{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:36:00Z","timestamp":1772847360597,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icccnt.2018.8493977","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T02:36:24Z","timestamp":1541471784000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Roadmap Amid Chaos: Cyber Security Management for Organisations"],"prefix":"10.1109","author":[{"given":"Ashutosh","family":"Bahuguna","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. K.","family":"Bisht","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeetendra","family":"Pande","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"Home"},{"key":"ref11","year":"0","journal-title":"Critical Infrastructure Preparedness and Resilience Research Network"},{"key":"ref12","first-page":"97","article-title":"From information security to cyber security","author":"von","year":"2013","journal-title":"Computers & Security"},{"key":"ref13","year":"0","journal-title":"MQTT NIST Cyber Security Framework"},{"key":"ref14","year":"2013","journal-title":"family - Information security management systems"},{"key":"ref15","year":"2017","journal-title":"Saudi Arabian Monetary Authority Cyber Security Framework"},{"key":"ref16","year":"0","journal-title":"COBIT Framework for IT Governance and Control"},{"key":"ref17","year":"2016","journal-title":"Cybersecurity Capability Maturity Model (ES-C2M2)"},{"key":"ref18","year":"0","journal-title":"Cyber Essentials"},{"key":"ref19","year":"0","journal-title":"Home"},{"key":"ref4","year":"2013","journal-title":"National Cyber Security Policy"},{"key":"ref3","year":"2015","journal-title":"Critical Information Infrastructures Protection approaches in EU"},{"key":"ref6","year":"0","journal-title":"Home"},{"key":"ref5","year":"0","journal-title":"Information Security Education and Awarness (ISEA)"},{"key":"ref8","article-title":"Cyber Security Economics","year":"2017","journal-title":"edX Courses"},{"key":"ref7","first-page":"32","article-title":"Grounded Theory as a Methodology for Theory Generation in Information Systems Research","year":"2009","journal-title":"European Journal of Economics Finance and Administrative Sciences"},{"key":"ref2","year":"0"},{"key":"ref1","year":"2017","journal-title":"ENISA Threat Landscape Report 2017"},{"key":"ref9","author":"rizkallah","year":"2017","journal-title":"The Cybersecurity Regulatory Crackdown"},{"key":"ref20","year":"0","journal-title":"CIS 20 Critical Security Controls"}],"event":{"name":"2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","location":"Bangalore","start":{"date-parts":[[2018,7,10]]},"end":{"date-parts":[[2018,7,12]]}},"container-title":["2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8476666\/8493493\/08493977.pdf?arnumber=8493977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:32:00Z","timestamp":1598236320000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8493977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccnt.2018.8493977","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}