2009","author":"dominique","key":"ref14"},{"journal-title":"CMMI High Maturity HandBook","year":"2015","author":"moorthy","key":"ref15"},{"journal-title":"Code de bonne pratique pour le management de la s&#x00E9;curit&#x00E9; de l'information deuxi&#x00E8;me &#x00E9;dition","article-title":"Technologies de l'information, Techniques de s&#x00E9;curit&#x00E9;","year":"2013","key":"ref16"},{"journal-title":"Code de bonne pratique pour le management de la s&#x00E9;curit&#x00E9; de l'information deuxi&#x00E8;me edition","article-title":"Technologies de l'information, Techniques de s&#x00E9;curit&#x00E9;","year":"2013","key":"ref17"},{"article-title":"Governing Information System Security: Review of Approaches to Information Security Assurance and Auditing","year":"0","author":"mario","key":"ref4"},{"key":"ref3","first-page":"40","article-title":"Managin Risk and Information Security","author":"harkin","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118540176"},{"key":"ref5","first-page":"75","author":"michel","year":"2008","journal-title":"Patrons Organisationnels et Techniques Pour la Securisation des Organisations Virtuelles"},{"key":"ref8","first-page":"2015","author":"calder","year":"0","journal-title":"IT Governance"},{"journal-title":"International IT Governance Information security standard","year":"2006","author":"calder","key":"ref7"},{"key":"ref2","first-page":"3","author":"sigler","year":"0","journal-title":"Securing an IT Organization through Governance Risk Management And Audit"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1201\/b19194","author":"sigler","year":"2016","journal-title":"Securing an IT Organisation through Governance Risk Management and audit"},{"key":"ref9","first-page":"13","author":"van bon","year":"2005","journal-title":"Gestion des services informatiques une introduction bas&#x00E9;e sur l'ITIL"}],"event":{"name":"2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)","start":{"date-parts":[[2016,10,17]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7830757\/7843912\/07843921.pdf?arnumber=7843921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T13:51:47Z","timestamp":1568814707000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7843921\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/acosis.2016.7843921","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}