{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:51:03Z","timestamp":1761648663009,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/cscwd.2019.8791928","type":"proceedings-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T23:54:53Z","timestamp":1565308493000},"page":"506-511","source":"Crossref","is-referenced-by-count":4,"title":["Ethics of IT Security Team for Cloud Architecture Infrastructure in Banking and Financial Services Industry"],"prefix":"10.1109","author":[{"given":"Abhishek","family":"Mahalle","sequence":"first","affiliation":[]},{"given":"Jianming","family":"Yong","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Tao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1p","article-title":"On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned","author":"ben salem","year":"0","journal-title":"Department of Computer Science Columbia University"},{"key":"ref11","first-page":"1p","article-title":"An Experience Report on Undergraduate Cyber-Security Education and Outreach","author":"locasto","year":"0","journal-title":"George Mason University Sara Sinclair Dartmouth College"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/2.901169"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.35"},{"key":"ref14","first-page":"1p","article-title":"Addressing IT Security for Critical Control Systems, Martin Naedele, ABB Corporate Research, 5405 Baden-D&#x00A8;attwil","year":"2007","journal-title":"Switzerland Proceedings of the 40th Hawaii International Conference on System Sciences"},{"key":"ref15","first-page":"3p","article-title":"Ethics of Computing Committees: Suggestions for Functions, Form and Structure","author":"berleur","year":"2008","journal-title":"IFIP-SIG9 2 2 IFIP Framework for Ethics of Computing IFIP Press"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2172\/911553"},{"key":"ref3","first-page":"1p","article-title":"Security Control in inter-Bank fund Transfer","volume":"3","author":"zhu","year":"2002","journal-title":"Department of Logistics Operations and MIS Iowa State University Journal of Electronic Commerce Research"},{"key":"ref6","article-title":"The importance of business ethics in globalization: A study","volume":"3","author":"shravan kumar","year":"2014","journal-title":"Research Scholar Dept of Commerce and Business Management Kakatiya University Warangal Andhra Pradesh"},{"key":"ref5","first-page":"800","article-title":"Guide to Industrial Control Systems (ICS) Security","author":"stouffer","year":"2014","journal-title":"NIST Special Publication"},{"key":"ref8","article-title":"Towards Community Standards for Ethical Behavior in Computer Security Research","author":"dittrich","year":"2009","journal-title":"University of Washington Michael Bailey University of Michigan Sven Dietrich Stevens Institute of Technology Stevens CS Technical Report 20091"},{"journal-title":"Metaphors for Cyber Security","year":"2008","author":"karas","key":"ref7"},{"key":"ref2","first-page":"1p","article-title":"Ethics, Professionalism and Criticism of the Sources","author":"dodig-crnkovic","year":"2007","journal-title":"in Mdlardalen University Department of Computer Science and Electronics"},{"key":"ref1","first-page":"1p","article-title":"Ethics and Security","volume":"2","year":"7","journal-title":"ISSA International Ethics Committee"},{"key":"ref9","first-page":"4","article-title":"Reconciling Malicious and Accidental Risk in Cyber Security","volume":"4","author":"pieters","year":"0","journal-title":"TU Delft Technology Policy and Management ICT Delft The Netherlands 2University of Twente EEMCS Services Cybersecurity and Safety Enschede The Netherlands Zofia Lukszo TU Delft Technology Policy and Management Energy & Industry Delft The Netherlands Dina Had?ziosmanovi&#x2032;c and Jan van den Berg TU Delft Technology Policy and Management ICT Delft The Netherlands Journal of Internet Services and Information Security (JISIS)"}],"event":{"name":"2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2019,5,6]]},"location":"Porto, Portugal","end":{"date-parts":[[2019,5,8]]}},"container-title":["2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8785422\/8791497\/08791928.pdf?arnumber=8791928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:14:58Z","timestamp":1657854898000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8791928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2019.8791928","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}