{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:11:06Z","timestamp":1729620666546,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750242","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"454-462","source":"Crossref","is-referenced-by-count":0,"title":["A model of component interaction between Formal, Technical and Informal components within IS\/IT security governance"],"prefix":"10.1109","author":[{"given":"Nadianatra","family":"Musa","sequence":"first","affiliation":[]},{"given":"Bob","family":"Clift","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.583"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90150-R"},{"key":"18","article-title":"A critical analysis of vulnerability taxonomies","author":"bishop","year":"1996","journal-title":"Tech Rep CSE-96-11 Department of Computer Science at the University of California at Davis"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(92)90170-V"},{"journal-title":"Cyberpunk Outlaws and Hackers on the Computer Frontier","year":"1991","author":"hafner","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356852"},{"key":"14","article-title":"The computer virus crisis","author":"fites","year":"1989","journal-title":"Van Nostrand Reinhold"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.03.008"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/800122.803961"},{"key":"21","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/859670.859675","article-title":"Enemy at the gate threats to information security","volume":"46","author":"whitman","year":"2003","journal-title":"Communications of the ACM"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.566"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948050"},{"journal-title":"Powerplay in Industrial Sales A Study of the Potential of Electronic Marketplaces in Manufacturing Companies","year":"2000","author":"englund","key":"23"},{"key":"24","first-page":"1","article-title":"IT security in the uSA, japan and china-A study of initiatives and trends within policy, r&D, industry and technology","author":"ahlgren","year":"2005","journal-title":"Swedish Institute for Growth Policy Studies"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"journal-title":"Sociological Paradigms and Organizational Analysis","year":"1979","author":"burrell","key":"26"},{"key":"27","article-title":"Role of the boards and senior management within formal, technical and informal components iS\/IT security Governance in the Malaysian Publicly Listed Companies","author":"musa","year":"2012","journal-title":"School of Accounting and Corporate Governance Faculty of Business"},{"key":"28","article-title":"Building and deploying effective security policies","author":"lineman","year":"2007","journal-title":"Information Shield Inc"},{"key":"29","article-title":"The ultimate defence of depth security awareness in your company","author":"brian","year":"2001","journal-title":"SANS Reading Room Material"},{"journal-title":"Finance Committee on Corporate Governance Perpustakaan Negara Malaysia","article-title":"The malaysian code on corporate governance","year":"2000","key":"3"},{"journal-title":"Rules Guidance Notes and Waivers","year":"2012","key":"2"},{"key":"10","first-page":"530","article-title":"Managing information systems security critical success factors and indicators to measure effectiveness","volume":"417","author":"torres","year":"2006","journal-title":"ISC LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(02)00513-4"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.257"},{"key":"7","article-title":"Information systems security governance research a behavioral perspective","author":"mishra","year":"2007","journal-title":"NYS Cyber Security Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.013"},{"journal-title":"CCNA Security Study Guide","year":"2010","author":"boyles","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1996.7"},{"key":"31","first-page":"465","article-title":"Information security and employee behaviour","author":"mcllwraith","year":"2006","journal-title":"Gower Publishing Company(Presses Universitaries de Namur) 2006"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1052220.1052264"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/341852.341877"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1216218.1216224"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750242.pdf?arnumber=6750242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:27:40Z","timestamp":1498127260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750242","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}