{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:22:08Z","timestamp":1771575728928,"version":"3.50.1"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2006,1]]},"abstract":"<jats:p>Empirical evidence shows that cost-benefit analysis is a sound basis for budgeting information security expenditures.<\/jats:p>","DOI":"10.1145\/1107458.1107465","type":"journal-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:07:09Z","timestamp":1139238429000},"page":"121-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Budgeting process for information security expenditures"],"prefix":"10.1145","volume":"49","author":[{"given":"Lawrence A.","family":"Gordon","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Martin P.","family":"Loeb","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]}],"member":"320","published-online":{"date-parts":[[2006,1]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872155"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876669"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(89)90026-3"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_2_1_5_1","first-page":"2","article-title":"Information security expenditures and real options: A wait-and-see approach","volume":"19","author":"Gordon L.","year":"2003","unstructured":"Gordon , L. , Loeb , M. , and Lucyshyn , W . Information security expenditures and real options: A wait-and-see approach . Comput. Sec. J. 19 , 2 ( 2003 ), 1--7. Gordon, L., Loeb, M., and Lucyshyn, W. Information security expenditures and real options: A wait-and-see approach. Comput. Sec. J. 19, 2 (2003), 1--7.","journal-title":"Comput. Sec. J."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"e_1_2_1_7_1","first-page":"4","article-title":"Sophisticated capital budgeting selection techniques and firm performance","volume":"60","author":"Haka S.","year":"1985","unstructured":"Haka , S. , Gordon , L. , and Pinches , G . Sophisticated capital budgeting selection techniques and firm performance . Acc. Rev. 60 , 4 ( 1985 ), 651--669. Haka, S., Gordon, L., and Pinches, G. Sophisticated capital budgeting selection techniques and firm performance. Acc. Rev. 60, 4 (1985), 651--669.","journal-title":"Acc. Rev."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1107458.1107465","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1107458.1107465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:03Z","timestamp":1750262883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1107458.1107465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["10.1145\/1107458.1107465"],"URL":"https:\/\/doi.org\/10.1145\/1107458.1107465","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,1]]},"assertion":[{"value":"2006-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}