{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:37Z","timestamp":1750306477581,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T00:00:00Z","timestamp":1438560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,3]]},"DOI":"10.1145\/2781562.2781607","type":"proceedings-article","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:17:21Z","timestamp":1438348641000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Study on the Information Technology Security Review Process in Finance"],"prefix":"10.1145","author":[{"given":"Youngran","family":"Hong","sequence":"first","affiliation":[{"name":"Soongsil University, 369 Sangdo-ro, Dongjak-Gu, Seoul 156-743, Korea, +82-2-820-0688"}]},{"given":"Dongsoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Soongsil University, 369 Sangdo-ro, Dongjak-Gu, Seoul 156-743, Korea, +82-2-820-0688"}]}],"member":"320","published-online":{"date-parts":[[2015,8,3]]},"reference":[{"volume-title":"COSCOM","year":"2010","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250310"},{"issue":"10","key":"e_1_3_2_1_3_1","article-title":"Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment","volume":"1","author":"Susanto H.","year":"2011","journal-title":"International Journal of Science and Advanced Technology"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"J.L. Spears and H. Barki User Participation in Information Systems Security Risk Management MIS quarterly Vol.34 No.3 pp 503--522. 2010.   J.L. Spears and H. Barki User Participation in Information Systems Security Risk Management MIS quarterly Vol.34 No.3 pp 503--522. 2010.","DOI":"10.2307\/25750689"},{"key":"e_1_3_2_1_5_1","first-page":"147","volume-title":"International Journal of Technology Management","author":"Chang S. E.","year":"2011"},{"issue":"10","key":"e_1_3_2_1_6_1","article-title":"Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment","volume":"1","author":"Susanto S. H.","year":"2011","journal-title":"International Journal of Science and Advanced Technology"},{"key":"e_1_3_2_1_7_1","first-page":"318","volume-title":"2010 Northeast Decision Sciences Institute Proceedings","author":"Parakkattu S.","year":"2010"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"39","article-title":"Guidelines for Performance Measures of Information Security of It Network and Systems","volume":"1","author":"Datta S. P.","year":"2011","journal-title":"International Journal of Research and Reviews in Next Generation Networks"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"58","article-title":"An Integrated Framework for Information Security Management","volume":"30","author":"Ma Q.","year":"2009","journal-title":"Review of Business"},{"first-page":"1","volume-title":"Twentieth Americas Conference on Information Systems","year":"2014","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.006"}],"event":{"name":"ICEC '15: The 17th International Conference on Electronic Commerce 2015","sponsor":["KRF Korea Research Foundation"],"location":"Seoul Republic of Korea","acronym":"ICEC '15"},"container-title":["Proceedings of the 17th International Conference on Electronic Commerce 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2781562.2781607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2781562.2781607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:16Z","timestamp":1750225696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2781562.2781607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,3]]},"references-count":12,"alternative-id":["10.1145\/2781562.2781607","10.1145\/2781562"],"URL":"https:\/\/doi.org\/10.1145\/2781562.2781607","relation":{},"subject":[],"published":{"date-parts":[[2015,8,3]]},"assertion":[{"value":"2015-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}