{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:25:36Z","timestamp":1729661136521,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cisti.2015.7170418","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T17:21:22Z","timestamp":1438276882000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of the adoption of an information systems security policy"],"prefix":"10.1109","author":[{"given":"Isabel Maria","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Research Methods in Education","year":"1994","author":"cohen","key":"ref10"},{"journal-title":"Recherche action le cas de I'education - Bruxelles De Boock Wesmael","year":"1988","author":"hugon","key":"ref11"},{"article-title":"A beginner's guide to action research","year":"2006","author":"dick","key":"ref12"},{"article-title":"The Good Research Guide for Small-Scale Social Research","year":"1999","author":"descombe","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9752.00171"},{"key":"ref15","article-title":"Action Research and Critical Rationalism: a Virtuous Marriage","author":"cunha","year":"2002","journal-title":"Proceedings of the 10th European Conference on Information Systems"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.4324\/9780203016343","article-title":"Action Learning and Action Research: Improving the quality of Teaching & Learning","author":"kember","year":"2000"},{"article-title":"Action Research in Higher Education: Examples and Reflections","year":"1996","author":"zuber-skerritt","key":"ref17"},{"key":"ref18","first-page":"582","article-title":"An Assessment of the Scientific Merits of Action Research, Administrative Science Quarterly","volume":"23","author":"susman","year":"1978"},{"key":"ref19","first-page":"1","article-title":"Investigating Information System With Action Research","volume":"2","author":"baskerville","year":"1999","journal-title":"CAiSE"},{"key":"ref4","article-title":"Information Security Policies","author":"peltier","year":"2002","journal-title":"Procedures and Standards Guidelines for Effective Information Security Management"},{"article-title":"Guidelines for an Information Sharing Policy","year":"2003","author":"gilbert","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05951-8_27"},{"article-title":"Security Policy Roadmap - Process for Creating Security Policies","year":"2001","author":"kee","key":"ref5"},{"article-title":"What is action research?","year":"1999","author":"dick","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/09593849810218319"},{"journal-title":"A Theory of Action Interpretation of IS Security","year":"2005","author":"de s\u00e1-soares","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"ref9","article-title":"Making Research Real: Information Systems Action Research a Suitable Methodology for Medical IS Security Investigations?","author":"williams","year":"2006","journal-title":"Proceedings of 4th Australian Information Security Management Conference"},{"key":"ref20","article-title":"A Investigacao Qualitativa na Avaliacao de SI para a Gestae Empresarial, Workshop em Investigacao Qualitativa","author":"silva","year":"2002","journal-title":"3a CAPSI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/026839696345289"},{"article-title":"The adoption of information security systems in the local public administration in Portugal","year":"2012","author":"lopes","key":"ref23"}],"event":{"name":"2015 10th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2015,6,17]]},"location":"Aveiro, Portugal","end":{"date-parts":[[2015,6,20]]}},"container-title":["2015 10th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152443\/7170350\/07170418.pdf?arnumber=7170418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T14:11:03Z","timestamp":1599401463000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7170418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cisti.2015.7170418","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}