{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:40:09Z","timestamp":1750228809319,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T00:00:00Z","timestamp":1433376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,4]]},"DOI":"10.1145\/2751957.2751972","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"73-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Missing Circle of ISMS (LL-ISMS)"],"prefix":"10.1145","author":[{"given":"Masoud","family":"Hayeri Khyavi","sequence":"first","affiliation":[{"name":"Research Inistitute for ICT(Iran's Telecommunication Research Center), TEHRAN, Iran"}]},{"given":"Mina","family":"Rahimi","sequence":"additional","affiliation":[{"name":"Research Inistitute for ICT(Iran's Telecommunication Research Center), TEHRAN, Iran"}]}],"member":"320","published-online":{"date-parts":[[2015,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. AbuZineh. Success Factors of Information Security Management: A Comparative Analysis between Jordanian and Finnish Companies. http:\/\/www.pafis.shh.fi\/graduates\/samabu04.pdf 2006  S. AbuZineh. Success Factors of Information Security Management: A Comparative Analysis between Jordanian and Finnish Companies. http:\/\/www.pafis.shh.fi\/graduates\/samabu04.pdf 2006"},{"volume-title":"January","year":"2006","author":"Puthuseeri V. K.","key":"e_1_3_2_1_2_1"},{"volume-title":"ISO 27001: Information technology-Security techniques-Information security management systems-Requirements","year":"2005","author":"IEC.","key":"e_1_3_2_1_3_1"},{"volume-title":"ISO17799: Information technology - Security techniques - Code of practice for information security management","year":"2005","author":"IEC.","key":"e_1_3_2_1_4_1"},{"volume-title":"June","year":"2006","author":"ISCC","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Abdul Jalil R. Abdul Hamid. ISMS Pilot Program Experiences: Benefits Challenges & Recommendations. http:\/\/www.cybersecurity.my\/en\/knowledge_banks\/articles\/main\/detail\/2372\/index.html  S. Abdul Jalil R. Abdul Hamid. ISMS Pilot Program Experiences: Benefits Challenges & Recommendations. http:\/\/www.cybersecurity.my\/en\/knowledge_banks\/articles\/main\/detail\/2372\/index.html"},{"key":"e_1_3_2_1_7_1","unstructured":"F. Heyrani http:\/\/www.douran.com\/DesktopModules\/News\/NewsView.aspx?TabID=1&Site=douranportal&Lang=fa-IR&ItemID=1724&mid=15226&wVersion=Staging. ISMS Sector. Douran Group  F. Heyrani http:\/\/www.douran.com\/DesktopModules\/News\/NewsView.aspx?TabID=1&Site=douranportal&Lang=fa-IR&ItemID=1724&mid=15226&wVersion=Staging. ISMS Sector. Douran Group"},{"key":"e_1_3_2_1_8_1","unstructured":"ISMS Plan and Implementation in Telecommunication Company of Khorasan-e-Razavi. IRAN 2006  ISMS Plan and Implementation in Telecommunication Company of Khorasan-e-Razavi. IRAN 2006"},{"volume-title":"An Introduction to the Business Model or Information Security","year":"2009","author":"ISACA Knowledge Center","key":"e_1_3_2_1_9_1"},{"volume-title":"Information Security Management - A Practical Approach. IEEE Conference Publications; Page(s): 1--6. AFRICON","year":"2007","author":"Dey M.","key":"e_1_3_2_1_10_1"}],"event":{"name":"SIGMIS-CPR '15: 2015 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Newport Beach California USA","acronym":"SIGMIS-CPR '15"},"container-title":["Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751957.2751972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,4]]},"references-count":10,"alternative-id":["10.1145\/2751957.2751972","10.1145\/2751957"],"URL":"https:\/\/doi.org\/10.1145\/2751957.2751972","relation":{},"subject":[],"published":{"date-parts":[[2015,6,4]]},"assertion":[{"value":"2015-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}