{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:37Z","timestamp":1750306477640,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T00:00:00Z","timestamp":1438560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,3]]},"DOI":"10.1145\/2781562.2781600","type":"proceedings-article","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:17:21Z","timestamp":1438348641000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Role of Information Security Committee based on Competing Values Framework"],"prefix":"10.1145","author":[{"given":"Kunwoo","family":"Kim","sequence":"first","affiliation":[{"name":"Chung-Ang University, Graduate School, Department of Security Convergence, Heukseok-dong, Dongjak-gu, Seoul, Korea, +82-10-4628-1292"}]},{"given":"Jungduk","family":"Kim","sequence":"additional","affiliation":[{"name":"Chung-Ang University, College of Business and Economics, Department of Industrial Security, Heukseok-dong, Dongjak-gu, Seoul, Korea, 82-10-2006-6380"}]}],"member":"320","published-online":{"date-parts":[[2015,8,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.002"},{"key":"e_1_3_2_1_2_1","volume-title":"Psychological Bulletin.","volume":"63","author":"Bruce W.","year":"1965"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"15","article-title":"The Chief Information Security Officer: An Analysis Of The Skills Required For Success","volume":"48","author":"Dwayne Whitten","year":"2008","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_1_4_1","unstructured":"ISO\/IEC 27001:2013. Information technology-Security techniques-Information security management systems - Requirements. 2013.  ISO\/IEC 27001:2013. Information technology-Security techniques-Information security management systems - Requirements. 2013."},{"key":"e_1_3_2_1_5_1","unstructured":"ISO\/IEC 27014:2013. Information technology-Security techniques-Governance of information security. 2013.  ISO\/IEC 27014:2013. Information technology-Security techniques-Governance of information security. 2013."},{"volume-title":"Management Science, (March","year":"1983","author":"Quinn R. E.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Todd Fitzgerald. 2005. Building Management Commitment through Security Councils Information Systems Security. (May \/ June 2005) 14:2 27--36 DOI=http:\/\/dx.doi.org\/10.1201\/1086\/45241.14.2.20050501\/88291.5  Todd Fitzgerald. 2005. Building Management Commitment through Security Councils Information Systems Security. (May \/ June 2005) 14:2 27--36 DOI=http:\/\/dx.doi.org\/10.1201\/1086\/45241.14.2.20050501\/88291.5","DOI":"10.1201\/1086\/45241.14.2.20050501\/88291.5"},{"key":"e_1_3_2_1_8_1","unstructured":"Tom Scholtz. 2003. The Role of the Corporate Information Security Steering Committee. SC Magazine. (7 May 2003). DOI= http:\/\/www.scmagazine.com\/the-role-of-the-corporate-information-security-steering-committee\/article\/30595\/.  Tom Scholtz. 2003. The Role of the Corporate Information Security Steering Committee. SC Magazine. (7 May 2003). DOI= http:\/\/www.scmagazine.com\/the-role-of-the-corporate-information-security-steering-committee\/article\/30595\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Tom Scholtz F. Christian Byrnes. 2010. Information Security And Governance: Forums And Committees Gartner. (20 October 2010).  Tom Scholtz F. Christian Byrnes. 2010. Information Security And Governance: Forums And Committees Gartner. (20 October 2010)."},{"volume-title":"Survey Analysis: Information Security Governance","year":"2014","author":"Tom Scholtz","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"W. Krag Brotby et al. 2006. Information Security Governance: Guidance for Boards of Directors and Executive Management 2nd Edition. IT Governance Institute. (2006).  W. Krag Brotby et al. 2006. Information Security Governance: Guidance for Boards of Directors and Executive Management 2nd Edition. IT Governance Institute. (2006)."}],"event":{"name":"ICEC '15: The 17th International Conference on Electronic Commerce 2015","sponsor":["KRF Korea Research Foundation"],"location":"Seoul Republic of Korea","acronym":"ICEC '15"},"container-title":["Proceedings of the 17th International Conference on Electronic Commerce 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2781562.2781600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2781562.2781600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:16Z","timestamp":1750225696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2781562.2781600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,3]]},"references-count":11,"alternative-id":["10.1145\/2781562.2781600","10.1145\/2781562"],"URL":"https:\/\/doi.org\/10.1145\/2781562.2781600","relation":{},"subject":[],"published":{"date-parts":[[2015,8,3]]},"assertion":[{"value":"2015-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}