{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:17:18Z","timestamp":1730207838119,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cisti.2015.7170542","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T17:21:22Z","timestamp":1438276882000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Critical success factors for the implementation of a security policy in health clinics"],"prefix":"10.1109","author":[{"given":"Isabel Maria","family":"Lopes","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"Secrets and Lies: Digital Security in a Networked World","year":"2000","author":"schneier","key":"ref10"},{"journal-title":"Security Architecture Design Deployment and Operations Osborne\/McGraw-Hill","year":"2001","author":"king","key":"ref11"},{"article-title":"Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management","year":"2002","author":"peltier","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"ref14","first-page":"917","article-title":"Information Security Policies from the Ground Up","author":"shorten","year":"2004","journal-title":"Information Security Management Handbook (Fifth ed )"},{"article-title":"Security Policy Roadmap &#x2013; Process for Creating Security Policies","year":"2001","author":"kee","key":"ref15"},{"journal-title":"Interpreta&#x00E7;&#x00E3;o da Seguran&#x00E7;a de Sistemas de Informa&#x00E7;&#x00E3;o Segundo a Teoria da Ac&#x00E7;&#x00E3;o Tese de Doutoramento em Tecnologias e Sistemas de Informa&#x00E7;&#x00E3;o Universidade do Minho","year":"2005","author":"de s\u00e1-soares","key":"ref16"},{"article-title":"Writing Information Security Policies","year":"2001","author":"barman","key":"ref17"},{"journal-title":"Developing Effective Information Systems Security Policies","year":"2001","author":"lee","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(98)00022-7"},{"article-title":"IT Governance: a manager's guide to date security and bs 7799\/iso17799","year":"2003","author":"calder","key":"ref4"},{"journal-title":"Security in Computing","year":"2012","author":"pfleeger","key":"ref3"},{"key":"ref6","article-title":"Toward a New Framework for Information Security","author":"parker","year":"2002","journal-title":"Computer Security Handbook"},{"key":"ref5","first-page":"147","article-title":"From Risk Analysis to Security Requirements","volume":"24","author":"gerber","year":"2005","journal-title":"Computer & Security"},{"key":"ref8","first-page":"61","article-title":"Information Systems Security Policies: A Survey in Portuguese Public Administration","author":"lopes","year":"2010","journal-title":"IADIS International Conference Information Systems"},{"key":"ref7","article-title":"Seguran&#x00E7;a nos Sistemas de Informa&#x00E7;&#x00E3;o Hospitalares","author":"santos","year":"2007","journal-title":"Pol&#x00ED;ticas Pr&#x00E1;ticas e Avalia&#x00E7;&#x00E3;o Tese de Doutoramento"},{"journal-title":"International Organization for Standardization\/International Electrotechnical Commission","article-title":"ISO\/IEC 17799, International Standard ISO\/IEC 17799:2000 Code of Practice for Information Security Management","year":"2012","key":"ref2"},{"key":"ref1","article-title":"Adop&#x00E7;&#x00E3;o de Pol&#x00ED;ticas de Seguran&#x00E7;a de Sistemas de Informa&#x00E7;&#x00E3;o na Administra&#x00E7;&#x00E3;o P&#x00FA;blica Local em Portugal","author":"lopes","year":"2012","journal-title":"Tese de Doutoramento"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/09685229910292817"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.011"},{"key":"ref22","article-title":"Understanding the Antecedents of Information Security Awareness &#x2013; An Emperical Study","author":"haeussinger","year":"2013","journal-title":"Proceedings of the Americas Conference on Information Systems"},{"key":"ref21","article-title":"Information Security and Privacy in Healthcare","author":"appari","year":"2013","journal-title":"Current State of Research"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/341852.341877"}],"event":{"name":"2015 10th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2015,6,17]]},"location":"Aveiro, Portugal","end":{"date-parts":[[2015,6,20]]}},"container-title":["2015 10th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152443\/7170350\/07170542.pdf?arnumber=7170542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T15:30:51Z","timestamp":1490369451000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7170542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cisti.2015.7170542","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}