{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:26:03Z","timestamp":1762323963853},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isda.2015.7489156","type":"proceedings-article","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T22:22:17Z","timestamp":1465856537000},"source":"Crossref","is-referenced-by-count":6,"title":["A framework for an effective cybersecurity strategy implementation: Fundamental pillars identification"],"prefix":"10.1109","author":[{"given":"Hasna","family":"Elkhannoubi","sequence":"first","affiliation":[]},{"given":"Mustapha","family":"Belaissaoui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"National Audit Office, The UK cyber security strategy: Landscape review","year":"2015"},{"key":"ref11","article-title":"Fundamental pillars for an effective cybersecurity strategy","author":"hasna","year":"2015","journal-title":"ACS\/IEEE International Conference on Computer System and Applications (AICCSA)"},{"key":"ref12","article-title":"International Organization for Standardization","year":"2013","journal-title":"ISO\/IEC 27002 Information technology - Security techniques - Code of practice for information security controls"},{"key":"ref13","article-title":"The Stationery Office","year":"2012","journal-title":"An Introductory Overview of ITIL"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.73"},{"key":"ref15","first-page":"25","article-title":"La cyberstrat&#x00E9;gie de l'Union Europ&#x00E9;enne","author":"olivier","year":"0","journal-title":"[European union cyberstrategy] S&#x00E9;curit&#x00E9; globale 2013\/2 (N&#x00B0; 24)"},{"key":"ref16","article-title":"AFDEL, &#x201C;Cybers&#x00E9;curit&#x00E9;: Hisser les acteurs fran&#x00E7;ais au niveau de la comp&#x00E9;tition","year":"2014","journal-title":"Cybersecurity Hoist the French actors at the competition] Livre Blanc [White paper]"},{"key":"ref4","article-title":"D&#x00E9;fense et s&#x00E9;curit&#x00E9; Nationale","author":"livre","year":"2008"},{"key":"ref3","article-title":"ISACA, &#x201C;The Cybersecurity Fundamentals Study Guide","year":"2014"},{"key":"ref6","article-title":"Cybersecurity guide for business","author":"icc","year":"2014"},{"key":"ref5","article-title":"D&#x00E9;fense et s&#x00E9;curit&#x00E9; nationale","author":"livre","year":"2013"},{"key":"ref8","article-title":"Executive Order &#x2014; Improving Critical Infrastructure Cybersecurity","year":"2015","journal-title":"https \/\/www whitehouse gov\/the-press-office\/2013\/02\/12\/executive-order-improving-critical-infrastructure-cybersecurity"},{"key":"ref7","article-title":"Joint communication to the European parliament, the council, The European economic and social committee and the Committee of the regions Cybersecurity Strategy of the European Union","year":"2013"},{"key":"ref2","article-title":"A national strategy for an effective cybersecurity approach and culture","author":"solange","year":"0","journal-title":"International Conference on Availability Reliability and Security"},{"key":"ref1","first-page":"128","article-title":"cybersecurity definition and historic&#x201D;, la cybers&#x00E9;curit&#x00E9; [the cybersecurity]","author":"arpagian","year":"2010","journal-title":"Paris France university press &#x00AB;Que sais-je?&#x00BB;"},{"key":"ref9","article-title":"Cabinet Office, The Rt Hon Lord Maude of Horsham and The Rt Hon","author":"david","year":"2011","journal-title":"The UK Cyber Security Strategy Protecting and Promoting the UK in a Digital World"}],"event":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","location":"Marrakech, Morocco","start":{"date-parts":[[2015,12,14]]},"end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484413\/7489153\/07489156.pdf?arnumber=7489156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T20:45:38Z","timestamp":1489783538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7489156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isda.2015.7489156","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}