{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:34Z","timestamp":1750220854565,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,23]]},"DOI":"10.1145\/3357419.3357427","type":"proceedings-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:16:45Z","timestamp":1570807005000},"page":"101-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["From Concept to Practice"],"prefix":"10.1145","author":[{"given":"Zandile","family":"Manjezi","sequence":"first","affiliation":[{"name":"Nelson Mandela University, Port Elizabeth, South Africa"}]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[{"name":"Nelson Mandela University, Port Elizabeth, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1080\/10580530701586136"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/ISSA.2011.6027522"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.cose.2006.07.005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1080\/08874417.2009.11645326"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/S0167-4048(02)00504-7"},{"unstructured":"Johan Van Niekerk and Rossouw Von Solms. 2006. Understanding Information Security Culture: A Conceptual Framework.In ISSA. 1--10. https:\/\/www.researchgate.net\/publication\/220803272","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/S1353-4858(02)06011-7"},{"key":"e_1_3_2_1_9_1","first-page":"2014","volume":"27002","year":"2014","unstructured":"2014. SANS 27002:2014. South African National Standard: Information technology- Security techniques-Code of practice for information security controls. www.sabs.co.za","journal-title":"SANS"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1108\/00251740010317469"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-030-11407-7_11"},{"unstructured":"Christopher M Frenz and Christian Diaz. 2018. Anti-Ransomware Guide. Technical Report. https:\/\/www.owasp.org\/images\/6\/64\/Anti-RansomwareGuidev1-7.pdf","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.ejor.2014.09.055"},{"key":"e_1_3_2_1_14_1","first-page":"17","article-title":"IT security review: Privacy, protection, access control, assurance, and system security","volume":"2","author":"Sattarova Feruza Y.","year":"2007","unstructured":"Y. Sattarova Feruza and Tao Hoon Kim. 2007. IT security review: Privacy, protection, access control, assurance, and system security. International Journal of Multimedia and Ubiquitous Engineering 2, 2 (2007), 17--32.","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICoAC.2012.6416856"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/S1353-4858(04)00065-0"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/j.cose.2019.01.011"}],"event":{"sponsor":["Chinese Academy of Sciences"],"acronym":"ICICM 2019","name":"ICICM 2019: The 9th International Conference on Information Communication and Management","location":"Prague Czech Republic"},"container-title":["Proceedings of the 9th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357419.3357427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:21Z","timestamp":1750202601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357427"}},"subtitle":["Untangling the Direct-Control Cycle"],"short-title":[],"issued":{"date-parts":[[2019,8,23]]},"references-count":17,"alternative-id":["10.1145\/3357419.3357427","10.1145\/3357419"],"URL":"https:\/\/doi.org\/10.1145\/3357419.3357427","relation":{},"subject":[],"published":{"date-parts":[[2019,8,23]]},"assertion":[{"value":"2019-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}