{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:15:48Z","timestamp":1769066148196,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108845","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T17:03:11Z","timestamp":1591376591000},"page":"63-65","source":"Crossref","is-referenced-by-count":2,"title":["Information Security Management Frameworks in Higher Education Institutions: An Overview"],"prefix":"10.1109","author":[{"given":"Jorge","family":"Merchan-Lima","sequence":"first","affiliation":[{"name":"Universidad de Cuenca,Departamento de El&#x00E9;ctrica, Electr&#x00F3;nica y Telecomunicaciones,Cuenca,Ecuador"}]},{"given":"Fabian","family":"Astudillo-Salinas","sequence":"additional","affiliation":[{"name":"Universidad de Cuenca,Departamento de El&#x00E9;ctrica, Electr&#x00F3;nica y Telecomunicaciones,Cuenca,Ecuador"}]},{"given":"Luis","family":"Tello-Oquendo","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Chimborazo,College of Engineering,Riobamba,Ecuador"}]},{"given":"Franklin","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Escuela Polit&#x00E9;cnica Nacional,Departamento de Electr&#x00F3;nica, Telecomunicaciones y Redes de Informaci&#x00F3;n,Quito,Ecuador"}]},{"given":"Gabriel","family":"Lopez","sequence":"additional","affiliation":[{"name":"Escuela Polit&#x00E9;cnica Nacional,Departamento de Electr&#x00F3;nica, Telecomunicaciones y Redes de Informaci&#x00F3;n,Quito,Ecuador"}]},{"given":"Dorys","family":"Quiroz","sequence":"additional","affiliation":[{"name":"Universidad de las Fuerzas Armadas ESPE,Departamento de Ciencia de la Computaci&#x00F3;n,Quito,Ecuador"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(05)70275-X"},{"key":"ref11","first-page":"23","article-title":"Information security management system standards: A comparative study of the big five","volume":"11","author":"susanto","year":"2011","journal-title":"International Journal of Electrical & Computer Sciences IJECSIJENS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.28945\/244"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ECDC.2013.6556730"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0557-2_69"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2015.7469581"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.06.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.167"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"12038","DOI":"10.1088\/1757-899X\/296\/1\/012038","article-title":"An analysis of indonesia&#x2019;s information security index: a case study in a public university","volume":"296","author":"yustanti","year":"2018","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref19","article-title":"It governance mechanisms at universities: an exploratory study","author":"bianchi","year":"2017","journal-title":"Strategic and Competitive Use of Information Technology (SCUIT)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5121\/ijitcs.2013.3102"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2013.42011"},{"key":"ref6","article-title":"Cis critical security controls - version 7.0","author":"for internet security","year":"2019"},{"key":"ref5","article-title":"O. of Government Commerce Gro&#x00DF;britannien","year":"2007","journal-title":"The Official Introduction to the ITIL Service Lifecycle"},{"key":"ref8","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"kitchenham","year":"2004","journal-title":"Keele UK Keele University"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181"},{"key":"ref2","article-title":"Ecar study of undergraduate students and information technology, 2014","author":"dahlstrom","year":"2014","journal-title":"Educause"},{"key":"ref9","first-page":"55","article-title":"Top 10 it issues, 2018: The remaking of higher education","author":"grajek","year":"2018","journal-title":"EDUCAUSE review 2018 EDUCAUSE"},{"key":"ref1","article-title":"States&#x2019; roles in keeping schools safe: Opportunities and challenges for state school safety centers and other actors. national institute of justice report","author":"carlton","year":"2017","journal-title":"National Institute of Justice"},{"key":"ref20","article-title":"[references] information security management frameworks in higher education institutions: An overview","author":"merchan-lima","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.501"},{"key":"ref21","first-page":"73","article-title":"Metodolog&#x00ED;a para la implementaci&#x00F3;n de un Sistema de Gesti&#x00F3;n de Seguridad de la Informaci&#x00F3;n basado en la familia de normas ISO\/IEC 27000","author":"valencia-duque","year":"2017","journal-title":"RISTI - Revista Ib&#x00E9;rica de Sistemas e Tecnologias de Informa&#x00E7;&#x00E3;o"},{"key":"ref24","first-page":"276","article-title":"Quantitative model for economic analyses of information security investment in an enterprise information system","volume":"45","author":"jerman-bla\u017eic?","year":"2012","journal-title":"Organizacija"},{"key":"ref23","author":"peltier","year":"2016","journal-title":"Information Security Policies Procedures and Standards Guidelines for Effective Information Security Management"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-292"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","location":"Quito, Ecuador","start":{"date-parts":[[2019,10,23]]},"end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108845.pdf?arnumber=9108845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:40:14Z","timestamp":1755715214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108845","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}